[selinux-policy: 2910/3172] Fix gnome_setattr_config_home Allow exec of sandbox_file_type by calling apps Fix typos
Daniel J Walsh
dwalsh at fedoraproject.org
Thu Oct 7 23:19:05 UTC 2010
commit 5ef740e54bacfb4d99d89be967dde55d376ecfd3
Author: Dan Walsh <dwalsh at redhat.com>
Date: Mon Sep 13 14:47:02 2010 -0400
Fix gnome_setattr_config_home
Allow exec of sandbox_file_type by calling apps
Fix typos
policy/modules/apps/gnome.if | 38 +++++++++++++++++-----------------
policy/modules/apps/mozilla.te | 2 +-
policy/modules/apps/pulseaudio.if | 2 +
policy/modules/apps/sandbox.if | 1 +
policy/modules/apps/telepathy.te | 6 +---
policy/modules/services/kerberos.te | 2 +-
policy/modules/services/passenger.fc | 2 +-
7 files changed, 27 insertions(+), 26 deletions(-)
---
diff --git a/policy/modules/apps/gnome.if b/policy/modules/apps/gnome.if
index db1a0d0..d3b8cc8 100644
--- a/policy/modules/apps/gnome.if
+++ b/policy/modules/apps/gnome.if
@@ -258,25 +258,6 @@ template(`gnome_read_config',`
########################################
## <summary>
-## Set attributes of Gnome config dirs.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`gnome_setattr_config_dirs',`
- gen_require(`
- type gnome_home_t;
- ')
-
- setattr_dirs_pattern($1, gnome_home_t, gnome_home_t)
- files_search_home($1)
-')
-
-########################################
-## <summary>
## Create objects in a Gnome gconf home directory
## with an automatic type transition to
## a specified private type.
@@ -508,6 +489,25 @@ template(`gnome_list_home_config',`
########################################
## <summary>
+## Set attributes of gnome homedir content (.config)
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+template(`gnome_setattr_home_config',`
+ gen_require(`
+ type config_home_t;
+ ')
+
+ setattr_dirs_pattern($1, config_home_t, config_home_t)
+ userdom_search_user_home_dirs($1)
+')
+
+########################################
+## <summary>
## read gnome homedir content (.config)
## </summary>
## <param name="domain">
diff --git a/policy/modules/apps/mozilla.te b/policy/modules/apps/mozilla.te
index 3018e86..7c260fa 100644
--- a/policy/modules/apps/mozilla.te
+++ b/policy/modules/apps/mozilla.te
@@ -358,7 +358,7 @@ optional_policy(`
optional_policy(`
gnome_manage_home_config(mozilla_plugin_t)
- gnome_setattr_config_dirs(mozilla_plugin_t)
+ gnome_setattr_home_config(mozilla_plugin_t)
')
optional_policy(`
diff --git a/policy/modules/apps/pulseaudio.if b/policy/modules/apps/pulseaudio.if
index 3b0d3be..15fef11 100644
--- a/policy/modules/apps/pulseaudio.if
+++ b/policy/modules/apps/pulseaudio.if
@@ -219,6 +219,7 @@ interface(`pulseaudio_read_home_files',`
userdom_search_user_home_dirs($1)
read_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
+ read_lnk_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
')
########################################
@@ -237,6 +238,7 @@ interface(`pulseaudio_rw_home_files',`
')
rw_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
+ read_lnk_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
userdom_search_user_home_dirs($1)
')
diff --git a/policy/modules/apps/sandbox.if b/policy/modules/apps/sandbox.if
index c20d303..5dd356f 100644
--- a/policy/modules/apps/sandbox.if
+++ b/policy/modules/apps/sandbox.if
@@ -54,6 +54,7 @@ interface(`sandbox_transition',`
allow $1 sandbox_tmpfs_type:file manage_file_perms;
dontaudit $1 sandbox_tmpfs_type:file manage_file_perms;
+ can_exec($1, sandbox_file_type)
manage_files_pattern($1, sandbox_file_type, sandbox_file_type);
manage_dirs_pattern($1, sandbox_file_type, sandbox_file_type);
manage_sock_files_pattern($1, sandbox_file_type, sandbox_file_type);
diff --git a/policy/modules/apps/telepathy.te b/policy/modules/apps/telepathy.te
index 779a54b..aa34be4 100644
--- a/policy/modules/apps/telepathy.te
+++ b/policy/modules/apps/telepathy.te
@@ -70,8 +70,6 @@ dev_read_urand(telepathy_msn_t)
files_read_etc_files(telepathy_msn_t)
files_read_usr_files(telepathy_msn_t)
-kernel_read_system_state(telepathy_msn_t)
-
auth_use_nsswitch(telepathy_msn_t)
libs_exec_ldconfig(telepathy_msn_t)
@@ -263,8 +261,6 @@ dev_read_urand(telepathy_sunshine_t)
files_read_etc_files(telepathy_sunshine_t)
files_read_usr_files(telepathy_sunshine_t)
-kernel_read_system_state(telepathy_sunshine_t)
-
optional_policy(`
xserver_read_xdm_pid(telepathy_sunshine_t)
xserver_stream_connect(telepathy_sunshine_t)
@@ -290,6 +286,8 @@ corenet_tcp_sendrecv_generic_if(telepathy_domain)
corenet_tcp_sendrecv_generic_node(telepathy_domain)
corenet_udp_bind_generic_node(telepathy_domain)
+kernel_read_system_state(telepathy_domain)
+
fs_search_auto_mountpoints(telepathy_domain)
miscfiles_read_localization(telepathy_domain)
diff --git a/policy/modules/services/kerberos.te b/policy/modules/services/kerberos.te
index ca4bea5..225e33f 100644
--- a/policy/modules/services/kerberos.te
+++ b/policy/modules/services/kerberos.te
@@ -252,7 +252,7 @@ selinux_validate_context(krb5kdc_t)
logging_send_syslog_msg(krb5kdc_t)
-miscfiles_read_geniric_certs(krb5kdc_t)
+miscfiles_read_generic_certs(krb5kdc_t)
miscfiles_read_localization(krb5kdc_t)
seutil_read_file_contexts(krb5kdc_t)
diff --git a/policy/modules/services/passenger.fc b/policy/modules/services/passenger.fc
index e75adfa..8d00972 100644
--- a/policy/modules/services/passenger.fc
+++ b/policy/modules/services/passenger.fc
@@ -3,4 +3,4 @@
/var/lib/passenger(/.*)? gen_context(system_u:object_r:passenger_var_lib_t,s0)
-/var/run/passenger(/.*)? gen_context(system_u:object_r:passenger_state_t,s0)
+/var/run/passenger(/.*)? gen_context(system_u:object_r:passenger_var_run_t,s0)
More information about the scm-commits
mailing list