]> git.ipfire.org Git - people/stevee/selinux-policy.git/blobdiff - policy/modules/services/ricci.te
Bump module versions for release.
[people/stevee/selinux-policy.git] / policy / modules / services / ricci.te
index f467c1119f7edc78d2a79f4b0acce2c0808a12a4..0452a678a556466f288e59e2a4104d6f8e41aad0 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(ricci,1.2.0)
+policy_module(ricci, 1.7.0)
 
 ########################################
 #
@@ -11,19 +11,15 @@ type ricci_exec_t;
 domain_type(ricci_t)
 init_daemon_domain(ricci_t, ricci_exec_t)
 
-# tmp files
 type ricci_tmp_t;
 files_tmp_file(ricci_tmp_t)
 
-# var/lib files
 type ricci_var_lib_t;
 files_type(ricci_var_lib_t)
 
-# log files
 type ricci_var_log_t;
 logging_log_file(ricci_var_log_t)
 
-# pid files
 type ricci_var_run_t;
 files_pid_file(ricci_var_run_t)
 
@@ -33,15 +29,12 @@ domain_type(ricci_modcluster_t)
 domain_entry_file(ricci_modcluster_t, ricci_modcluster_exec_t)
 role system_r types ricci_modcluster_t;
 
-# var/lib files
 type ricci_modcluster_var_lib_t;
 files_type(ricci_modcluster_var_lib_t)
 
-# log files
 type ricci_modcluster_var_log_t;
 logging_log_file(ricci_modcluster_var_log_t)
 
-# pid files
 type ricci_modcluster_var_run_t;
 files_pid_file(ricci_modcluster_var_run_t)
 
@@ -84,37 +77,33 @@ files_lock_file(ricci_modstorage_lock_t)
 
 allow ricci_t self:capability { setuid sys_nice sys_boot };
 allow ricci_t self:process setsched;
-allow ricci_t self:fifo_file { read write };
+allow ricci_t self:fifo_file rw_fifo_file_perms;
 allow ricci_t self:unix_stream_socket { create_stream_socket_perms connectto };
 allow ricci_t self:tcp_socket create_stream_socket_perms;
 
-domain_auto_trans(ricci_t,ricci_modcluster_exec_t,ricci_modcluster_t)
-domain_auto_trans(ricci_t,ricci_modlog_exec_t,ricci_modlog_t)
-domain_auto_trans(ricci_t,ricci_modrpm_exec_t,ricci_modrpm_t)
-domain_auto_trans(ricci_t,ricci_modservice_exec_t,ricci_modservice_t)
-domain_auto_trans(ricci_t,ricci_modstorage_exec_t,ricci_modstorage_t)
+domain_auto_trans(ricci_t, ricci_modcluster_exec_t, ricci_modcluster_t)
+domain_auto_trans(ricci_t, ricci_modlog_exec_t, ricci_modlog_t)
+domain_auto_trans(ricci_t, ricci_modrpm_exec_t, ricci_modrpm_t)
+domain_auto_trans(ricci_t, ricci_modservice_exec_t, ricci_modservice_t)
+domain_auto_trans(ricci_t, ricci_modstorage_exec_t, ricci_modstorage_t)
 
-# tmp file
-manage_dirs_pattern(ricci_t,ricci_tmp_t,ricci_tmp_t)
-manage_files_pattern(ricci_t,ricci_tmp_t,ricci_tmp_t)
+manage_dirs_pattern(ricci_t, ricci_tmp_t, ricci_tmp_t)
+manage_files_pattern(ricci_t, ricci_tmp_t, ricci_tmp_t)
 files_tmp_filetrans(ricci_t, ricci_tmp_t, { file dir })
 
-# var/lib files for ricci
-manage_dirs_pattern(ricci_t,ricci_var_lib_t,ricci_var_lib_t)
-manage_files_pattern(ricci_t,ricci_var_lib_t,ricci_var_lib_t)
-manage_sock_files_pattern(ricci_t,ricci_var_lib_t,ricci_var_lib_t)
-files_var_lib_filetrans(ricci_t,ricci_var_lib_t, { file dir sock_file })
+manage_dirs_pattern(ricci_t, ricci_var_lib_t, ricci_var_lib_t)
+manage_files_pattern(ricci_t, ricci_var_lib_t, ricci_var_lib_t)
+manage_sock_files_pattern(ricci_t, ricci_var_lib_t, ricci_var_lib_t)
+files_var_lib_filetrans(ricci_t, ricci_var_lib_t, { file dir sock_file })
 
