## Establish connections to iSCSI devices. ######################################## ## ## Execute a domain transition to run iscsid. ## ## ## ## Domain allowed to transition. ## ## # interface(`iscsid_domtrans',` gen_require(` type iscsid_t, iscsid_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, iscsid_exec_t, iscsid_t) ') ######################################## ## ## Create, read, write, and delete ## iscsid sempaphores. ## ## ## ## Domain allowed access. ## ## # interface(`iscsi_manage_semaphores',` gen_require(` type iscsid_t; ') allow $1 iscsid_t:sem create_sem_perms; ') ######################################## ## ## Connect to iscsid using a unix ## domain stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`iscsi_stream_connect',` gen_require(` type iscsid_t, iscsi_var_lib_t; ') files_search_var_lib($1) stream_connect_pattern($1, iscsi_var_lib_t, iscsi_var_lib_t, iscsid_t) ') ######################################## ## ## Read iscsid lib files. ## ## ## ## Domain allowed access. ## ## # interface(`iscsi_read_lib_files',` gen_require(` type iscsi_var_lib_t; ') read_files_pattern($1, iscsi_var_lib_t, iscsi_var_lib_t) allow $1 iscsi_var_lib_t:dir list_dir_perms; files_search_var_lib($1) ') ######################################## ## ## All of the rules required to ## administrate an iscsi environment. ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`iscsi_admin',` gen_require(` type iscsid_t, iscsi_lock_t, iscsi_log_t; type iscsi_var_lib_t, iscsi_var_run_t, iscsi_tmp_t; type iscsi_initrc_exec_t; ') allow $1 iscsid_t:process { ptrace signal_perms }; ps_process_pattern($1, iscsid_t) init_startstop_service($1, $2, iscsi_t, iscsi_initrc_exec_t) logging_search_logs($1) admin_pattern($1, iscsi_log_t) files_search_locks($1) admin_pattern($1, iscsi_lock_t) files_search_var_lib($1) admin_pattern($1, iscsi_var_lib_t) files_search_pids($1) admin_pattern($1, iscsi_var_run_t) files_search_tmp($1) admin_pattern($1, iscsi_tmp_t) ')