aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'policy/modules/system/ipsec.te')
-rw-r--r--policy/modules/system/ipsec.te44
1 files changed, 22 insertions, 22 deletions
diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te
index 97411bc9..968788c7 100644
--- a/policy/modules/system/ipsec.te
+++ b/policy/modules/system/ipsec.te
@@ -42,8 +42,8 @@ type ipsec_unit_t;
init_unit_file(ipsec_unit_t)
# type for runtime files, including pluto.ctl
-type ipsec_var_run_t;
-files_pid_file(ipsec_var_run_t)
+type ipsec_runtime_t alias ipsec_var_run_t;
+files_pid_file(ipsec_runtime_t)
type ipsec_mgmt_t;
type ipsec_mgmt_exec_t;
@@ -54,8 +54,8 @@ role system_r types ipsec_mgmt_t;
type ipsec_mgmt_lock_t;
files_lock_file(ipsec_mgmt_lock_t)
-type ipsec_mgmt_var_run_t;
-files_pid_file(ipsec_mgmt_var_run_t)
+type ipsec_mgmt_runtime_t alias ipsec_mgmt_var_run_t;
+files_pid_file(ipsec_mgmt_runtime_t)
type ipsec_supervisor_t;
type ipsec_supervisor_exec_t;
@@ -104,10 +104,10 @@ manage_dirs_pattern(ipsec_t, ipsec_tmp_t, ipsec_tmp_t)
manage_files_pattern(ipsec_t, ipsec_tmp_t, ipsec_tmp_t)
files_tmp_filetrans(ipsec_t, ipsec_tmp_t, { dir file })
-manage_dirs_pattern(ipsec_t, ipsec_var_run_t, ipsec_var_run_t)
-manage_files_pattern(ipsec_t, ipsec_var_run_t, ipsec_var_run_t)
-manage_sock_files_pattern(ipsec_t, ipsec_var_run_t, ipsec_var_run_t)
-files_pid_filetrans(ipsec_t, ipsec_var_run_t, { dir file sock_file })
+manage_dirs_pattern(ipsec_t, ipsec_runtime_t, ipsec_runtime_t)
+manage_files_pattern(ipsec_t, ipsec_runtime_t, ipsec_runtime_t)
+manage_sock_files_pattern(ipsec_t, ipsec_runtime_t, ipsec_runtime_t)
+files_pid_filetrans(ipsec_t, ipsec_runtime_t, { dir file sock_file })
can_exec(ipsec_t, ipsec_mgmt_exec_t)
@@ -231,20 +231,20 @@ manage_dirs_pattern(ipsec_mgmt_t, ipsec_tmp_t, ipsec_tmp_t)
manage_files_pattern(ipsec_mgmt_t, ipsec_tmp_t, ipsec_tmp_t)
files_tmp_filetrans(ipsec_mgmt_t, ipsec_tmp_t, { dir file })
-allow ipsec_mgmt_t ipsec_mgmt_var_run_t:file manage_file_perms;
-manage_files_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t)
-manage_lnk_files_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t)
-files_pid_filetrans(ipsec_mgmt_t, ipsec_mgmt_var_run_t, file)
+allow ipsec_mgmt_t ipsec_mgmt_runtime_t:file manage_file_perms;
+manage_files_pattern(ipsec_mgmt_t, ipsec_runtime_t, ipsec_runtime_t)
+manage_lnk_files_pattern(ipsec_mgmt_t, ipsec_runtime_t, ipsec_runtime_t)
+files_pid_filetrans(ipsec_mgmt_t, ipsec_mgmt_runtime_t, file)
-allow ipsec_mgmt_t ipsec_var_run_t:sock_file manage_sock_file_perms;
-files_pid_filetrans(ipsec_mgmt_t, ipsec_var_run_t, sock_file)
+allow ipsec_mgmt_t ipsec_runtime_t:sock_file manage_sock_file_perms;
+files_pid_filetrans(ipsec_mgmt_t, ipsec_runtime_t, sock_file)
# logger, running in ipsec_mgmt_t needs to use sockets
allow ipsec_mgmt_t self:unix_dgram_socket { create connect write };
allow ipsec_mgmt_t ipsec_t:unix_dgram_socket { create connect write };
# whack needs to connect to pluto
-stream_connect_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t, ipsec_t)
+stream_connect_pattern(ipsec_mgmt_t, ipsec_runtime_t, ipsec_runtime_t, ipsec_t)
can_exec(ipsec_mgmt_t, ipsec_mgmt_exec_t)
allow ipsec_mgmt_t ipsec_mgmt_exec_t:lnk_file read;
@@ -366,9 +366,9 @@ can_exec(racoon_t, racoon_exec_t)
can_exec(racoon_t, setkey_exec_t)
# manage pid file
-manage_files_pattern(racoon_t, ipsec_var_run_t, ipsec_var_run_t)
-manage_sock_files_pattern(racoon_t, ipsec_var_run_t, ipsec_var_run_t)
-files_pid_filetrans(racoon_t, ipsec_var_run_t, file)
+manage_files_pattern(racoon_t, ipsec_runtime_t, ipsec_runtime_t)
+manage_sock_files_pattern(racoon_t, ipsec_runtime_t, ipsec_runtime_t)
+files_pid_filetrans(racoon_t, ipsec_runtime_t, file)
allow racoon_t ipsec_conf_file_t:dir list_dir_perms;
read_files_pattern(racoon_t, ipsec_conf_file_t, ipsec_conf_file_t)
@@ -478,10 +478,10 @@ manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t)
allow ipsec_supervisor_t ipsec_t:unix_stream_socket { connectto };
allow ipsec_supervisor_t ipsec_t:process { signal signull };
-allow ipsec_supervisor_t ipsec_var_run_t:sock_file { rw_sock_file_perms unlink };
-manage_dirs_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t)
-manage_files_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t)
-files_pid_filetrans(ipsec_supervisor_t, ipsec_var_run_t, { dir file sock_file })
+allow ipsec_supervisor_t ipsec_runtime_t:sock_file { rw_sock_file_perms unlink };
+manage_dirs_pattern(ipsec_supervisor_t, ipsec_runtime_t, ipsec_runtime_t)
+manage_files_pattern(ipsec_supervisor_t, ipsec_runtime_t, ipsec_runtime_t)
+files_pid_filetrans(ipsec_supervisor_t, ipsec_runtime_t, { dir file sock_file })
domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t)