commit: 3f0e0524d443adce4e2c4ce3d460e2d35dc12ec5
Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
AuthorDate: Fri Jan 2 17:21:24 2015 +0000
Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org>
CommitDate: Fri Jan 2 17:21:24 2015 +0000
URL:
http://sources.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=3f0e0524
Merge with upstream done, remove gentoo specifics
---
policy/modules/contrib/courier.fc | 5 -----
policy/modules/contrib/courier.if | 38 --------------------------------------
policy/modules/contrib/courier.te | 19 +------------------
3 files changed, 1 insertion(+), 61 deletions(-)
diff --git a/policy/modules/contrib/courier.fc
b/policy/modules/contrib/courier.fc
index c0f288b..2f017a0 100644
--- a/policy/modules/contrib/courier.fc
+++ b/policy/modules/contrib/courier.fc
@@ -30,8 +30,3 @@
/var/spool/authdaemon(/.*)?
gen_context(system_u:object_r:courier_spool_t,s0)
/var/spool/courier(/.*)?
gen_context(system_u:object_r:courier_spool_t,s0)
-
-ifdef(`distro_gentoo',`
-# Default location for authdaemon socket, should be /var/run imo but meh
-/var/lib/courier/authdaemon(/.*)?
gen_context(system_u:object_r:courier_var_run_t,s0)
-')
diff --git a/policy/modules/contrib/courier.if
b/policy/modules/contrib/courier.if
index 0705659..10f820f 100644
--- a/policy/modules/contrib/courier.if
+++ b/policy/modules/contrib/courier.if
@@ -188,41 +188,3 @@ interface(`courier_rw_spool_pipes',`
files_search_var($1)
allow $1 courier_spool_t:fifo_file rw_fifo_file_perms;
')
-
-########################################
-## <summary>
-## Allow read/write operations on an inherited stream socket
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-## <rolecap/>
-#
-interface(`courier_authdaemon_rw_inherited_stream_sockets',`
- gen_require(`
- type courier_authdaemon_t;
- ')
- allow $1 courier_authdaemon_t:unix_stream_socket { read write };
-')
-
-
-########################################
-## <summary>
-## Connect to Authdaemon using a unix domain stream socket.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-## <rolecap/>
-#
-interface(`courier_authdaemon_stream_connect',`
- gen_require(`
- type courier_authdaemon_t, courier_var_run_t;
- ')
-
- stream_connect_pattern($1, courier_var_run_t, courier_var_run_t,
courier_authdaemon_t)
-')
diff --git a/policy/modules/contrib/courier.te
b/policy/modules/contrib/courier.te
index 2171e04..dd23992 100644
--- a/policy/modules/contrib/courier.te
+++ b/policy/modules/contrib/courier.te
@@ -194,23 +194,6 @@ optional_policy(`
ifdef(`distro_gentoo',`
########################################
#
- # Courier imap/pop daemon policy
- #
-
- # Switch after succesfull authentication (bug 534030)
- allow courier_pop_t self:capability { setuid setgid };
-
- # Executes script /usr/lib64/courier-imap/courier-imapd.indirect after
authentication and to start user session (bug 534030)
- corecmd_exec_shell(courier_pop_t)
-
- # Locate authdaemon socket and communicate with authdaemon (bug 534030)
- stream_connect_pattern(courier_pop_t, courier_var_lib_t,
courier_var_run_t, courier_authdaemon_t)
-
- # Manage maildir of users (bug 534030)
- mta_manage_mail_home_rw_content(courier_pop_t)
-
- ########################################
- #
# Courier tcpd daemon policy
#
@@ -223,6 +206,6 @@ ifdef(`distro_gentoo',`
#
# Grant authdaemon getattr rights on security_t so that it can check if
SELinux is enabled (needed through pam support) (bug 534030)
- # selinux_getattr_fs(courier_authdaemon_t)
+ # Handled through pam use
auth_use_pam(courier_authdaemon_t)
')