-# log files
 allow ricci_t ricci_var_log_t:dir setattr;
-manage_files_pattern(ricci_t,ricci_var_log_t,ricci_var_log_t)
-manage_sock_files_pattern(ricci_t,ricci_var_log_t,ricci_var_log_t)
-logging_log_filetrans(ricci_t,ricci_var_log_t,{ sock_file file dir })
+manage_files_pattern(ricci_t, ricci_var_log_t, ricci_var_log_t)
+manage_sock_files_pattern(ricci_t, ricci_var_log_t, ricci_var_log_t)
+logging_log_filetrans(ricci_t, ricci_var_log_t, { sock_file file dir })
 
-# pid file
-manage_files_pattern(ricci_t,ricci_var_run_t,ricci_var_run_t)
-manage_sock_files_pattern(ricci_t,ricci_var_run_t,ricci_var_run_t)
-files_pid_filetrans(ricci_t,ricci_var_run_t, { file sock_file })
+manage_files_pattern(ricci_t, ricci_var_run_t, ricci_var_run_t)
+manage_sock_files_pattern(ricci_t, ricci_var_run_t, ricci_var_run_t)
+files_pid_filetrans(ricci_t, ricci_var_run_t, { file sock_file })
 
 kernel_read_kernel_sysctls(ricci_t)
 
@@ -122,17 +111,19 @@ corecmd_exec_bin(ricci_t)
 
 corenet_all_recvfrom_unlabeled(ricci_t)
 corenet_all_recvfrom_netlabel(ricci_t)
-corenet_tcp_sendrecv_all_if(ricci_t)
-corenet_tcp_sendrecv_all_nodes(ricci_t)
+corenet_tcp_sendrecv_generic_if(ricci_t)
+corenet_tcp_sendrecv_generic_node(ricci_t)
 corenet_tcp_sendrecv_all_ports(ricci_t)
-corenet_tcp_bind_all_nodes(ricci_t)
-corenet_udp_bind_all_nodes(ricci_t)
+corenet_tcp_bind_generic_node(ricci_t)
+corenet_udp_bind_generic_node(ricci_t)
 corenet_tcp_bind_ricci_port(ricci_t)
 corenet_udp_bind_ricci_port(ricci_t)
 corenet_tcp_connect_http_port(ricci_t)
 
 dev_read_urand(ricci_t)
 
+domain_read_all_domains_state(ricci_t)
+
 files_read_etc_files(ricci_t)
 files_read_etc_runtime_files(ricci_t)
 files_create_boot_flag(ricci_t)
@@ -140,10 +131,7 @@ files_create_boot_flag(ricci_t)
 auth_domtrans_chk_passwd(ricci_t)
 auth_append_login_records(ricci_t)
 
-init_dontaudit_stream_connect_script(ricci_t)
-
-libs_use_ld_so(ricci_t)
-libs_use_shared_libs(ricci_t)
+init_stream_connect_script(ricci_t)
 
 locallogin_dontaudit_use_fds(ricci_t)
 
@@ -153,18 +141,13 @@ miscfiles_read_localization(ricci_t)
 
 sysnet_dns_name_resolve(ricci_t)
 
-ifdef(`targeted_policy', `
-       term_dontaudit_use_generic_ptys(ricci_t)
-       term_dontaudit_use_unallocated_ttys(ricci_t)
-')
-
 optional_policy(`
        ccs_read_config(ricci_t)
 ')
 
 optional_policy(`
-       dbus_system_bus_client_template(ricci,ricci_t)
-       dbus_send_system_bus(ricci_t)
+       dbus_system_bus_client(ricci_t)
+
        oddjob_dbus_chat(ricci_t)
 ')
 
