Blob Blame History Raw
## <summary>Asterisk IP telephony server.</summary>

######################################
## <summary>
##	Execute asterisk in the asterisk domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed to transition.
##	</summary>
## </param>
#
interface(`asterisk_domtrans',`
	gen_require(`
		type asterisk_t, asterisk_exec_t;
	')

	corecmd_search_bin($1)
	domtrans_pattern($1, asterisk_exec_t, asterisk_t)
')

######################################
## <summary>
##	Execute asterisk in the caller domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`asterisk_exec',`
	gen_require(`
		type asterisk_exec_t;
	')

	corecmd_search_bin($1)
	can_exec($1, asterisk_exec_t)
')

#####################################
## <summary>
##	Connect to asterisk over a unix domain.
##	stream socket.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`asterisk_stream_connect',`
	gen_require(`
		type asterisk_t, asterisk_var_run_t;
	')

	files_search_pids($1)
	stream_connect_pattern($1, asterisk_var_run_t, asterisk_var_run_t, asterisk_t)
')

#######################################
## <summary>
##	Set attributes of asterisk log
##	files and directories.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`asterisk_setattr_logs',`
	gen_require(`
		type asterisk_log_t;
	')

	setattr_files_pattern($1, asterisk_log_t, asterisk_log_t)
	setattr_dirs_pattern($1, asterisk_log_t, asterisk_log_t)
	logging_search_logs($1)
')

#######################################
## <summary>
##	Set attributes of the asterisk
##	PID content.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`asterisk_setattr_pid_files',`
	gen_require(`
		type asterisk_var_run_t;
	')

	setattr_files_pattern($1, asterisk_var_run_t, asterisk_var_run_t)
	setattr_dirs_pattern($1, asterisk_var_run_t, asterisk_var_run_t)
	files_search_pids($1)
')

########################################
## <summary>
##	All of the rules required to
##	administrate an asterisk environment.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
## <param name="role">
##	<summary>
##	Role allowed access.
##	</summary>
## </param>
## <rolecap/>
#
interface(`asterisk_admin',`
	gen_require(`
		type asterisk_t, asterisk_var_run_t, asterisk_spool_t;
		type asterisk_etc_t, asterisk_tmp_t, asterisk_log_t;
		type asterisk_var_lib_t, asterisk_initrc_exec_t;
	')

	allow $1 asterisk_t:process signal_perms;
	ps_process_pattern($1, asterisk_t)

	tunable_policy(`deny_ptrace',`',`
		allow $1 asterisk_t:process ptrace;
	')

	init_labeled_script_domtrans($1, asterisk_initrc_exec_t)
	domain_system_change_exemption($1)
	role_transition $2 asterisk_initrc_exec_t system_r;
	allow $2 system_r;

	files_list_tmp($1)
	admin_pattern($1, asterisk_tmp_t)

	files_list_etc($1)
	admin_pattern($1, asterisk_etc_t)

	logging_list_logs($1)
	admin_pattern($1, asterisk_log_t)

	files_list_spool($1)
	admin_pattern($1, asterisk_spool_t)

	files_list_var_lib($1)
	admin_pattern($1, asterisk_var_lib_t)

	files_list_pids($1)
	admin_pattern($1, asterisk_var_run_t)
')