## Andrew Filesystem server. ######################################## ## ## Execute a domain transition to run the ## afs client. ## ## ## ## Domain allowed to transition. ## ## # interface(`afs_domtrans',` gen_require(` type afs_t, afs_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, afs_exec_t, afs_t) ') ######################################## ## ## Read and write afs client UDP sockets. ## ## ## ## Domain allowed access. ## ## # interface(`afs_rw_udp_sockets',` gen_require(` type afs_t; ') allow $1 afs_t:udp_socket { read write }; ') ######################################## ## ## Read and write afs cache files. ## ## ## ## Domain allowed access. ## ## # interface(`afs_rw_cache',` gen_require(` type afs_cache_t; ') files_search_var($1) allow $1 afs_cache_t:file { read write }; ') ######################################## ## ## Execute afs server in the afs domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`afs_initrc_domtrans',` gen_require(` type afs_initrc_exec_t; ') init_labeled_script_domtrans($1, afs_initrc_exec_t) ') ######################################## ## ## All of the rules required to ## administrate an afs environment. ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`afs_admin',` gen_require(` attribute afs_domain; type afs_initrc_exec_t, afs_dbdir_t, afs_pt_db_t; type afs_ka_db_t, afs_vl_db_t, afs_config_t; type afs_logfile_t, afs_cache_t, afs_files_t; ') allow $1 afs_domain:process { ptrace signal_perms }; ps_process_pattern($1, afs_domain) init_startstop_service($1, $2, afs_domain, afs_initrc_exec_t) files_search_etc($1) admin_pattern($1, afs_config_t) files_search_var($1) admin_pattern($1, afs_cache_t) files_search_var_lib($1) admin_pattern($1, { afs_dbdir_t afs_pt_db_t afs_ka_db_t }) admin_pattern($1, afs_vl_db_t) logging_search_logs($1) admin_pattern($1, afs_logfile_t) admin_pattern($1, afs_files_t) ')