16adcd5
policy_module(glusterd, 1.0.0)
16adcd5
16adcd5
########################################
16adcd5
#
16adcd5
# Declarations
16adcd5
#
16adcd5
16adcd5
type glusterd_t;
16adcd5
type glusterd_exec_t;
16adcd5
init_daemon_domain(glusterd_t, glusterd_exec_t)
16adcd5
16adcd5
type glusterd_etc_t;
16adcd5
files_type(glusterd_etc_t)
16adcd5
16adcd5
type glusterd_tmp_t;
16adcd5
files_tmp_file(glusterd_tmp_t)
16adcd5
16adcd5
type glusterd_initrc_exec_t;
16adcd5
init_script_file(glusterd_initrc_exec_t)
16adcd5
16adcd5
type glusterd_log_t;
16adcd5
logging_log_file(glusterd_log_t)
16adcd5
16adcd5
type glusterd_var_run_t;
16adcd5
files_pid_file(glusterd_var_run_t)
16adcd5
16adcd5
type glusterd_var_lib_t;
16adcd5
files_type(glusterd_var_lib_t);
16adcd5
16adcd5
16adcd5
########################################
16adcd5
#
16adcd5
# glusterd local policy
16adcd5
#
16adcd5
16adcd5
allow glusterd_t self:capability { net_bind_service sys_admin dac_override chown dac_read_search fowner };
16adcd5
allow glusterd_t self:process { setrlimit signal };
16adcd5
allow glusterd_t self:capability sys_resource;
16adcd5
16adcd5
allow glusterd_t self:fifo_file rw_fifo_file_perms;
16adcd5
allow glusterd_t self:netlink_route_socket r_netlink_socket_perms;
16adcd5
allow glusterd_t self:tcp_socket create_stream_socket_perms;
16adcd5
allow glusterd_t self:udp_socket create_socket_perms;
16adcd5
allow glusterd_t self:unix_stream_socket create_stream_socket_perms;
16adcd5
allow glusterd_t self:unix_dgram_socket create_socket_perms;
16adcd5
16adcd5
manage_dirs_pattern(glusterd_t, glusterd_tmp_t, glusterd_tmp_t)
16adcd5
manage_files_pattern(glusterd_t, glusterd_tmp_t, glusterd_tmp_t)
16adcd5
manage_sock_files_pattern(glusterd_t, glusterd_tmp_t, glusterd_tmp_t)
16adcd5
files_tmp_filetrans(glusterd_t, glusterd_tmp_t, { dir file sock_file }) 
16adcd5
userdom_user_tmp_filetrans(glusterd_t, glusterd_tmp_t, { dir file sock_file })
16adcd5
16adcd5
manage_dirs_pattern(glusterd_t, glusterd_log_t, glusterd_log_t)
16adcd5
manage_files_pattern(glusterd_t, glusterd_log_t, glusterd_log_t)
16adcd5
logging_log_filetrans(glusterd_t, glusterd_log_t, { dir file })
16adcd5
16adcd5
manage_dirs_pattern(glusterd_t, glusterd_var_run_t, glusterd_var_run_t)
16adcd5
manage_files_pattern(glusterd_t, glusterd_var_run_t, glusterd_var_run_t)
16adcd5
files_pid_filetrans(glusterd_t, glusterd_var_run_t, { dir file })
16adcd5
16adcd5
manage_dirs_pattern(glusterd_t, glusterd_var_lib_t, glusterd_var_lib_t)
16adcd5
manage_files_pattern(glusterd_t, glusterd_var_lib_t, glusterd_var_lib_t)
16adcd5
files_var_lib_filetrans(glusterd_t, glusterd_var_lib_t, { dir file })
16adcd5
16adcd5
manage_dirs_pattern(glusterd_t, glusterd_etc_t, glusterd_etc_t)
16adcd5
manage_files_pattern(glusterd_t, glusterd_etc_t, glusterd_etc_t)
16adcd5
files_etc_filetrans(glusterd_t, glusterd_etc_t, { dir file }, "glusterfs")
16adcd5
16adcd5
can_exec(glusterd_t, glusterd_exec_t)
16adcd5
16adcd5
kernel_read_system_state(glusterd_t)
16adcd5
16adcd5
corecmd_exec_bin(glusterd_t)
16adcd5
corecmd_exec_shell(glusterd_t)
16adcd5
16adcd5
domain_use_interactive_fds(glusterd_t)
16adcd5
16adcd5
corenet_tcp_bind_generic_node(glusterd_t)
16adcd5
corenet_tcp_bind_generic_port(glusterd_t)
16adcd5
corenet_tcp_bind_all_reserved_ports(glusterd_t)
16adcd5
corenet_udp_bind_all_rpc_ports(glusterd_t)
16adcd5
corenet_tcp_connect_unreserved_ports(glusterd_t)
16adcd5
corenet_udp_bind_generic_node(glusterd_t)
16adcd5
corenet_udp_bind_ipp_port(glusterd_t)
16adcd5
16adcd5
dev_read_sysfs(glusterd_t)
16adcd5
dev_read_urand(glusterd_t)
16adcd5
16adcd5
files_read_usr_files(glusterd_t)
16adcd5
files_rw_pid_dirs(glusterd_t)
16adcd5
16adcd5
# Why is this needed
16adcd5
#files_manage_urandom_seed(glusterd_t)
16adcd5
16adcd5
auth_use_nsswitch(glusterd_t)
16adcd5
16adcd5
logging_send_syslog_msg(glusterd_t)
16adcd5
16adcd5
miscfiles_read_localization(glusterd_t)
16adcd5
16adcd5
sysnet_read_config(glusterd_t)
16adcd5
16adcd5
userdom_manage_user_home_dirs(glusterd_t)