Gentoo Archives: gentoo-commits

From: "Anthony G. Basile (blueness)" <blueness@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo-x86 commit in sec-policy/selinux-mutt/files: add-apps-mutt.patch add-apps-mutt-r1.patch
Date: Sat, 05 Feb 2011 20:42:51
Message-Id: 20110205204105.7EFB820070@flycatcher.gentoo.org
1 blueness 11/02/05 20:41:05
2
3 Added: add-apps-mutt.patch add-apps-mutt-r1.patch
4 Log:
5 Bulk addition of new selinux policies.
6
7 (Portage version: 2.1.9.25/cvs/Linux x86_64)
8
9 Revision Changes Path
10 1.1 sec-policy/selinux-mutt/files/add-apps-mutt.patch
11
12 file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sec-policy/selinux-mutt/files/add-apps-mutt.patch?rev=1.1&view=markup
13 plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sec-policy/selinux-mutt/files/add-apps-mutt.patch?rev=1.1&content-type=text/plain
14
15 Index: add-apps-mutt.patch
16 ===================================================================
17 --- apps/mutt.te 1970-01-01 01:00:00.000000000 +0100
18 +++ apps/mutt.te 2011-01-22 15:22:46.330000061 +0100
19 @@ -0,0 +1,76 @@
20 +policy_module(mutt, 1.0.0)
21 +
22 +############################
23 +#
24 +# Declarations
25 +#
26 +
27 +type mutt_t;
28 +type mutt_exec_t;
29 +application_domain(mutt_t, mutt_exec_t)
30 +ubac_constrained(mutt_t)
31 +
32 +type mutt_home_t;
33 +typealias mutt_home_t alias { user_mutt_home_t staff_mutt_home_t sysadm_mutt_home_t };
34 +userdom_user_home_content(mutt_home_t)
35 +
36 +type mutt_conf_t;
37 +typealias mutt_conf_t alias { user_mutt_conf_t staff_mutt_conf_t sysadm_mutt_conf_t };
38 +userdom_user_home_content(mutt_conf_t)
39 +
40 +type mutt_sys_conf_t;
41 +files_type(mutt_sys_conf_t)
42 +
43 +type mutt_tmp_t;
44 +typealias mutt_tmp_t alias { user_mutt_tmp_t staff_mutt_tmp_t sysadm_mutt_tmp_t };
45 +files_tmp_file(mutt_tmp_t)
46 +ubac_constrained(mutt_tmp_t)
47 +
48 +############################
49 +#
50 +# Policy
51 +#
52 +
53 +allow mutt_t self:process signal_perms;
54 +#allow mutt_t self:unix_stream_socket create_stream_socket_perms;
55 +
56 +manage_dirs_pattern(mutt_t, mutt_home_t, mutt_home_t)
57 +manage_files_pattern(mutt_t, mutt_home_t, mutt_home_t)
58 +#manage_lnk_files_pattern(mutt_t, mutt_home_t, mutt_home_t)
59 +#manage_sock_files_pattern(mutt_t, mutt_home_t, mutt_home_t)
60 +#manage_fifo_files_pattern(mutt_t, mutt_home_t, mutt_home_t)
61 +userdom_user_home_dir_filetrans(mutt_t, mutt_home_t, dir)
62 +#manage_fifo_files_pattern(mutt_t, mutt_t, mutt_t)
63 +
64 +manage_dirs_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t)
65 +manage_files_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t)
66 +manage_fifo_files_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t)
67 +files_tmp_filetrans(mutt_t, mutt_tmp_t, { file dir })
68 +files_search_tmp(mutt_t)
69 +
70 +read_files_pattern(mutt_t, mutt_sys_conf_t, mutt_sys_conf_t)
71 +read_files_pattern(mutt_t, mutt_conf_t, mutt_conf_t)
72 +search_dirs_pattern(mutt_t, mutt_sys_conf_t, mutt_sys_conf_t)
73 +
74 +userdom_search_user_home_content(mutt_t)
75 +userdom_manage_user_home_content_files(mutt_t)
76 +userdom_manage_user_home_content_dirs(mutt_t)
77 +
78 +corecmd_exec_bin(mutt_t)
79 +corecmd_exec_shell(mutt_t)
80 +files_read_usr_files(mutt_t)
81 +
82 +domain_use_interactive_fds(mutt_t)
83 +
84 +auth_use_nsswitch(mutt_t)
85 +
86 +userdom_use_user_terminals(mutt_t)
87 +
88 +corenet_tcp_connect_pop_port(mutt_t)
89 +corenet_tcp_connect_smtp_port(mutt_t)
90 +
91 +miscfiles_read_localization(mutt_t)
92 +
93 +dev_read_rand(mutt_t)
94 +dev_read_urand(mutt_t)
95 +
96 --- apps/mutt.fc 1970-01-01 01:00:00.000000000 +0100
97 +++ apps/mutt.fc 2011-01-16 13:56:03.314000081 +0100
