2115 lines
83 KiB
Diff
2115 lines
83 KiB
Diff
|
diff --git a/apache.if b/apache.if
|
||
|
index fac6fe5..804867a 100644
|
||
|
--- a/apache.if
|
||
|
+++ b/apache.if
|
||
|
@@ -14,99 +14,123 @@
|
||
|
template(`apache_content_template',`
|
||
|
gen_require(`
|
||
|
attribute httpd_exec_scripts, httpd_script_exec_type;
|
||
|
- type httpd_t, httpd_suexec_t, httpd_log_t;
|
||
|
- type httpd_sys_content_t;
|
||
|
+ type httpd_t, httpd_suexec_t;
|
||
|
attribute httpd_script_type, httpd_content_type;
|
||
|
')
|
||
|
|
||
|
#This type is for webpages
|
||
|
- type httpd_$1_content_t; # customizable;
|
||
|
- typeattribute httpd_$1_content_t httpd_content_type;
|
||
|
- typealias httpd_$1_content_t alias httpd_$1_script_ro_t;
|
||
|
- files_type(httpd_$1_content_t)
|
||
|
+ type $1_content_t; # customizable;
|
||
|
+ typeattribute $1_content_t httpd_content_type;
|
||
|
+ typealias $1_content_t alias httpd_$1_script_ro_t;
|
||
|
+ files_type($1_content_t)
|
||
|
|
||
|
# This type is used for .htaccess files
|
||
|
- type httpd_$1_htaccess_t, httpd_content_type; # customizable;
|
||
|
- typeattribute httpd_$1_htaccess_t httpd_content_type;
|
||
|
- files_type(httpd_$1_htaccess_t)
|
||
|
+ type $1_htaccess_t, httpd_content_type; # customizable;
|
||
|
+ typeattribute $1_htaccess_t httpd_content_type;
|
||
|
+ files_type($1_htaccess_t)
|
||
|
|
||
|
# Type that CGI scripts run as
|
||
|
- type httpd_$1_script_t, httpd_script_type;
|
||
|
- domain_type(httpd_$1_script_t)
|
||
|
- role system_r types httpd_$1_script_t;
|
||
|
+ type $1_script_t, httpd_script_type;
|
||
|
+ domain_type($1_script_t)
|
||
|
+ role system_r types $1_script_t;
|
||
|
|
||
|
- kernel_read_system_state(httpd_$1_script_t)
|
||
|
+ kernel_read_system_state($1_script_t)
|
||
|
|
||
|
# This type is used for executable scripts files
|
||
|
- type httpd_$1_script_exec_t, httpd_script_exec_type; # customizable;
|
||
|
- typeattribute httpd_$1_script_exec_t httpd_content_type;
|
||
|
- domain_entry_file(httpd_$1_script_t, httpd_$1_script_exec_t)
|
||
|
+ type $1_script_exec_t, httpd_script_exec_type; # customizable;
|
||
|
+ typeattribute $1_script_exec_t httpd_content_type;
|
||
|
+ domain_entry_file($1_script_t, $1_script_exec_t)
|
||
|
|
||
|
- type httpd_$1_rw_content_t; # customizable
|
||
|
- typeattribute httpd_$1_rw_content_t httpd_content_type;
|
||
|
- typealias httpd_$1_rw_content_t alias { httpd_$1_script_rw_t httpd_$1_content_rw_t };
|
||
|
- files_type(httpd_$1_rw_content_t)
|
||
|
+ type $1_rw_content_t; # customizable
|
||
|
+ typeattribute $1_rw_content_t httpd_content_type;
|
||
|
+ typealias $1_rw_content_t alias { $1_script_rw_t };
|
||
|
+ files_type($1_rw_content_t)
|
||
|
|
||
|
- type httpd_$1_ra_content_t, httpd_content_type; # customizable