@@ -200,7 +183,7 @@ optional_policy(`
 # ricci_modcluster local policy
 #
 
-allow ricci_modcluster_t self:capability sys_nice;
+allow ricci_modcluster_t self:capability { net_bind_service sys_nice };
 allow ricci_modcluster_t self:process setsched;
 allow ricci_modcluster_t self:fifo_file rw_fifo_file_perms;
 
@@ -210,7 +193,10 @@ kernel_read_system_state(ricci_modcluster_t)
 corecmd_exec_shell(ricci_modcluster_t)
 corecmd_exec_bin(ricci_modcluster_t)
 
-domain_dontaudit_read_all_domains_state(ricci_modcluster_t)
+corenet_tcp_bind_cluster_port(ricci_modclusterd_t)
+corenet_tcp_bind_reserved_port(ricci_modclusterd_t)
+
+domain_read_all_domains_state(ricci_modcluster_t)
 
 files_search_locks(ricci_modcluster_t)
 files_read_etc_runtime_files(ricci_modcluster_t)
@@ -220,9 +206,6 @@ files_search_usr(ricci_modcluster_t)
 init_exec(ricci_modcluster_t)
 init_domtrans_script(ricci_modcluster_t)
 
-libs_use_ld_so(ricci_modcluster_t)
-libs_use_shared_libs(ricci_modcluster_t)
-
 logging_send_syslog_msg(ricci_modcluster_t)
 
 miscfiles_read_localization(ricci_modcluster_t)
@@ -231,16 +214,19 @@ modutils_domtrans_insmod(ricci_modcluster_t)
 
 mount_domtrans(ricci_modcluster_t)
 
+consoletype_exec(ricci_modcluster_t)
+
 ricci_stream_connect_modclusterd(ricci_modcluster_t)
 
 optional_policy(`
-       ccs_stream_connect(ricci_modcluster_t)
-       ccs_domtrans(ricci_modcluster_t)
-       ccs_manage_config(ricci_modcluster_t)
+       aisexec_stream_connect(ricci_modcluster_t)
+       corosync_stream_connect(ricci_modcluster_t)
 ')
 
 optional_policy(`
-       consoletype_exec(ricci_modcluster_t)
+       ccs_stream_connect(ricci_modcluster_t)
+       ccs_domtrans(ricci_modcluster_t)
+       ccs_manage_config(ricci_modcluster_t)
 ')
 
 optional_policy(`
@@ -255,58 +241,61 @@ optional_policy(`
        oddjob_system_entry(ricci_modcluster_t, ricci_modcluster_exec_t)
 ')
 
-# XXX This has got to go.
-unconfined_domain(ricci_modcluster_t)
+optional_policy(`
+       rgmanager_stream_connect(ricci_modclusterd_t)
+')
+
+optional_policy(`
+       # XXX This has got to go.
+       unconfined_domain(ricci_modcluster_t)
+')
 
 ########################################
 #
 # ricci_modclusterd local policy
 #
 
-allow ricci_modclusterd_t self:capability sys_nice;
+allow ricci_modclusterd_t self:capability { sys_nice sys_tty_config };
 allow ricci_modclusterd_t self:process { signal sigkill setsched };
 allow ricci_modclusterd_t self:fifo_file rw_fifo_file_perms;
 allow ricci_modclusterd_t self:unix_stream_socket create_stream_socket_perms;
 allow ricci_modclusterd_t self:tcp_socket create_stream_socket_perms;
-allow ricci_modclusterd_t self:netlink_route_socket r_netlink_socket_perms;
 # cjp: this needs to be fixed for a specific socket type:
 allow ricci_modclusterd_t self:socket create_socket_perms;
 
 allow ricci_modclusterd_t ricci_modcluster_t:unix_stream_socket connectto;
+allow ricci_modclusterd_t ricci_modcluster_t:fifo_file rw_file_perms;
 
-# log files
 allow ricci_modclusterd_t ricci_modcluster_var_log_t:dir setattr;
-manage_files_pattern(ricci_modclusterd_t,ricci_modcluster_var_log_t,ricci_modcluster_var_log_t)
-manage_sock_files_pattern(ricci_modclusterd_t,ricci_modcluster_var_log_t,ricci_modcluster_var_log_t)
-logging_log_filetrans(ricci_modclusterd_t,ricci_modcluster_var_log_t,{ sock_file file dir })
+manage_files_pattern(ricci_modclusterd_t, ricci_modcluster_var_log_t, ricci_modcluster_var_log_t)
+manage_sock_files_pattern(ricci_modclusterd_t, ricci_modcluster_var_log_t, ricci_modcluster_var_log_t)
+logging_log_filetrans(ricci_modclusterd_t, ricci_modcluster_var_log_t, { sock_file file dir })
 
