]> git.ipfire.org Git - people/stevee/selinux-policy.git/blob - policy/modules/services/mysql.te
trunk: merge UBAC.
[people/stevee/selinux-policy.git] / policy / modules / services / mysql.te
1
2 policy_module(mysql, 1.9.1)
3
4 ########################################
5 #
6 # Declarations
7 #
8
9 type mysqld_t;
10 type mysqld_exec_t;
11 init_daemon_domain(mysqld_t, mysqld_exec_t)
12
13 type mysqld_var_run_t;
14 files_pid_file(mysqld_var_run_t)
15
16 type mysqld_db_t;
17 files_type(mysqld_db_t)
18
19 type mysqld_etc_t alias etc_mysqld_t;
20 files_config_file(mysqld_etc_t)
21
22 type mysqld_log_t;
23 logging_log_file(mysqld_log_t)
24
25 type mysqld_tmp_t;
26 files_tmp_file(mysqld_tmp_t)
27
28 ########################################
29 #
30 # Local policy
31 #
32
33 allow mysqld_t self:capability { dac_override setgid setuid sys_resource net_bind_service };
34 dontaudit mysqld_t self:capability sys_tty_config;
35 allow mysqld_t self:process { setsched getsched setrlimit signal_perms rlimitinh };
36 allow mysqld_t self:fifo_file rw_fifo_file_perms;
37 allow mysqld_t self:unix_stream_socket create_stream_socket_perms;
38 allow mysqld_t self:tcp_socket create_stream_socket_perms;
39 allow mysqld_t self:udp_socket create_socket_perms;
40
41 manage_dirs_pattern(mysqld_t, mysqld_db_t, mysqld_db_t)
42 manage_files_pattern(mysqld_t, mysqld_db_t, mysqld_db_t)
43 manage_lnk_files_pattern(mysqld_t, mysqld_db_t, mysqld_db_t)
44 files_var_lib_filetrans(mysqld_t, mysqld_db_t, { dir file })
45
46 allow mysqld_t mysqld_etc_t:file read_file_perms;
47 allow mysqld_t mysqld_etc_t:lnk_file { getattr read };
48 allow mysqld_t mysqld_etc_t:dir list_dir_perms;
49
50 allow mysqld_t mysqld_log_t:file manage_file_perms;
51 logging_log_filetrans(mysqld_t, mysqld_log_t, file)
52
53 manage_dirs_pattern(mysqld_t, mysqld_tmp_t, mysqld_tmp_t)
54 manage_files_pattern(mysqld_t, mysqld_tmp_t, mysqld_tmp_t)
55 files_tmp_filetrans(mysqld_t, mysqld_tmp_t, { file dir })
56
57 manage_files_pattern(mysqld_t, mysqld_var_run_t, mysqld_var_run_t)
58 manage_sock_files_pattern(mysqld_t, mysqld_var_run_t, mysqld_var_run_t)
59 files_pid_filetrans(mysqld_t, mysqld_var_run_t,{ file sock_file })
60
61 kernel_read_system_state(mysqld_t)
62 kernel_read_kernel_sysctls(mysqld_t)
63
64 corenet_all_recvfrom_unlabeled(mysqld_t)
65 corenet_all_recvfrom_netlabel(mysqld_t)
66 corenet_tcp_sendrecv_all_if(mysqld_t)
67 corenet_udp_sendrecv_all_if(mysqld_t)
68 corenet_tcp_sendrecv_all_nodes(mysqld_t)
69 corenet_udp_sendrecv_all_nodes(mysqld_t)
70 corenet_tcp_sendrecv_all_ports(mysqld_t)
71 corenet_udp_sendrecv_all_ports(mysqld_t)
72 corenet_tcp_bind_all_nodes(mysqld_t)
73 corenet_tcp_bind_mysqld_port(mysqld_t)
74 corenet_tcp_connect_mysqld_port(mysqld_t)
75 corenet_sendrecv_mysqld_client_packets(mysqld_t)
76 corenet_sendrecv_mysqld_server_packets(mysqld_t)
77
78 dev_read_sysfs(mysqld_t)
79
80 fs_getattr_all_fs(mysqld_t)
81 fs_search_auto_mountpoints(mysqld_t)
82
83 domain_use_interactive_fds(mysqld_t)
84
85 files_getattr_var_lib_dirs(mysqld_t)
86 files_read_etc_runtime_files(mysqld_t)
87 files_read_etc_files(mysqld_t)
88 files_read_usr_files(mysqld_t)
89 files_search_var_lib(mysqld_t)
90
91 auth_use_nsswitch(mysqld_t)
92
93 logging_send_syslog_msg(mysqld_t)
94
95 miscfiles_read_localization(mysqld_t)
96
97 sysnet_read_config(mysqld_t)
98
99 userdom_dontaudit_use_unpriv_user_fds(mysqld_t)
100 # for /root/.my.cnf - should not be needed:
101 userdom_read_user_home_content_files(mysqld_t)
102
103 ifdef(`distro_redhat',`
104 # because Fedora has the sock_file in the database directory
105 type_transition mysqld_t mysqld_db_t:sock_file mysqld_var_run_t;
106 ')
107
108 optional_policy(`
109 daemontools_service_domain(mysqld_t, mysqld_exec_t)
110 ')
111
112 optional_policy(`
113 seutil_sigchld_newrole(mysqld_t)
114 ')
115
116 optional_policy(`
117 udev_read_db(mysqld_t)
118 ')