commit:     3f0e0524d443adce4e2c4ce3d460e2d35dc12ec5
Author:     Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
AuthorDate: Fri Jan  2 17:21:24 2015 +0000
Commit:     Sven Vermeulen <swift <AT> gentoo <DOT> org>
CommitDate: Fri Jan  2 17:21:24 2015 +0000
URL:        
http://sources.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=3f0e0524

Merge with upstream done, remove gentoo specifics

---
 policy/modules/contrib/courier.fc |  5 -----
 policy/modules/contrib/courier.if | 38 --------------------------------------
 policy/modules/contrib/courier.te | 19 +------------------
 3 files changed, 1 insertion(+), 61 deletions(-)

diff --git a/policy/modules/contrib/courier.fc 
b/policy/modules/contrib/courier.fc
index c0f288b..2f017a0 100644
--- a/policy/modules/contrib/courier.fc
+++ b/policy/modules/contrib/courier.fc
@@ -30,8 +30,3 @@
 
 /var/spool/authdaemon(/.*)?    
gen_context(system_u:object_r:courier_spool_t,s0)
 /var/spool/courier(/.*)?       
gen_context(system_u:object_r:courier_spool_t,s0)
-
-ifdef(`distro_gentoo',`
-# Default location for authdaemon socket, should be /var/run imo but meh
-/var/lib/courier/authdaemon(/.*)?      
gen_context(system_u:object_r:courier_var_run_t,s0)
-')

diff --git a/policy/modules/contrib/courier.if 
b/policy/modules/contrib/courier.if
index 0705659..10f820f 100644
--- a/policy/modules/contrib/courier.if
+++ b/policy/modules/contrib/courier.if
@@ -188,41 +188,3 @@ interface(`courier_rw_spool_pipes',`
        files_search_var($1)
        allow $1 courier_spool_t:fifo_file rw_fifo_file_perms;
 ')
-
-########################################
-## <summary>
-##     Allow read/write operations on an inherited stream socket
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-## <rolecap/>
-#
-interface(`courier_authdaemon_rw_inherited_stream_sockets',`
-       gen_require(`
-               type courier_authdaemon_t;
-       ')
-       allow $1 courier_authdaemon_t:unix_stream_socket { read write };
-')
-
-
-########################################
-## <summary>
-##     Connect to Authdaemon using a unix domain stream socket.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-## <rolecap/>
-#
-interface(`courier_authdaemon_stream_connect',`
-       gen_require(`
-               type courier_authdaemon_t, courier_var_run_t;
-       ')
-
-       stream_connect_pattern($1, courier_var_run_t, courier_var_run_t, 
courier_authdaemon_t)
-')

diff --git a/policy/modules/contrib/courier.te 
b/policy/modules/contrib/courier.te
index 2171e04..dd23992 100644
--- a/policy/modules/contrib/courier.te
+++ b/policy/modules/contrib/courier.te
@@ -194,23 +194,6 @@ optional_policy(`
 ifdef(`distro_gentoo',`
        ########################################
        #
-       # Courier imap/pop daemon policy
-       #
-
-       # Switch after succesfull authentication (bug 534030)
-       allow courier_pop_t self:capability { setuid setgid };
-
-       # Executes script /usr/lib64/courier-imap/courier-imapd.indirect after 
authentication and to start user session (bug 534030)
-       corecmd_exec_shell(courier_pop_t)
-
-       # Locate authdaemon socket and communicate with authdaemon (bug 534030)
-       stream_connect_pattern(courier_pop_t, courier_var_lib_t, 
courier_var_run_t, courier_authdaemon_t)
-
-       # Manage maildir of users (bug 534030)
-       mta_manage_mail_home_rw_content(courier_pop_t)
-
-       ########################################
-       #
        # Courier tcpd daemon policy
        #
 
@@ -223,6 +206,6 @@ ifdef(`distro_gentoo',`
        #
 
        # Grant authdaemon getattr rights on security_t so that it can check if 
SELinux is enabled (needed through pam support) (bug 534030)
-       # selinux_getattr_fs(courier_authdaemon_t)
+       # Handled through pam use
        auth_use_pam(courier_authdaemon_t)
 ')

Reply via email to