summaryrefslogtreecommitdiff
path: root/data
diff options
authorMaciej Borzecki <maciej.zenon.borzecki@canonical.com>2019-08-13 13:59:30 +0200
committerMaciej Borzecki <maciej.zenon.borzecki@canonical.com>2019-08-13 13:59:30 +0200
commit27e0c754b066a80abacc393490a7764c1dd4833c (patch)
tree48e224e4e823cba01527d2a988f99cb9dbd6ccc0 /data
parent8874385599828198fbb2e4cddd80540082c7ef14 (diff)
data/selinux: tweak formatting of gen_require() blocks
Tweak the formatting of gen_require() blocks to be in line with refpolicy. Signed-off-by: Maciej Borzecki <maciej.zenon.borzecki@canonical.com>
Diffstat (limited to 'data')
-rw-r--r--data/selinux/snappy.te66
1 files changed, 50 insertions, 16 deletions
diff --git a/data/selinux/snappy.te b/data/selinux/snappy.te
index 7103ba329f..fce9b54d58 100644
--- a/data/selinux/snappy.te
+++ b/data/selinux/snappy.te
@@ -100,7 +100,10 @@ permissive snappy_t;
# Allow transitions from init_t to snappy for sockets
# init_named_socket_activation() is not supported by core policy in RHEL7
-gen_require(` type init_t; type var_run_t; ')
+gen_require(`
+ type init_t;
+ type var_run_t;
+')
filetrans_pattern(init_t, var_run_t, snappy_var_run_t, sock_file, "snapd.socket")
filetrans_pattern(init_t, var_run_t, snappy_var_run_t, sock_file, "snapd-snap.socket")
@@ -108,7 +111,9 @@ filetrans_pattern(init_t, var_run_t, snappy_var_run_t, sock_file, "snapd-snap.so
allow init_t snappy_var_lib_t:dir read;
# Allow snapd to read procfs
-gen_require(` type proc_t; ')
+gen_require(`
+ type proc_t;
+')
allow snappy_t proc_t:file { getattr open read };
# Allow snapd to read sysfs
@@ -116,7 +121,9 @@ dev_read_sysfs(snappy_t)
dev_search_sysfs(snappy_t)
# This silences a read AVC denial event on the lost+found directory.
-gen_require(` type lost_found_t; ')
+gen_require(`
+ type lost_found_t;
+')
dontaudit snappy_t lost_found_t:dir read;
# Allow snapd to read SSL cert store
@@ -134,7 +141,9 @@ userdom_list_user_home_dirs(snappy_t)
sysnet_dns_name_resolve(snappy_t)
# When managed by NetworkManager, DNS config is in its rundata
-gen_require(` type NetworkManager_var_run_t; ')
+gen_require(`
+ type NetworkManager_var_run_t;
+')
allow snappy_t NetworkManager_var_run_t:dir search;
# Allow snapd to read sysctl files
@@ -196,17 +205,23 @@ miscfiles_read_localization(snappy_t)
read_files_pattern(snappy_t, snappy_var_run_t, snappy_var_run_t)
getattr_files_pattern(snappy_t, snappy_var_run_t, snappy_var_run_t)
-gen_require(` type user_tmp_t; ')
+gen_require(`
+ type user_tmp_t;
+')
allow snappy_t user_tmp_t:dir { read };
# Allow snapd to clean up /run/user sockets
userdom_manage_tmp_dirs(snappy_t)
userdom_manage_tmp_sockets(snappy_t)
-gen_require(` type systemd_unit_file_t; ')
+gen_require(`
+ type systemd_unit_file_t;
+')
allow snappy_t systemd_unit_file_t:dir { rmdir };
-gen_require(` type home_root_t; ')
+gen_require(`
+ type home_root_t;
+')
allow snappy_t home_root_t:dir { read };
# Allow snapd to manage its persistent data
@@ -233,7 +248,9 @@ admin_pattern(snappy_t, snappy_tmp_t)
files_tmp_filetrans(snappy_t, snappy_tmp_t, { file dir })
# snap command completions, symlinks going back to snap mount directory
-gen_require(` type usr_t; ')
+gen_require(`
+ type usr_t;
+')
