summaryrefslogtreecommitdiff
path: root/qpid/cpp/etc/selinux/qpiddevel.te
blob: 10c5dfc8804d9b29c4f9627362cbf408e84e1d88 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
#
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements.  See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership.  The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not use this file except in compliance
# with the License.  You may obtain a copy of the License at
#
#   http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,
# software distributed under the License is distributed on an
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
# KIND, either express or implied.  See the License for the
# specific language governing permissions and limitations
# under the License.
#

# selinux policy for qpid developers.
# If you have configured a qpid source tree with cluster support, you will need
# this policy to run the make check tests with with selinux in enforcing mode.
#
# To build the qpid.pp module in this directory do:
#   sudo make -f /usr/share/selinux/devel/Makefile
# To install the compiled qpiddevel.pp
#   sudo semodule -i qpiddevel.pp

policy_module(qpiddevel, 1.1)

gen_require(`
	type unconfined_t;
	type unconfined_execmem_t;
	type ccs_t;
	class capability sys_admin;
	class sem { write unix_read unix_write associate read destroy };
	class shm { unix_read write unix_write associate read destroy };
')

allow ccs_t self:capability sys_admin;
allow ccs_t unconfined_t:sem { write unix_read unix_write associate read destroy };
allow ccs_t unconfined_t:shm { unix_read write unix_write associate read destroy };

optional_policy(`
	gen_require(`
		type aisexec_t;
	')
	allow aisexec_t self:capability sys_admin;
	allow aisexec_t unconfined_t:sem { read write unix_read unix_write associate destroy };
	allow aisexec_t unconfined_t:shm { read write unix_read unix_write associate destroy };
	allow aisexec_t unconfined_execmem_t:sem { write unix_read unix_write associate read destroy };
	allow aisexec_t unconfined_execmem_t:shm { write unix_read unix_write associate read destroy };

')