|
||
|
- typeattribute httpd_$1_ra_content_t httpd_content_type;
|
||
|
- typealias httpd_$1_ra_content_t alias { httpd_$1_script_ra_t httpd_$1_content_ra_t };
|
||
|
- files_type(httpd_$1_ra_content_t)
|
||
|
+ type $1_ra_content_t, httpd_content_type; # customizable
|
||
|
+ typeattribute $1_ra_content_t httpd_content_type;
|
||
|
+ typealias $1_ra_content_t alias { $1_script_ra_t $1_content_ra_t };
|
||
|
+ files_type($1_ra_content_t)
|
||
|
|
||
|
# Allow the script process to search the cgi directory, and users directory
|
||
|
- allow httpd_$1_script_t httpd_$1_content_t:dir search_dir_perms;
|
||
|
+ allow $1_script_t $1_content_t:dir search_dir_perms;
|
||
|
|
||
|
- can_exec(httpd_$1_script_t, httpd_$1_script_exec_t)
|
||
|
- allow httpd_$1_script_t httpd_$1_script_exec_t:dir list_dir_perms;
|
||
|
+ can_exec($1_script_t, $1_script_exec_t)
|
||
|
+ allow $1_script_t $1_script_exec_t:dir list_dir_perms;
|
||
|
|
||
|
- allow httpd_$1_script_t httpd_$1_ra_content_t:dir { list_dir_perms add_entry_dir_perms };
|
||
|
- read_files_pattern(httpd_$1_script_t, httpd_$1_ra_content_t, httpd_$1_ra_content_t)
|
||
|
- append_files_pattern(httpd_$1_script_t, httpd_$1_ra_content_t, httpd_$1_ra_content_t)
|
||
|
- create_files_pattern(httpd_$1_script_t, httpd_$1_ra_content_t, httpd_$1_ra_content_t)
|
||
|
- read_lnk_files_pattern(httpd_$1_script_t, httpd_$1_ra_content_t, httpd_$1_ra_content_t)
|
||
|
+ allow $1_script_t $1_ra_content_t:dir { list_dir_perms add_entry_dir_perms };
|
||
|
+ read_files_pattern($1_script_t, $1_ra_content_t, $1_ra_content_t)
|
||
|
+ append_files_pattern($1_script_t, $1_ra_content_t, $1_ra_content_t)
|
||
|
+ create_files_pattern($1_script_t, $1_ra_content_t, $1_ra_content_t)
|
||
|
+ read_lnk_files_pattern($1_script_t, $1_ra_content_t, $1_ra_content_t)
|
||
|
|
||
|
- allow httpd_$1_script_t httpd_$1_content_t:dir list_dir_perms;
|
||
|
- read_files_pattern(httpd_$1_script_t, httpd_$1_content_t, httpd_$1_content_t)
|
||
|
- read_lnk_files_pattern(httpd_$1_script_t, httpd_$1_content_t, httpd_$1_content_t)
|
||
|
+ allow $1_script_t $1_content_t:dir list_dir_perms;
|
||
|
+ read_files_pattern($1_script_t, $1_content_t, $1_content_t)
|
||
|
+ read_lnk_files_pattern($1_script_t, $1_content_t, $1_content_t)
|
||
|
|
||
|
- manage_dirs_pattern(httpd_$1_script_t, httpd_$1_rw_content_t, httpd_$1_rw_content_t)
|
||
|
- manage_files_pattern(httpd_$1_script_t, httpd_$1_rw_content_t, httpd_$1_rw_content_t)
|
||
|
- manage_lnk_files_pattern(httpd_$1_script_t, httpd_$1_rw_content_t, httpd_$1_rw_content_t)
|
||
|
- manage_fifo_files_pattern(httpd_$1_script_t, httpd_$1_rw_content_t, httpd_$1_rw_content_t)
|
||
|
- manage_sock_files_pattern(httpd_$1_script_t, httpd_$1_rw_content_t, httpd_$1_rw_content_t)
