diff options
author | Chris PeBenito <pebenito@ieee.org> | 2018-06-23 10:38:58 -0400 |
---|---|---|
committer | Jason Zaman <jason@perfinion.com> | 2018-06-24 16:33:24 +0800 |
commit | 751926c0fbba4bf7105622ee65888b66740847a0 (patch) | |
tree | 6bbdd39cd5becdddc8e4cbc41332c383874c7972 /policy/modules/services/procmail.if | |
parent | xdg: move compat interfaces to upstream xdg module (diff) | |
download | hardened-refpolicy-751926c0fbba4bf7105622ee65888b66740847a0.tar.gz hardened-refpolicy-751926c0fbba4bf7105622ee65888b66740847a0.tar.bz2 hardened-refpolicy-751926c0fbba4bf7105622ee65888b66740847a0.zip |
Move all files out of the old contrib directory.
Diffstat (limited to 'policy/modules/services/procmail.if')
-rw-r--r-- | policy/modules/services/procmail.if | 165 |
1 files changed, 165 insertions, 0 deletions
diff --git a/policy/modules/services/procmail.if b/policy/modules/services/procmail.if new file mode 100644 index 000000000..00edeab17 --- /dev/null +++ b/policy/modules/services/procmail.if @@ -0,0 +1,165 @@ +## <summary>Procmail mail delivery agent.</summary> + +######################################## +## <summary> +## Execute procmail with a domain transition. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed to transition. +## </summary> +## </param> +# +interface(`procmail_domtrans',` + gen_require(` + type procmail_exec_t, procmail_t; + ') + + corecmd_search_bin($1) + domtrans_pattern($1, procmail_exec_t, procmail_t) +') + +######################################## +## <summary> +## Execute procmail in the caller domain. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`procmail_exec',` + gen_require(` + type procmail_exec_t; + ') + + corecmd_search_bin($1) + can_exec($1, procmail_exec_t) +') + +######################################## +## <summary> +## Create, read, write, and delete +## procmail home files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`procmail_manage_home_files',` + gen_require(` + type procmail_home_t; + ') + + userdom_search_user_home_dirs($1) + allow $1 procmail_home_t:file manage_file_perms; +') + +######################################## +## <summary> +## Read procmail user home content files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`procmail_read_home_files',` + gen_require(` + type procmail_home_t; + + ') + + userdom_search_user_home_dirs($1) + allow $1 procmail_home_t:file read_file_perms; +') + +######################################## +## <summary> +## Relabel procmail home files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`procmail_relabel_home_files',` + gen_require(` + type ppp_home_t; + ') + + userdom_search_user_home_dirs($1) + allow $1 procmail_home_t:file relabel_file_perms; +') + +######################################## +## <summary> +## Create objects in user home +## directories with the procmail home type. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <param name="object_class"> +## <summary> +## Class of the object being created. +## </summary> +## </param> +## <param name="name" optional="true"> +## <summary> +## The name of the object being created. +## </summary> +## </param> +# +interface(`procmail_home_filetrans_procmail_home',` + gen_require(` + type procmail_home_t; + ') + + userdom_user_home_dir_filetrans($1, procmail_home_t, $2, $3) +') + +######################################## +## <summary> +## Read procmail tmp files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`procmail_read_tmp_files',` + gen_require(` + type procmail_tmp_t; + ') + + files_search_tmp($1) + allow $1 procmail_tmp_t:file read_file_perms; +') + +######################################## +## <summary> +## Read and write procmail tmp files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`procmail_rw_tmp_files',` + gen_require(` + type procmail_tmp_t; + ') + + files_search_tmp($1) + rw_files_pattern($1, procmail_tmp_t, procmail_tmp_t) +') |