]> git.ipfire.org Git - people/stevee/selinux-policy.git/blame - policy/modules/services/cloudform.te
Change all calls that use the use_nfs_home_dirs to use attributes for either userdom_...
[people/stevee/selinux-policy.git] / policy / modules / services / cloudform.te
CommitLineData
4693e1b6 1policy_module(cloudform, 1.0)
4693e1b6
MG
2########################################
3#
4# Declarations
5#
6
7attribute cloudform_domain;
8
9cloudform_domain_template(deltacloudd)
10cloudform_domain_template(iwhd)
11cloudform_domain_template(mongod)
12cloudform_domain_template(thin)
13
d5badaf8 14type deltacloudd_log_t;
15logging_log_file(deltacloudd_log_t)
16
17type deltacloudd_var_run_t;
18files_pid_file(deltacloudd_var_run_t)
19
4693e1b6
MG
20type deltacloudd_tmp_t;
21files_tmp_file(deltacloudd_tmp_t)
22
23type iwhd_initrc_exec_t;
24init_script_file(iwhd_initrc_exec_t)
25
26type iwhd_var_lib_t;
27files_type(iwhd_var_lib_t)
28
29type iwhd_var_run_t;
30files_pid_file(iwhd_var_run_t)
31
32type mongod_initrc_exec_t;
33init_script_file(mongod_initrc_exec_t)
34
35type mongod_log_t;
36logging_log_file(mongod_log_t)
37
38type mongod_var_lib_t;
39files_type(mongod_var_lib_t)
40
41type mongod_tmp_t;
42files_tmp_file(mongod_tmp_t)
43
44type mongod_var_run_t;
45files_pid_file(mongod_var_run_t)
46
47type thin_var_run_t;
48files_pid_file(thin_var_run_t)
49
50type iwhd_log_t;
51logging_log_file(iwhd_log_t)
52
53########################################
54#
55# cloudform_domain local policy
56#
57
58allow cloudform_domain self:fifo_file rw_fifo_file_perms;
59allow cloudform_domain self:tcp_socket create_stream_socket_perms;
60
61dev_read_urand(cloudform_domain)
62
63files_read_etc_files(cloudform_domain)
64
65miscfiles_read_certs(cloudform_domain)
66miscfiles_read_localization(cloudform_domain)
67
68########################################
69#
70# deltacloudd local policy
71#
72
73allow deltacloudd_t self:netlink_route_socket r_netlink_socket_perms;
74allow deltacloudd_t self:udp_socket create_socket_perms;
75
76allow deltacloudd_t self:process signal;
77
78allow deltacloudd_t self:fifo_file rw_fifo_file_perms;
79allow deltacloudd_t self:tcp_socket create_stream_socket_perms;
80allow deltacloudd_t self:unix_stream_socket create_stream_socket_perms;
81
82manage_dirs_pattern(deltacloudd_t, deltacloudd_tmp_t, deltacloudd_tmp_t)
83manage_files_pattern(deltacloudd_t, deltacloudd_tmp_t, deltacloudd_tmp_t)
84files_tmp_filetrans(deltacloudd_t, deltacloudd_tmp_t, { file dir })
85
d5badaf8 86manage_files_pattern(deltacloudd_t, deltacloudd_var_run_t, deltacloudd_var_run_t)
87manage_dirs_pattern(deltacloudd_t, deltacloudd_var_run_t, deltacloudd_var_run_t)
88manage_lnk_files_pattern(deltacloudd_t, deltacloudd_var_run_t, deltacloudd_var_run_t)
89files_pid_filetrans(deltacloudd_t, deltacloudd_var_run_t, { file dir })
90
91manage_files_pattern(deltacloudd_t, deltacloudd_log_t, deltacloudd_log_t)
92manage_dirs_pattern(deltacloudd_t, deltacloudd_log_t, deltacloudd_log_t)
93logging_log_filetrans(deltacloudd_t, deltacloudd_log_t, { file dir })
94
95kernel_read_system_state(deltacloudd_t)
96
4693e1b6
MG
97corecmd_exec_bin(deltacloudd_t)
98
99corenet_tcp_bind_generic_node(deltacloudd_t)
100corenet_tcp_bind_generic_port(deltacloudd_t)
101
102files_read_usr_files(deltacloudd_t)
103
104logging_send_syslog_msg(deltacloudd_t)
105
106optional_policy(`
107 sysnet_read_config(deltacloudd_t)
108')
109
110########################################
111#
