From: cpebenito@tresys.com (Christopher J. PeBenito)
To: refpolicy@oss.tresys.com
Subject: [refpolicy] [PATCH 4/7] authlogin.if: Add auth_create_pam_console_data_dirs and auth_pid_filetrans_pam_var_console interfaces
Date: Fri, 07 Dec 2012 00:49:59 -0500 [thread overview]
Message-ID: <50C18387.3070304@tresys.com> (raw)
In-Reply-To: <1354739968-4547-4-git-send-email-bigon@debian.org>
On 12/5/2012 3:39 PM, Laurent Bigonville wrote:
> From: Laurent Bigonville <bigon@bigon.be>
>
> On Debian /var/run/console directory might be created by consolekit, we
> need these new interfaces to achieve this.
> ---
> policy/modules/system/authlogin.if | 50 ++++++++++++++++++++++++++++++++++++
> 1 file changed, 50 insertions(+)
>
> diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
> index 8cdaa26..3efd5b6 100644
> --- a/policy/modules/system/authlogin.if
> +++ b/policy/modules/system/authlogin.if
> @@ -1102,6 +1102,25 @@ interface(`auth_list_pam_console_data',`
>
> ########################################
> ## <summary>
> +## Create pam var console pid directories.
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +#
> +interface(`auth_create_pam_console_data_dirs',`
> + gen_require(`
> + type pam_var_console_t;
> + ')
> +
> + files_search_pids($1)
> + allow $1 pam_var_console_t:dir create_dir_perms;
> +')
> +
> +########################################
> +## <summary>
> ## Relabel pam_console data directories.
> ## </summary>
> ## <param name="domain">
> @@ -1181,6 +1200,37 @@ interface(`auth_delete_pam_console_data',`
>
> ########################################
> ## <summary>
> +## Create specified objects in
> +## pid directories with the pam var
> +## console pid file type using a
> +## file type transition.
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +## <param name="object_class">
> +## <summary>
> +## Class of the object being created.
> +## </summary>
> +## </param>
> +## <param name="name" optional="true">
> +## <summary>
> +## The name of the object being created.
> +## </summary>
> +## </param>
> +#
> +interface(`auth_pid_filetrans_pam_var_console',`
> + gen_require(`
> + type pam_var_console_t;
> + ')
> +
> + files_pid_filetrans($1, pam_var_console_t, $2, $3)
> +')
> +
> +########################################
> +## <summary>
> ## Read all directories on the filesystem, except
> ## login files and listed exceptions.
> ## </summary>>
Merged.
--
Chris PeBenito
Tresys Technology, LLC
www.tresys.com | oss.tresys.com
next prev parent reply other threads:[~2012-12-07 5:49 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-12-05 20:39 [refpolicy] [PATCH 1/7] Properly label all the ssh host keys Laurent Bigonville
2012-12-05 20:39 ` [refpolicy] [PATCH 2/7] Allow udev_t domain to read files labeled as consolekit_var_run_t Laurent Bigonville
2012-12-07 5:48 ` Christopher J. PeBenito
2012-12-05 20:39 ` [refpolicy] [PATCH 3/7] Label /var/run/shm as tmpfs_t Laurent Bigonville
2012-12-07 5:13 ` Christopher J. PeBenito
2012-12-15 22:29 ` Laurent Bigonville
2012-12-16 16:41 ` grift
2012-12-05 20:39 ` [refpolicy] [PATCH 4/7] authlogin.if: Add auth_create_pam_console_data_dirs and auth_pid_filetrans_pam_var_console interfaces Laurent Bigonville
2012-12-07 5:49 ` Christopher J. PeBenito [this message]
2012-12-05 20:39 ` [refpolicy] [PATCH 5/7] init.if: Add init_daemon_run_file interface Laurent Bigonville
2012-12-05 21:58 ` grift
2012-12-05 22:15 ` [refpolicy] [PATCH 5/7 v2] " Laurent Bigonville
2012-12-07 5:26 ` Christopher J. PeBenito
2012-12-05 20:39 ` [refpolicy] [PATCH 6/7] Label /etc/rc.d/init.d/x11-common as xdm_exec_t Laurent Bigonville
2012-12-07 5:50 ` Christopher J. PeBenito
2012-12-05 20:39 ` [refpolicy] [PATCH 7/7] Drop /etc/rc.d/init.d/xfree86-common filecontext definition Laurent Bigonville
2012-12-07 5:51 ` Christopher J. PeBenito
2012-12-07 5:48 ` [refpolicy] [PATCH 1/7] Properly label all the ssh host keys Christopher J. PeBenito
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=50C18387.3070304@tresys.com \
--to=cpebenito@tresys.com \
--cc=refpolicy@oss.tresys.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.