-# pid file
-manage_files_pattern(ricci_modclusterd_t,ricci_modcluster_var_run_t,ricci_modcluster_var_run_t)
-manage_sock_files_pattern(ricci_modclusterd_t,ricci_modcluster_var_run_t,ricci_modcluster_var_run_t)
-files_pid_filetrans(ricci_modclusterd_t,ricci_modcluster_var_run_t, { file sock_file })
+manage_files_pattern(ricci_modclusterd_t, ricci_modcluster_var_run_t, ricci_modcluster_var_run_t)
+manage_sock_files_pattern(ricci_modclusterd_t, ricci_modcluster_var_run_t, ricci_modcluster_var_run_t)
+files_pid_filetrans(ricci_modclusterd_t, ricci_modcluster_var_run_t, { file sock_file })
 
 kernel_read_kernel_sysctls(ricci_modclusterd_t)
 kernel_read_system_state(ricci_modclusterd_t)
 
 corecmd_exec_bin(ricci_modclusterd_t)
 
-corenet_tcp_sendrecv_all_if(ricci_modclusterd_t)
+corenet_tcp_sendrecv_generic_if(ricci_modclusterd_t)
 corenet_tcp_sendrecv_all_ports(ricci_modclusterd_t)
-corenet_tcp_bind_all_nodes(ricci_modclusterd_t)
+corenet_tcp_bind_generic_node(ricci_modclusterd_t)
 corenet_tcp_bind_ricci_modcluster_port(ricci_modclusterd_t)
 corenet_tcp_connect_ricci_modcluster_port(ricci_modclusterd_t)
 
-domain_dontaudit_read_all_domains_state(ricci_modclusterd_t)
+domain_read_all_domains_state(ricci_modclusterd_t)
 
 files_read_etc_files(ricci_modclusterd_t)
 files_read_etc_runtime_files(ricci_modclusterd_t)
 
 fs_getattr_xattr_fs(ricci_modclusterd_t)
 
-init_dontaudit_stream_connect_script(ricci_modclusterd_t)
+auth_use_nsswitch(ricci_modclusterd_t)
 
-libs_use_ld_so(ricci_modclusterd_t)
-libs_use_shared_libs(ricci_modclusterd_t)
+init_stream_connect_script(ricci_modclusterd_t)
 
 locallogin_dontaudit_use_fds(ricci_modclusterd_t)
 
@@ -315,11 +304,10 @@ logging_send_syslog_msg(ricci_modclusterd_t)
 miscfiles_read_localization(ricci_modclusterd_t)
 
 sysnet_domtrans_ifconfig(ricci_modclusterd_t)
-sysnet_dns_name_resolve(ricci_modclusterd_t)
 
-ifdef(`targeted_policy', `
-       term_dontaudit_use_generic_ptys(ricci_modclusterd_t)
-       term_dontaudit_use_unallocated_ttys(ricci_modclusterd_t)
+optional_policy(`
+       aisexec_stream_connect(ricci_modclusterd_t)
+       corosync_stream_connect(ricci_modclusterd_t)
 ')
 
 optional_policy(`
@@ -328,6 +316,10 @@ optional_policy(`
        ccs_read_config(ricci_modclusterd_t)
 ')
 
+optional_policy(`
+       rgmanager_stream_connect(ricci_modclusterd_t)
+')
+
 optional_policy(`
        unconfined_use_fds(ricci_modclusterd_t)
 ')
@@ -345,14 +337,11 @@ kernel_read_system_state(ricci_modlog_t)
 
 corecmd_exec_bin(ricci_modlog_t)
 
-domain_dontaudit_read_all_domains_state(ricci_modlog_t)
+domain_read_all_domains_state(ricci_modlog_t)
 
 files_read_etc_files(ricci_modlog_t)
 files_search_usr(ricci_modlog_t)
 
