63 lines
2.3 KiB
Diff
63 lines
2.3 KiB
Diff
|
From 438285470610dee4aa6a56523df22307840ede87 Mon Sep 17 00:00:00 2001
|
||
|
From: =?UTF-8?q?Fran=C3=A7ois=20Cami?= <fcami@redhat.com>
|
||
|
Date: Mon, 7 Sep 2020 11:07:21 +0200
|
||
|
Subject: [PATCH] SELinux Policy: let custodia replicate keys
|
||
|
MIME-Version: 1.0
|
||
|
Content-Type: text/plain; charset=UTF-8
|
||
|
Content-Transfer-Encoding: 8bit
|
||
|
|
||
|
Enhance the SELinux policy so that custodia can replicate sub-CA keys
|
||
|
and certificates:
|
||
|
allow ipa_custodia_t self:tcp_socket { bind create };
|
||
|
allow ipa_custodia_t node_t:tcp_socket node_bind;
|
||
|
allow ipa_custodia_t pki_tomcat_cert_t:dir remove_name;
|
||
|
allow ipa_custodia_t pki_tomcat_cert_t:file create;
|
||
|
allow ipa_custodia_t pki_tomcat_cert_t:file unlink;
|
||
|
allow ipa_custodia_t self:process execmem;
|
||
|
|
||
|
Found by: test_replica_promotion::TestSubCAkeyReplication
|
||
|
|
||
|
Fixes: https://pagure.io/freeipa/issue/8488
|
||
|
Signed-off-by: François Cami <fcami@redhat.com>
|
||
|
Reviewed-By: Rob Crittenden <rcritten@redhat.com>
|
||
|
---
|
||
|
selinux/ipa.te | 11 +++++++++++
|
||
|
1 file changed, 11 insertions(+)
|
||
|
|
||
|
diff --git a/selinux/ipa.te b/selinux/ipa.te
|
||
|
index c4c3fa805..3fa4ba980 100644
|
||
|
--- a/selinux/ipa.te
|
||
|
+++ b/selinux/ipa.te
|
||
|
@@ -72,6 +72,9 @@ logging_log_file(ipa_custodia_log_t)
|
||
|
type ipa_custodia_tmp_t;
|
||
|
files_tmp_file(ipa_custodia_tmp_t)
|
||
|
|
||
|
+type pki_tomcat_cert_t;
|
||
|
+type node_t;
|
||
|
+
|
||
|
########################################
|
||
|
#
|
||
|
# ipa_otpd local policy
|
||
|
@@ -323,10 +326,18 @@ optional_policy(`
|
||
|
allow ipa_custodia_t self:capability { setgid setuid };
|
||
|
allow ipa_custodia_t self:fifo_file rw_fifo_file_perms;
|
||
|
allow ipa_custodia_t self:netlink_route_socket { create_socket_perms nlmsg_read };
|
||
|
+allow ipa_custodia_t self:process execmem;
|
||
|
allow ipa_custodia_t self:unix_stream_socket create_stream_socket_perms;
|
||
|
allow ipa_custodia_t self:unix_dgram_socket create_socket_perms;
|
||
|
+allow ipa_custodia_t self:tcp_socket { bind create };
|
||
|
allow ipa_custodia_t self:udp_socket create_socket_perms;
|
||
|
|
||
|
+allow ipa_custodia_t node_t:tcp_socket node_bind;
|
||
|
+
|
||
|
+allow ipa_custodia_t pki_tomcat_cert_t:dir remove_name;
|
||
|
+allow ipa_custodia_t pki_tomcat_cert_t:file create;
|
||
|
+allow ipa_custodia_t pki_tomcat_cert_t:file unlink;
|
||
|
+
|
||
|
manage_dirs_pattern(ipa_custodia_t,ipa_custodia_log_t,ipa_custodia_log_t)
|
||
|
manage_files_pattern(ipa_custodia_t, ipa_custodia_log_t, ipa_custodia_log_t)
|
||
|
logging_log_filetrans(ipa_custodia_t, ipa_custodia_log_t, { dir file })
|
||
|
--
|
||
|
2.26.2
|
||
|
|