## High-performance interface between an email server and content checkers. ######################################## ## ## Execute a domain transition to run amavis. ## ## ## ## Domain allowed to transition. ## ## # interface(`amavis_domtrans',` gen_require(` type amavis_t, amavis_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, amavis_exec_t, amavis_t) ') ######################################## ## ## Execute amavis server in the amavis domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`amavis_initrc_domtrans',` gen_require(` type amavis_initrc_exec_t; ') init_labeled_script_domtrans($1, amavis_initrc_exec_t) ') ######################################## ## ## Read amavis spool files. ## ## ## ## Domain allowed access. ## ## # interface(`amavis_read_spool_files',` gen_require(` type amavis_spool_t; ') files_search_spool($1) read_files_pattern($1, amavis_spool_t, amavis_spool_t) allow $1 amavis_spool_t:dir list_dir_perms; ') ######################################## ## ## Create, read, write, and delete ## amavis spool files. ## ## ## ## Domain allowed access. ## ## # interface(`amavis_manage_spool_files',` gen_require(` type amavis_spool_t; ') files_search_spool($1) manage_dirs_pattern($1, amavis_spool_t, amavis_spool_t) manage_files_pattern($1, amavis_spool_t, amavis_spool_t) ') ######################################## ## ## Create objects in the amavis spool directories ## with a private type. ## ## ## ## Domain allowed access. ## ## ## ## ## Private file type. ## ## ## ## ## Class of the object being created. ## ## ## ## ## The name of the object being created. ## ## # interface(`amavis_spool_filetrans',` gen_require(` type amavis_spool_t; ') files_search_spool($1) filetrans_pattern($1, amavis_spool_t, $2, $3, $4) ') ######################################## ## ## Search amavis lib directories. ## ## ## ## Domain allowed access. ## ## # interface(`amavis_search_lib',` gen_require(` type amavis_var_lib_t; ') allow $1 amavis_var_lib_t:dir search_dir_perms; files_search_var_lib($1) ') ######################################## ## ## Read amavis lib files. ## ## ## ## Domain allowed access. ## ## # interface(`amavis_read_lib_files',` gen_require(` type amavis_var_lib_t; ') read_files_pattern($1, amavis_var_lib_t, amavis_var_lib_t) allow $1 amavis_var_lib_t:dir list_dir_perms; files_search_var_lib($1) ') ######################################## ## ## Read and write amavis lib files. ## ## ## ## Domain allowed access. ## ## # interface(`amavis_rw_lib_files',` gen_require(` type amavis_var_lib_t; ') rw_files_pattern($1, amavis_var_lib_t, amavis_var_lib_t) allow $1 amavis_var_lib_t:dir list_dir_perms; files_search_var_lib($1) ') ######################################## ## ## Create, read, write, and delete ## amavis lib files. ## ## ## ## Domain allowed access. ## ## # interface(`amavis_manage_lib_files',` gen_require(` type amavis_var_lib_t; ') manage_files_pattern($1, amavis_var_lib_t, amavis_var_lib_t) files_search_var_lib($1) ') ######################################## ## ## Set attributes of amavis pid files. ## ## ## ## Domain allowed access. ## ## # interface(`amavis_setattr_pid_files',` gen_require(` type amavis_var_run_t; ') allow $1 amavis_var_run_t:file setattr_file_perms; files_search_pids($1) ') ######################################## ## ## Create amavis pid files. ## ## ## ## Domain allowed access. ## ## # interface(`amavis_create_pid_files',` gen_require(` type amavis_var_run_t; ') allow $1 amavis_var_run_t:dir add_entry_dir_perms; allow $1 amavis_var_run_t:file create_file_perms; files_search_pids($1) ') ######################################## ## ## All of the rules required to ## administrate an amavis environment. ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`amavis_admin',` gen_require(` type amavis_t, amavis_tmp_t, amavis_var_log_t; type amavis_spool_t, amavis_var_lib_t, amavis_var_run_t; type amavis_etc_t, amavis_quarantine_t, amavis_initrc_exec_t; ') allow $1 amavis_t:process signal_perms; ps_process_pattern($1, amavis_t) tunable_policy(`deny_ptrace',`',` allow $1 amavis_t:process ptrace; ') amavis_initrc_domtrans($1) domain_system_change_exemption($1) role_transition $2 amavis_initrc_exec_t system_r; allow $2 system_r; files_list_etc($1) admin_pattern($1, amavis_etc_t) admin_pattern($1, amavis_quarantine_t) files_list_spool($1) admin_pattern($1, amavis_spool_t) files_list_tmp($1) admin_pattern($1, amavis_tmp_t) files_list_var_lib($1) admin_pattern($1, amavis_var_lib_t) logging_list_logs($1) admin_pattern($1, amavis_var_log_t) files_list_pids($1) admin_pattern($1, amavis_var_run_t) ')