-libs_use_ld_so(ricci_modlog_t)
-libs_use_shared_libs(ricci_modlog_t)
-
 logging_read_generic_logs(ricci_modlog_t)
 
 miscfiles_read_localization(ricci_modlog_t)
@@ -370,15 +359,12 @@ optional_policy(`
 # ricci_modrpm local policy
 #
 
-allow ricci_modrpm_t self:fifo_file { getattr read };
+allow ricci_modrpm_t self:fifo_file read_fifo_file_perms;
 
 kernel_read_kernel_sysctls(ricci_modrpm_t)
 
 corecmd_exec_bin(ricci_modrpm_t)
 
-libs_use_ld_so(ricci_modrpm_t)
-libs_use_shared_libs(ricci_modrpm_t)
-
 files_search_usr(ricci_modrpm_t)
 files_read_etc_files(ricci_modrpm_t)
 
@@ -398,7 +384,7 @@ optional_policy(`
 #
 
 allow ricci_modservice_t self:capability { dac_override sys_nice };
-allow ricci_modservice_t self:fifo_file { getattr read write };
+allow ricci_modservice_t self:fifo_file rw_fifo_file_perms;
 allow ricci_modservice_t self:process setsched;
 
 kernel_read_kernel_sysctls(ricci_modservice_t)
@@ -417,9 +403,6 @@ consoletype_exec(ricci_modservice_t)
 
 init_domtrans_script(ricci_modservice_t)
 
-libs_use_ld_so(ricci_modservice_t)
-libs_use_shared_libs(ricci_modservice_t)
-
 miscfiles_read_localization(ricci_modservice_t)
 
 optional_policy(`
@@ -448,16 +431,17 @@ allow ricci_modstorage_t self:unix_dgram_socket create_socket_perms;
 kernel_read_kernel_sysctls(ricci_modstorage_t)
 kernel_read_system_state(ricci_modstorage_t)
 
-create_files_pattern(ricci_modstorage_t,ricci_modstorage_lock_t,ricci_modstorage_lock_t)
-files_lock_filetrans(ricci_modstorage_t,ricci_modstorage_lock_t,file)
+create_files_pattern(ricci_modstorage_t, ricci_modstorage_lock_t, ricci_modstorage_lock_t)
+files_lock_filetrans(ricci_modstorage_t, ricci_modstorage_lock_t, file)
 
+corecmd_exec_shell(ricci_modstorage_t)
 corecmd_exec_bin(ricci_modstorage_t)
 
 dev_read_sysfs(ricci_modstorage_t)
 dev_read_urand(ricci_modstorage_t)
 dev_manage_generic_blk_files(ricci_modstorage_t)
 
-domain_dontaudit_read_all_domains_state(ricci_modstorage_t)
+domain_read_all_domains_state(ricci_modstorage_t)
 
 #Needed for editing /etc/fstab
 files_manage_etc_files(ricci_modstorage_t)
@@ -471,18 +455,21 @@ term_dontaudit_use_console(ricci_modstorage_t)
 
 fstools_domtrans(ricci_modstorage_t)
 
-libs_use_ld_so(ricci_modstorage_t)
-libs_use_shared_libs(ricci_modstorage_t)
-
 logging_send_syslog_msg(ricci_modstorage_t)
 
-lvm_domtrans(ricci_modstorage_t)
-lvm_manage_config(ricci_modstorage_t)
-
 miscfiles_read_localization(ricci_modstorage_t)
 
 modutils_read_module_deps(ricci_modstorage_t)
 
+consoletype_exec(ricci_modstorage_t)
+
+mount_domtrans(ricci_modstorage_t)
+
+optional_policy(`
+       aisexec_stream_connect(ricci_modstorage_t)
+       corosync_stream_connect(ricci_modstorage_t)
+')
+
 optional_policy(`
        ccs_stream_connect(ricci_modstorage_t)
        ccs_read_config(ricci_modstorage_t)
@@ -490,6 +477,7 @@ optional_policy(`
 
 optional_policy(`
        lvm_domtrans(ricci_modstorage_t)
+       lvm_manage_config(ricci_modstorage_t)
 ')
 
 optional_policy(`