98 @@ -0,0 +1,4 @@
99 +/usr/bin/mutt -- gen_context(system_u:object_r:mutt_exec_t,s0)
100 +HOME_DIR/\.mutt(/.*)? gen_context(system_u:object_r:mutt_home_t,s0)
101 +HOME_DIR/\.muttrc -- gen_context(system_u:object_r:mutt_conf_t,s0)
102 +/etc/mutt(/.*)? gen_context(system_u:object_r:mutt_sys_conf_t,s0)
103
104
105
106 1.1 sec-policy/selinux-mutt/files/add-apps-mutt-r1.patch
107
108 file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sec-policy/selinux-mutt/files/add-apps-mutt-r1.patch?rev=1.1&view=markup
109 plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sec-policy/selinux-mutt/files/add-apps-mutt-r1.patch?rev=1.1&content-type=text/plain
110
111 Index: add-apps-mutt-r1.patch
112 ===================================================================
113 --- apps/mutt.te 1970-01-01 01:00:00.000000000 +0100
114 +++ apps/mutt.te 2011-01-30 15:24:18.890000182 +0100
115 @@ -0,0 +1,74 @@
116 +policy_module(mutt, 1.0.0)
117 +
118 +############################
119 +#
120 +# Declarations
121 +#
122 +
123 +type mutt_t;
124 +type mutt_exec_t;
125 +application_domain(mutt_t, mutt_exec_t)
126 +ubac_constrained(mutt_t)
127 +
128 +type mutt_home_t;
129 +typealias mutt_home_t alias { user_mutt_home_t staff_mutt_home_t sysadm_mutt_home_t };
130 +userdom_user_home_content(mutt_home_t)
131 +
132 +type mutt_conf_t;
133 +typealias mutt_conf_t alias { user_mutt_conf_t staff_mutt_conf_t sysadm_mutt_conf_t };
134 +userdom_user_home_content(mutt_conf_t)
135 +
136 +type mutt_sys_conf_t;
137 +files_type(mutt_sys_conf_t)
138 +
139 +type mutt_tmp_t;
140 +typealias mutt_tmp_t alias { user_mutt_tmp_t staff_mutt_tmp_t sysadm_mutt_tmp_t };
141 +files_tmp_file(mutt_tmp_t)
142 +ubac_constrained(mutt_tmp_t)
143 +
144 +############################
145 +#
146 +# Local Policy Rules
147 +#
148 +
149 +allow mutt_t self:process signal_perms;
150 +
151 +
152 +manage_dirs_pattern(mutt_t, mutt_home_t, mutt_home_t)
153 +manage_files_pattern(mutt_t, mutt_home_t, mutt_home_t)
154 +userdom_user_home_dir_filetrans(mutt_t, mutt_home_t, dir)
155 +
156 +manage_dirs_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t)
157 +manage_files_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t)
158 +manage_fifo_files_pattern(mutt_t, mutt_tmp_t, mutt_tmp_t)
159 +files_tmp_filetrans(mutt_t, mutt_tmp_t, { file dir })
160 +files_search_tmp(mutt_t)
161 +
162 +read_files_pattern(mutt_t, mutt_sys_conf_t, mutt_sys_conf_t)
163 +read_files_pattern(mutt_t, mutt_conf_t, mutt_conf_t)
164 +search_dirs_pattern(mutt_t, mutt_sys_conf_t, mutt_sys_conf_t)
165 +
166 +
167 +corecmd_exec_bin(mutt_t)
168 +corecmd_exec_shell(mutt_t)
169 +corenet_tcp_connect_pop_port(mutt_t)
170 +corenet_tcp_connect_smtp_port(mutt_t)
171 +dev_read_rand(mutt_t)
172 +dev_read_urand(mutt_t)
173 +domain_use_interactive_fds(mutt_t)
174 +files_read_usr_files(mutt_t)
175 +
176 +
177 +auth_use_nsswitch(mutt_t)
178 +miscfiles_read_localization(mutt_t)
179 +userdom_manage_user_home_content_files(mutt_t)
180 +userdom_manage_user_home_content_dirs(mutt_t)
181 +userdom_search_user_home_content(mutt_t)
182 +userdom_use_user_terminals(mutt_t)
183 +
184 +
185 +
186 +
187 +tunable_policy(`gentoo_try_dontaudit',`
188 + kernel_dontaudit_search_sysctl(mutt_t)
189 +')
190 --- apps/mutt.fc 1970-01-01 01:00:00.000000000 +0100
191 +++ apps/mutt.fc 2011-01-16 13:56:03.314000081 +0100
192 @@ -0,0 +1,4 @@
193 +/usr/bin/mutt -- gen_context(system_u:object_r:mutt_exec_t,s0)
194 +HOME_DIR/\.mutt(/.*)? gen_context(system_u:object_r:mutt_home_t,s0)
195 +HOME_DIR/\.muttrc -- gen_context(system_u:object_r:mutt_conf_t,s0)
196 +/etc/mutt(/.*)? gen_context(system_u:object_r:mutt_sys_conf_t,s0)