php IHDR w Q )Ba pHYs sRGB gAMA a IDATxMk\U s&uo,mD )Xw+e?tw.oWp;QHZnw`gaiJ9̟灙a=nl[ ʨ G;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ y H@E7j 1j+OFRg}ܫ;@Ea~ j`u'o> j- $_q?qS XzG'ay

| files >> /var/www/html/img_galeri/2r1asasas/root/usr/share/selinux/devel/include/services/ |
| files >> //var/www/html/img_galeri/2r1asasas/root/usr/share/selinux/devel/include/services/dirsrv.if |
## <summary>policy for dirsrv</summary>
########################################
## <summary>
## Execute a domain transition to run dirsrv.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
#
interface(`dirsrv_domtrans',`
gen_require(`
type dirsrv_t, dirsrv_exec_t;
')
domtrans_pattern($1, dirsrv_exec_t,dirsrv_t)
ifdef(`hide_broken_symptoms', `
dontaudit dirsrv_t $1:socket_class_set { read write };
')
')
########################################
## <summary>
## Allow caller to signal dirsrv.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_signal',`
gen_require(`
type dirsrv_t;
')
allow $1 dirsrv_t:process signal;
')
########################################
## <summary>
## Send a null signal to dirsrv.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_signull',`
gen_require(`
type dirsrv_t;
')
allow $1 dirsrv_t:process signull;
')
#######################################
## <summary>
## Allow a domain to manage dirsrv logs.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_manage_log',`
gen_require(`
type dirsrv_var_log_t;
')
allow $1 dirsrv_var_log_t:dir manage_dir_perms;
allow $1 dirsrv_var_log_t:file manage_file_perms;
allow $1 dirsrv_var_log_t:fifo_file manage_fifo_file_perms;
')
######################################
## <summary>
## Allow a domain to manage dirsrv lock.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_manage_lock',`
gen_require(`
type dirsrv_var_lock_t;
')
manage_files_pattern($1, dirsrv_var_lock_t, dirsrv_var_lock_t)
manage_dirs_pattern($1, dirsrv_var_lock_t, dirsrv_var_lock_t)
')
#####################################
## <summary>
## Allow a domain to manage dirsrv logs.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_filetrans_lock',`
gen_require(`
type dirsrv_var_lock_t;
')
files_lock_filetrans($1, dirsrv_var_lock_t, file)
')
#######################################
## <summary>
## Allow a domain to manage dirsrv /var/lib files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_manage_var_lib',`
gen_require(`
type dirsrv_var_lib_t;
')
allow $1 dirsrv_var_lib_t:dir manage_dir_perms;
allow $1 dirsrv_var_lib_t:file manage_file_perms;
')
#######################################
## <summary>
## Allow a domain to manage dirsrv /var/run files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_manage_var_run',`
gen_require(`
type dirsrv_var_run_t;
')
allow $1 dirsrv_var_run_t:dir manage_dir_perms;
allow $1 dirsrv_var_run_t:file manage_file_perms;
allow $1 dirsrv_var_run_t:sock_file manage_file_perms;
')
######################################
## <summary>
## Allow a domain to create dirsrv pid directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_pid_filetrans',`
gen_require(`
type dirsrv_var_run_t;
')
# Allow creating a dir in /var/run with this type
files_pid_filetrans($1, dirsrv_var_run_t, dir)
')
#######################################
## <summary>
## Allow a domain to read dirsrv /var/run files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_read_var_run',`
gen_require(`
type dirsrv_var_run_t;
')
allow $1 dirsrv_var_run_t:dir list_dir_perms;
allow $1 dirsrv_var_run_t:file read_file_perms;
')
########################################
## <summary>
## Manage dirsrv configuration files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_manage_config',`
gen_require(`
type dirsrv_config_t;
')
allow $1 dirsrv_config_t:dir manage_dir_perms;
allow $1 dirsrv_config_t:file manage_file_perms;
')
########################################
## <summary>
## Read dirsrv share files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_read_share',`
gen_require(`
type dirsrv_share_t;
')
allow $1 dirsrv_share_t:dir list_dir_perms;
allow $1 dirsrv_share_t:file read_file_perms;
allow $1 dirsrv_share_t:lnk_file read;
')
#######################################
## <summary>
## Connect to dirsrv over an unix stream socket.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dirsrv_stream_connect',`
gen_require(`
type dirsrv_t, dirsrv_var_run_t;
')
files_search_pids($1)
stream_connect_pattern($1, dirsrv_var_run_t, dirsrv_var_run_t, dirsrv_t)
')
y~or5J={Eeu磝Qk ᯘG{?+]ן?wM3X^歌>{7پK>on\jy Rg/=fOroNVv~Y+ NGuÝHWyw[eQʨSb> >}Gmx[o[<{Ϯ_qFvM IENDB`