112# iwhd local policy
113#
114
115allow iwhd_t self:capability { chown kill };
116allow iwhd_t self:process { fork };
117
118allow iwhd_t self:netlink_route_socket r_netlink_socket_perms;
119allow iwhd_t self:unix_stream_socket create_stream_socket_perms;
120
121manage_dirs_pattern(iwhd_t, iwhd_var_lib_t, iwhd_var_lib_t)
122manage_files_pattern(iwhd_t, iwhd_var_lib_t, iwhd_var_lib_t)
123
124manage_files_pattern(iwhd_t, iwhd_log_t, iwhd_log_t)
125logging_log_filetrans(iwhd_t, iwhd_log_t, { file })
126
127manage_dirs_pattern(iwhd_t, iwhd_var_run_t, iwhd_var_run_t)
128manage_files_pattern(iwhd_t, iwhd_var_run_t, iwhd_var_run_t)
129files_pid_filetrans(iwhd_t, iwhd_var_run_t, { dir file })
130
131kernel_read_system_state(iwhd_t)
132
133corenet_tcp_bind_generic_node(iwhd_t)
854eccf5 134corenet_tcp_bind_websm_port(iwhd_t)
942841b6 135corenet_tcp_connect_all_ports(iwhd_t)
4693e1b6
MG
136
137dev_read_rand(iwhd_t)
138dev_read_urand(iwhd_t)
139
ed2ac112 140userdom_home_manager(iwhd_t)
4693e1b6
MG
141
142########################################
143#
144# mongod local policy
145#
146
b2b22fcf 147allow mongod_t self:process { setsched signal };
4693e1b6 148
b2b22fcf 149allow mongod_t self:netlink_route_socket r_netlink_socket_perms;
4693e1b6 150allow mongod_t self:unix_stream_socket create_stream_socket_perms;
b2b22fcf 151allow mongod_t self:udp_socket create_socket_perms;
4693e1b6
MG
152
153manage_dirs_pattern(mongod_t, mongod_log_t, mongod_log_t)
154manage_files_pattern(mongod_t, mongod_log_t, mongod_log_t)
155
156manage_dirs_pattern(mongod_t, mongod_var_lib_t, mongod_var_lib_t)
157manage_files_pattern(mongod_t, mongod_var_lib_t, mongod_var_lib_t)
158
159manage_dirs_pattern(mongod_t, mongod_tmp_t, mongod_tmp_t)
160manage_files_pattern(mongod_t, mongod_tmp_t, mongod_tmp_t)
161manage_sock_files_pattern(mongod_t, mongod_tmp_t, mongod_tmp_t)
162files_tmp_filetrans(mongod_t, mongod_tmp_t, { file dir sock_file })
163
164manage_dirs_pattern(mongod_t, mongod_var_run_t, mongod_var_run_t)
165manage_files_pattern(mongod_t, mongod_var_run_t, mongod_var_run_t)
b2b22fcf
MG
166#needed by dbomatic
167files_pid_filetrans(mongod_t, mongod_var_run_t, { file })
4693e1b6
MG
168
169corenet_tcp_bind_generic_node(mongod_t)
4693e1b6
MG
170corenet_tcp_bind_generic_port(mongod_t)
171
b2b22fcf
MG
172files_read_usr_files(mongod_t)
173
174optional_policy(`
175 mysql_stream_connect(mongod_t)
176')
177
178optional_policy(`
179 postgresql_stream_connect(mongod_t)
180')
4693e1b6
MG
181
182optional_policy(`
183 sysnet_dns_name_resolve(mongod_t)
184')
185
186########################################
187#
188# thin local policy
189#
190
191allow thin_t self:capability { setuid kill setgid dac_override };
192
193allow thin_t self:netlink_route_socket r_netlink_socket_perms;
194allow thin_t self:udp_socket create_socket_perms;
195allow thin_t self:unix_stream_socket create_stream_socket_perms;
196
197manage_files_pattern(thin_t, thin_var_run_t, thin_var_run_t)
198files_pid_filetrans(thin_t, thin_var_run_t, { file })
199
200corecmd_exec_bin(thin_t)
201
202corenet_tcp_bind_generic_node(thin_t)
203corenet_tcp_bind_ntop_port(thin_t)
204corenet_tcp_connect_postgresql_port(thin_t)
942841b6 205corenet_tcp_connect_all_ports(iwhd_t)
4693e1b6
MG
206
207files_read_usr_files(thin_t)
208
209fs_search_auto_mountpoints(thin_t)
210
211init_read_utmp(thin_t)
212
213kernel_read_kernel_sysctls(thin_t)
214
215optional_policy(`
216 sysnet_read_config(thin_t)
217')
218