## Collection of tools for managing UNIX services ## ##

## Policy for DJB's daemontools ##

##
######################################## ## ## An ipc channel between the supervised domain and svc_start_t ## ## ## ## Domain allowed access. ## ## # interface(`daemontools_ipc_domain',` gen_require(` type svc_start_t; ') allow $1 svc_start_t:process sigchld; allow $1 svc_start_t:fd use; allow $1 svc_start_t:fifo_file { read write getattr }; allow svc_start_t $1:process signal; ') ######################################## ## ## Define a specified domain as a supervised service. ## ## ## ## Domain allowed access. ## ## ## ## ## The type associated with the process program. ## ## # interface(`daemontools_service_domain',` gen_require(` type svc_run_t; ') domain_auto_trans(svc_run_t, $2, $1) daemontools_ipc_domain($1) allow svc_run_t $1:process signal; allow $1 svc_run_t:fd use; ') ######################################## ## ## Execute in the svc_start_t domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`daemontools_domtrans_start',` gen_require(` type svc_start_t, svc_start_exec_t; ') domtrans_pattern($1, svc_start_exec_t, svc_start_t) ') ###################################### ## ## Execute svc_start in the svc_start domain, and ## allow the specified role the svc_start domain. ## ## ## ## Domain allowed access. ## ## ## ## ## The role to be allowed the svc_start domain. ## ## ## # interface(`daemonstools_run_start',` gen_require(` type svc_start_t; ') daemontools_domtrans_start($1) role $2 types svc_start_t; ') ######################################## ## ## Execute in the svc_run_t domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`daemontools_domtrans_run',` gen_require(` type svc_run_t, svc_run_exec_t; ') domtrans_pattern($1, svc_run_exec_t, svc_run_t) ') ###################################### ## ## Send a SIGCHLD signal to svc_run domain. ## ## ## ## Domain allowed access. ## ## # interface(`daemontools_sigchld_run',` gen_require(` type svc_run_t; ') allow $1 svc_run_t:process sigchld; ') ######################################## ## ## Execute in the svc_multilog_t domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`daemontools_domtrans_multilog',` gen_require(` type svc_multilog_t, svc_multilog_exec_t; ') domtrans_pattern($1, svc_multilog_exec_t, svc_multilog_t) ') ###################################### ## ## Search svc_svc_t directory. ## ## ## ## Domain allowed access. ## ## # interface(`daemontools_search_svc_dir',` gen_require(` type svc_svc_t; ') allow $1 svc_svc_t:dir search_dir_perms; ') ######################################## ## ## Allow a domain to read svc_svc_t files. ## ## ## ## Domain allowed access. ## ## ## # interface(`daemontools_read_svc',` gen_require(` type svc_svc_t; ') allow $1 svc_svc_t:dir list_dir_perms; allow $1 svc_svc_t:file read_file_perms; ') ######################################## ## ## Allow a domain to create svc_svc_t files. ## ## ## ## Domain allowed access. ## ## ## # interface(`daemontools_manage_svc',` gen_require(` type svc_svc_t; ') allow $1 svc_svc_t:dir manage_dir_perms; allow $1 svc_svc_t:fifo_file manage_fifo_file_perms; allow $1 svc_svc_t:file manage_file_perms; allow $1 svc_svc_t:lnk_file { read create }; ')