allow snappy_t usr_t:dir { write remove_name add_name };
allow snappy_t usr_t:lnk_file { create unlink };
@@ -263,7 +280,9 @@ allow snappy_t self:unix_dgram_socket create_socket_perms;
allow snappy_t self:capability2 block_suspend;
# snapd needs to check for ipv6 support
-gen_require(` type node_t; ')
+gen_require(`
+ type node_t;
+')
allow snappy_t node_t:tcp_socket node_bind;
corenet_all_recvfrom_unlabeled(snappy_t)
@@ -363,12 +382,17 @@ admin_pattern(snappy_mount_t, snappy_var_run_t)
files_pid_filetrans(snappy_mount_t, snappy_var_run_t, {file dir})
# Allow snap-{update,discard}-ns to manage mounts
-gen_require(` type fs_t; type mount_var_run_t; ')
+gen_require(`
+ type fs_t;
+ type mount_var_run_t;
+')
allow snappy_mount_t fs_t:filesystem { mount unmount };
allow snappy_mount_t mount_var_run_t:dir { add_name remove_name write search };
allow snappy_mount_t mount_var_run_t:file { create getattr setattr open read write rename unlink lock };
# for discard-ns, because a preserved mount ns is a bind-mounted /proc/<pid>/ns/mnt
-gen_require(` type proc_t; ')
+gen_require(`
+ type proc_t;
+')
allow snappy_mount_t proc_t:filesystem { getattr unmount };
allow snappy_mount_t self:capability { sys_chroot sys_admin };
@@ -395,7 +419,9 @@ fs_manage_cgroup_files(snappy_mount_t)
fs_read_tmpfs_symlinks(snappy_mount_t)
# because /run/snapd/ns/*.mnt gets a label of the process context
-gen_require(` type unconfined_t; ')
+gen_require(`
+ type unconfined_t;
+')
allow snappy_mount_t unconfined_t:file { open read getattr };
allow snappy_mount_t snappy_confine_t:file { open read getattr };
@@ -520,7 +546,9 @@ can_exec(snappy_confine_t, snappy_snap_t)
read_files_pattern(snappy_confine_t, snappy_snap_t, snappy_snap_t)
# and allow transition by snap-confine
allow snappy_confine_t snappy_unconfined_snap_t:process { noatsecure rlimitinh siginh transition dyntransition };
-gen_require(` type unconfined_service_t; ')
+gen_require(`
+ type unconfined_service_t;
+')
allow snappy_confine_t unconfined_service_t:process { noatsecure rlimitinh siginh transition dyntransition };
# for classic snaps, snap-confine executes snap-exec from the host (labeled as
@@ -610,7 +638,9 @@ domain_entry_file(snappy_unconfined_snap_t, snappy_snap_t)
domain_entry_file(unconfined_service_t, snappy_snap_t)
# for journald
-gen_require(` type syslogd_t; ')
+gen_require(`
+ type syslogd_t;
+')
allow syslogd_t snappy_unconfined_snap_t:dir search_dir_perms;
allow snappy_unconfined_snap_t self:process { fork getsched };
@@ -633,7 +663,9 @@ allow init_t snappy_unconfined_snap_t:process { sigkill signull signal };
# snap tools can be invoked by the regular user, make sure that things get
# proper labels
-gen_require(` type unconfined_t; ')
+gen_require(`
+ type unconfined_t;
+')
userdom_user_home_dir_filetrans(unconfined_t, snappy_home_t, dir, "snap")
userdom_admin_home_dir_filetrans(unconfined_t, snappy_home_t, dir, "snap")
files_pid_filetrans(unconfined_t, snappy_var_run_t, dir, "snapd")
@@ -659,6 +691,8 @@ allow init_t snappy_snap_t:filesystem remount;
#
# extra policy for mandb_t
#
-gen_require(` type mandb_t; ')
+gen_require(`
+ type mandb_t;
+')
# mandb cache update scans whe whole directory tree looking for 'man'
allow mandb_t snappy_var_lib_t:dir search_dir_perms;