1snapperd_selinux(8)         SELinux Policy snapperd        snapperd_selinux(8)
2
3
4

NAME

6       snapperd_selinux - Security Enhanced Linux Policy for the snapperd pro‐
7       cesses
8

DESCRIPTION

10       Security-Enhanced Linux secures the  snapperd  processes  via  flexible
11       mandatory access control.
12
13       The  snapperd  processes  execute with the snapperd_t SELinux type. You
14       can check if you have these processes running by executing the ps  com‐
15       mand with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep snapperd_t
20
21
22

ENTRYPOINTS

24       The snapperd_t SELinux type can be entered via the snapperd_exec_t file
25       type.
26
27       The default entrypoint paths for the snapperd_t domain are the  follow‐
28       ing:
29
30       /usr/sbin/snapperd, /usr/lib/snapper/systemd-helper
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       snapperd policy is very flexible allowing users to setup their snapperd
40       processes in as secure a method as possible.
41
42       The following process types are defined for snapperd:
43
44       snapperd_t
45
46       Note: semanage permissive -a snapperd_t can be used to make the process
47       type  snapperd_t permissive. SELinux does not deny access to permissive
48       process types, but the AVC (SELinux denials) messages are still  gener‐
49       ated.
50
51

BOOLEANS

53       SELinux  policy  is customizable based on least access required.  snap‐
54       perd policy is extremely flexible and has several booleans  that  allow
55       you  to manipulate the policy and run snapperd with the tightest access
56       possible.
57
58
59
60       If you want to allow users to resolve user passwd entries directly from
61       ldap  rather  then  using  a  sssd server, you must turn on the authlo‐
62       gin_nsswitch_use_ldap boolean. Disabled by default.
63
64       setsebool -P authlogin_nsswitch_use_ldap 1
65
66
67
68       If you want to allow all domains to execute in fips_mode, you must turn
69       on the fips_mode boolean. Enabled by default.
70
71       setsebool -P fips_mode 1
72
73
74
75       If  you  want  to allow confined applications to run with kerberos, you
76       must turn on the kerberos_enabled boolean. Enabled by default.
77
78       setsebool -P kerberos_enabled 1
79
80
81
82       If you want to allow system to run with  NIS,  you  must  turn  on  the
83       nis_enabled boolean. Disabled by default.
84
85       setsebool -P nis_enabled 1
86
87
88
89       If  you  want to allow confined applications to use nscd shared memory,
90       you must turn on the nscd_use_shm boolean. Enabled by default.
91
92       setsebool -P nscd_use_shm 1
93
94
95

MANAGED FILES

97       The SELinux process type snapperd_t can manage files labeled  with  the
98       following file types.  The paths listed are the default paths for these
99       file types.  Note the processes UID still need to have DAC permissions.
100
101       cluster_conf_t
102
103            /etc/cluster(/.*)?
104
105       cluster_var_lib_t
106
107            /var/lib/pcsd(/.*)?
108            /var/lib/cluster(/.*)?
109            /var/lib/openais(/.*)?
110            /var/lib/pengine(/.*)?
111            /var/lib/corosync(/.*)?
112            /usr/lib/heartbeat(/.*)?
113            /var/lib/heartbeat(/.*)?
114            /var/lib/pacemaker(/.*)?
115
116       cluster_var_run_t
117
118            /var/run/crm(/.*)?
119            /var/run/cman_.*
120            /var/run/rsctmp(/.*)?
121            /var/run/aisexec.*
122            /var/run/heartbeat(/.*)?
123            /var/run/corosync-qnetd(/.*)?
124            /var/run/corosync-qdevice(/.*)?
125            /var/run/corosync.pid
126            /var/run/cpglockd.pid
127            /var/run/rgmanager.pid
128            /var/run/cluster/rgmanager.sk
129
130       root_t
131
132            /sysroot/ostree/deploy/.*-atomic/deploy(/.*)?
133            /
134            /initrd
135
136       snapperd_conf_t
137
138            /etc/snapper(/.*)?
139            /etc/sysconfig/snapper
140
141       snapperd_data_t
142
143            /mnt/(.*/)?.snapshots(/.*)?
144            /.snapshots(/.*)?
145            /etc/.snapshots(/.*)?
146            /usr/.snapshots(/.*)?
147            /var/.snapshots(/.*)?
148            /home/(.*/)?.snapshots(/.*)?
149
150       snapperd_log_t
151
152            /var/log/snapper.log.*
153
154

FILE CONTEXTS

156       SELinux requires files to have an extended attribute to define the file
157       type.
158
159       You can see the context of a file using the -Z option to ls
160
161       Policy  governs  the  access  confined  processes  have to these files.
162       SELinux snapperd policy is very flexible allowing users to setup  their
163       snapperd processes in as secure a method as possible.
164
165       STANDARD FILE CONTEXT
166
167       SELinux  defines the file context types for the snapperd, if you wanted
168       to store files with these types in a diffent paths, you need to execute
169       the  semanage  command  to  sepecify  alternate  labeling  and then use
170       restorecon to put the labels on disk.
171
172       semanage fcontext -a -t snapperd_data_t '/srv/mysnapperd_content(/.*)?'
173       restorecon -R -v /srv/mysnapperd_content
174
175       Note: SELinux often uses regular expressions  to  specify  labels  that
176       match multiple files.
177
178       The following file types are defined for snapperd:
179
180
181
182       snapperd_conf_t
183
184       -  Set  files  with  the snapperd_conf_t type, if you want to treat the
185       files as snapperd configuration data, usually  stored  under  the  /etc
186       directory.
187
188
189       Paths:
190            /etc/snapper(/.*)?, /etc/sysconfig/snapper
191
192
193       snapperd_data_t
194
195       -  Set  files  with  the snapperd_data_t type, if you want to treat the
196       files as snapperd content.
197
198
199       Paths:
200            /mnt/(.*/)?.snapshots(/.*)?,    /.snapshots(/.*)?,     /etc/.snap‐
201            shots(/.*)?,     /usr/.snapshots(/.*)?,     /var/.snapshots(/.*)?,
202            /home/(.*/)?.snapshots(/.*)?
203
204
205       snapperd_exec_t
206
207       - Set files with the snapperd_exec_t type, if you want to transition an
208       executable to the snapperd_t domain.
209
210
211       Paths:
212            /usr/sbin/snapperd, /usr/lib/snapper/systemd-helper
213
214
215       snapperd_log_t
216
217       - Set files with the snapperd_log_t type, if you want to treat the data
218       as snapperd log data, usually stored under the /var/log directory.
219
220
221
222       Note: File context can be temporarily modified with the chcon  command.
223       If  you want to permanently change the file context you need to use the
224       semanage fcontext command.  This will modify the SELinux labeling data‐
225       base.  You will need to use restorecon to apply the labels.
226
227

COMMANDS

229       semanage  fcontext  can also be used to manipulate default file context
230       mappings.
231
232       semanage permissive can also be used to manipulate  whether  or  not  a
233       process type is permissive.
234
235       semanage  module can also be used to enable/disable/install/remove pol‐
236       icy modules.
237
238       semanage boolean can also be used to manipulate the booleans
239
240
241       system-config-selinux is a GUI tool available to customize SELinux pol‐
242       icy settings.
243
244

AUTHOR

246       This manual page was auto-generated using sepolicy manpage .
247
248

SEE ALSO

250       selinux(8),  snapperd(8),  semanage(8), restorecon(8), chcon(1), sepol‐
251       icy(8), setsebool(8)
252
253
254
255snapperd                           19-10-08                snapperd_selinux(8)
Impressum