Blob Blame History Raw
<<<<<<< HEAD

=======
>>>>>>> 9f8a6a356b99a19e09256fc37630cd6c22da66b4
## <summary>policy for vdagent</summary>

########################################
## <summary>
##	Execute a domain transition to run vdagent.
## </summary>
## <param name="domain">
<<<<<<< HEAD
## <summary>
##	Domain allowed access.
## </summary>
=======
##	<summary>
##	Domain allowed access.
##	</summary>
>>>>>>> 9f8a6a356b99a19e09256fc37630cd6c22da66b4
## </param>
#
interface(`vdagent_domtrans',`
	gen_require(`
		type vdagent_t, vdagent_exec_t;
	')

	domtrans_pattern($1, vdagent_exec_t, vdagent_t)
')

#####################################
## <summary>
<<<<<<< HEAD
##  Getattr on vdagent executable.
## </summary>
## <param name="domain">
##  <summary>
##	Domain allowed access.
##  </summary>
## </param>
#
interface(`vdagent_getattr_exec_files',`
    gen_require(`
        type vdagent_exec_t;
    ')

    allow $1 vdagent_exec_t:file getattr;
=======
##	Getattr on vdagent executable.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`vdagent_getattr_exec_files',`
	gen_require(`
		type vdagent_exec_t;
	')

	allow $1 vdagent_exec_t:file getattr;
>>>>>>> 9f8a6a356b99a19e09256fc37630cd6c22da66b4
')

#######################################
## <summary>
<<<<<<< HEAD
##  Get the attributes of vdagent logs.
## </summary>
## <param name="domain">
##  <summary>
##  Domain allowed access.
##  </summary>
## </param>
#
interface(`vdagent_getattr_log',`
    gen_require(`
        type vdagent_log_t;
    ')

    logging_search_logs($1)
    allow $1 vdagent_log_t:file getattr_file_perms;
=======
##	Get the attributes of vdagent logs.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`vdagent_getattr_log',`
	gen_require(`
		type vdagent_log_t;
	')

	logging_search_logs($1)
	allow $1 vdagent_log_t:file getattr_file_perms;
>>>>>>> 9f8a6a356b99a19e09256fc37630cd6c22da66b4
')

########################################
## <summary>
##	Read vdagent PID files.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`vdagent_read_pid_files',`
	gen_require(`
		type vdagent_var_run_t;
	')

	files_search_pids($1)
	allow $1 vdagent_var_run_t:file read_file_perms;
')

#####################################
## <summary>
<<<<<<< HEAD
##      Connect to vdagent over a unix domain
##      stream socket.
## </summary>
## <param name="domain">
##      <summary>
##      Domain allowed access.
##      </summary>
## </param>
#
interface(`vdagent_stream_connect',`
        gen_require(`
                type vdagent_var_run_t, vdagent_t;
        ')

        files_search_pids($1)
        stream_connect_pattern($1, vdagent_var_run_t, vdagent_var_run_t, vdagent_t)
=======
##	Connect to vdagent over a unix domain
##	stream socket.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`vdagent_stream_connect',`
	gen_require(`
		type vdagent_var_run_t, vdagent_t;
	')

	files_search_pids($1)
	stream_connect_pattern($1, vdagent_var_run_t, vdagent_var_run_t, vdagent_t)
>>>>>>> 9f8a6a356b99a19e09256fc37630cd6c22da66b4
')

########################################
## <summary>
##	All of the rules required to administrate
##	an vdagent environment
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
<<<<<<< HEAD
=======
## <param name="role">
##	<summary>
##	Role allowed access.
##	</summary>
## </param>
## <rolecap/>
>>>>>>> 9f8a6a356b99a19e09256fc37630cd6c22da66b4
#
interface(`vdagent_admin',`
	gen_require(`
		type vdagent_t, vdagent_var_run_t;
	')

	allow $1 vdagent_t:process signal_perms;
	ps_process_pattern($1, vdagent_t)
<<<<<<< HEAD
	tunable_policy(`deny_ptrace',`',`
		allow $1 vdagent_t:process ptrace;
	')
=======
>>>>>>> 9f8a6a356b99a19e09256fc37630cd6c22da66b4

	files_search_pids($1)
	admin_pattern($1, vdagent_var_run_t)
')