1abrt_upload_watch_selinuSxE(L8i)nux Policy abrt_upload_waabtrcth_upload_watch_selinux(8)
2
3
4

NAME

6       abrt_upload_watch_selinux  -  Security  Enhanced  Linux  Policy for the
7       abrt_upload_watch processes
8

DESCRIPTION

10       Security-Enhanced Linux secures  the  abrt_upload_watch  processes  via
11       flexible mandatory access control.
12
13       The  abrt_upload_watch  processes  execute with the abrt_upload_watch_t
14       SELinux type. You can check if you have these processes running by exe‐
15       cuting the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep abrt_upload_watch_t
20
21
22

ENTRYPOINTS

24       The  abrt_upload_watch_t  SELinux  type can be entered via the abrt_up‐
25       load_watch_exec_t file type.
26
27       The default entrypoint paths for the abrt_upload_watch_t domain are the
28       following:
29
30       /usr/sbin/abrt-upload-watch
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       abrt_upload_watch policy is very flexible allowing users to setup their
40       abrt_upload_watch processes in as secure a method as possible.
41
42       The following process types are defined for abrt_upload_watch:
43
44       abrt_upload_watch_t
45
46       Note: semanage permissive -a abrt_upload_watch_t can be  used  to  make
47       the  process type abrt_upload_watch_t permissive. SELinux does not deny
48       access to permissive process types, but the AVC (SELinux denials)  mes‐
49       sages are still generated.
50
51

BOOLEANS

53       SELinux   policy  is  customizable  based  on  least  access  required.
54       abrt_upload_watch policy is extremely flexible and has several booleans
55       that  allow you to manipulate the policy and run abrt_upload_watch with
56       the tightest access possible.
57
58
59
60       If you want to allow all domains to execute in fips_mode, you must turn
61       on the fips_mode boolean. Enabled by default.
62
63       setsebool -P fips_mode 1
64
65
66

MANAGED FILES

68       The  SELinux  process type abrt_upload_watch_t can manage files labeled
69       with the following file types.  The paths listed are the default  paths
70       for  these  file  types.  Note the processes UID still need to have DAC
71       permissions.
72
73       abrt_upload_watch_tmp_t
74
75
76       cluster_conf_t
77
78            /etc/cluster(/.*)?
79
80       cluster_var_lib_t
81
82            /var/lib/pcsd(/.*)?
83            /var/lib/cluster(/.*)?
84            /var/lib/openais(/.*)?
85            /var/lib/pengine(/.*)?
86            /var/lib/corosync(/.*)?
87            /usr/lib/heartbeat(/.*)?
88            /var/lib/heartbeat(/.*)?
89            /var/lib/pacemaker(/.*)?
90
91       cluster_var_run_t
92
93            /var/run/crm(/.*)?
94            /var/run/cman_.*
95            /var/run/rsctmp(/.*)?
96            /var/run/aisexec.*
97            /var/run/heartbeat(/.*)?
98            /var/run/pcsd-ruby.socket
99            /var/run/corosync-qnetd(/.*)?
100            /var/run/corosync-qdevice(/.*)?
101            /var/run/corosync.pid
102            /var/run/cpglockd.pid
103            /var/run/rgmanager.pid
104            /var/run/cluster/rgmanager.sk
105
106       public_content_rw_t
107
108            /var/spool/abrt-upload(/.*)?
109
110       root_t
111
112            /sysroot/ostree/deploy/.*-atomic/deploy(/.*)?
113            /
114            /initrd
115
116

FILE CONTEXTS

118       SELinux requires files to have an extended attribute to define the file
119       type.
120
121       You can see the context of a file using the -Z option to ls
122
123       Policy  governs  the  access  confined  processes  have to these files.
124       SELinux abrt_upload_watch policy is very  flexible  allowing  users  to
125       setup their abrt_upload_watch processes in as secure a method as possi‐
126       ble.
127
128       STANDARD FILE CONTEXT
129
130       SELinux defines the file context types for  the  abrt_upload_watch,  if
131       you wanted to store files with these types in a diffent paths, you need
132       to execute the semanage command to sepecify alternate labeling and then
133       use restorecon to put the labels on disk.
134
135       semanage   fcontext   -a  -t  abrt_upload_watch_tmp_t  '/srv/myabrt_up‐
136       load_watch_content(/.*)?'
137       restorecon -R -v /srv/myabrt_upload_watch_content
138
139       Note: SELinux often uses regular expressions  to  specify  labels  that
140       match multiple files.
141
142       The following file types are defined for abrt_upload_watch:
143
144
145
146       abrt_upload_watch_exec_t
147
148       -  Set  files  with  the  abrt_upload_watch_exec_t type, if you want to
149       transition an executable to the abrt_upload_watch_t domain.
150
151
152
153       abrt_upload_watch_tmp_t
154
155       - Set files with the abrt_upload_watch_tmp_t type, if you want to store
156       abrt upload watch temporary files in the /tmp directories.
157
158
159
160       Note:  File context can be temporarily modified with the chcon command.
161       If you want to permanently change the file context you need to use  the
162       semanage fcontext command.  This will modify the SELinux labeling data‐
163       base.  You will need to use restorecon to apply the labels.
164
165

SHARING FILES

167       If you want to share files with multiple domains (Apache,  FTP,  rsync,
168       Samba),  you can set a file context of public_content_t and public_con‐
169       tent_rw_t.  These context allow any of the above domains  to  read  the
170       content.   If  you want a particular domain to write to the public_con‐
171       tent_rw_t domain, you must set the appropriate boolean.
172
173       Allow abrt_upload_watch servers to read the /var/abrt_upload_watch  di‐
174       rectory  by  adding the public_content_t file type to the directory and
175       by restoring the file type.
176
177       semanage fcontext -a -t public_content_t "/var/abrt_upload_watch(/.*)?"
178       restorecon -F -R -v /var/abrt_upload_watch
179
180       Allow  abrt_upload_watch  servers  to  read  and  write   /var/abrt_up‐
181       load_watch/incoming  by  adding the public_content_rw_t type to the di‐
182       rectory and by restoring the file type.  You also need to turn  on  the
183       abrt_upload_watch_anon_write boolean.
184
185       semanage fcontext -a -t public_content_rw_t "/var/abrt_upload_watch/in‐
186       coming(/.*)?"
187       restorecon -F -R -v /var/abrt_upload_watch/incoming
188       setsebool -P abrt_upload_watch_anon_write 1
189
190
191       If you want to determine whether abrt-handle-upload can  modify  public
192       files  used  for  public  file transfer services in /var/spool/abrt-up‐
193       load/., you must turn on the abrt_upload_watch_anon_write boolean.
194
195       setsebool -P abrt_upload_watch_anon_write 1
196
197

COMMANDS

199       semanage fcontext can also be used to manipulate default  file  context
200       mappings.
201
202       semanage  permissive  can  also  be used to manipulate whether or not a
203       process type is permissive.
204
205       semanage module can also be used to enable/disable/install/remove  pol‐
206       icy modules.
207
208       semanage boolean can also be used to manipulate the booleans
209
210
211       system-config-selinux is a GUI tool available to customize SELinux pol‐
212       icy settings.
213
214

AUTHOR

216       This manual page was auto-generated using sepolicy manpage .
217
218

SEE ALSO

220       selinux(8), abrt_upload_watch(8), semanage(8), restorecon(8), chcon(1),
221       sepolicy(8), setsebool(8)
222
223
224
225abrt_upload_watch                  21-06-09       abrt_upload_watch_selinux(8)
Impressum