|
||
|
+ manage_dirs_pattern($1_script_t, $1_rw_content_t, $1_rw_content_t)
|
||
|
+ manage_files_pattern($1_script_t, $1_rw_content_t, $1_rw_content_t)
|
||
|
+ manage_lnk_files_pattern($1_script_t, $1_rw_content_t, $1_rw_content_t)
|
||
|
+ manage_fifo_files_pattern($1_script_t, $1_rw_content_t, $1_rw_content_t)
|
||
|
+ manage_sock_files_pattern($1_script_t, $1_rw_content_t, $1_rw_content_t)
|
||
|
|
||
|
# Allow the web server to run scripts and serve pages
|
||
|
tunable_policy(`httpd_builtin_scripting',`
|
||
|
- manage_dirs_pattern(httpd_t, httpd_$1_rw_content_t, httpd_$1_rw_content_t)
|
||
|
- manage_files_pattern(httpd_t, httpd_$1_rw_content_t, httpd_$1_rw_content_t)
|
||
|
- manage_lnk_files_pattern(httpd_t, httpd_$1_rw_content_t, httpd_$1_rw_content_t)
|
||
|
- rw_sock_files_pattern(httpd_t, httpd_$1_rw_content_t, httpd_$1_rw_content_t)
|
||
|
+ manage_dirs_pattern(httpd_t, $1_rw_content_t, $1_rw_content_t)
|
||
|
+ manage_files_pattern(httpd_t, $1_rw_content_t, $1_rw_content_t)
|
||
|
+ manage_lnk_files_pattern(httpd_t, $1_rw_content_t, $1_rw_content_t)
|
||
|
+ rw_sock_files_pattern(httpd_t, $1_rw_content_t, $1_rw_content_t)
|
||
|
|
||
|
- allow httpd_t httpd_$1_ra_content_t:dir { add_entry_dir_perms };
|
||
|
- read_files_pattern(httpd_t, httpd_$1_ra_content_t, httpd_$1_ra_content_t)
|
||
|
- append_files_pattern(httpd_t, httpd_$1_ra_content_t, httpd_$1_ra_content_t)
|
||
|
- create_files_pattern(httpd_t, httpd_$1_ra_content_t, httpd_$1_ra_content_t)
|
||
|
- read_lnk_files_pattern(httpd_t, httpd_$1_ra_content_t, httpd_$1_ra_content_t)
|
||
|
+ allow httpd_t $1_ra_content_t:dir { add_entry_dir_perms };
|
||
|
+ read_files_pattern(httpd_t, $1_ra_content_t, $1_ra_content_t)
|
||
|
+ append_files_pattern(httpd_t, $1_ra_content_t, $1_ra_content_t)
|
||
|
+ create_files_pattern(httpd_t, $1_ra_content_t, $1_ra_content_t)
|
||
|
+ read_lnk_files_pattern(httpd_t, $1_ra_content_t, $1_ra_content_t)
|
||
|
|
||
|
')
|
||
|
|
||
|
tunable_policy(`httpd_enable_cgi',`
|
||
|
- allow httpd_$1_script_t httpd_$1_script_exec_t:file entrypoint;
|
||
|
+ allow $1_script_t $1_script_exec_t:file entrypoint;
|
||
|
|
||
|
- domtrans_pattern(httpd_suexec_t, httpd_$1_script_exec_t, httpd_$1_script_t)
|
||
|
+ domtrans_pattern(httpd_suexec_t, $1_script_exec_t, $1_script_t)
|
||
|
|
||
|
# privileged users run the script:
|
||
|
- domtrans_pattern(httpd_exec_scripts, httpd_$1_script_exec_t, httpd_$1_script_t)
|
||
|
+ domtrans_pattern(httpd_exec_scripts, $1_script_exec_t, $1_script_t)
|
||
|
|
||
|
- allow httpd_exec_scripts httpd_$1_script_exec_t:file read_file_perms;
|
||
|
+ allow httpd_exec_scripts $1_script_exec_t:file read_file_perms;
|
||
|
|
||
|
# apache runs the script:
|
||
|
- domtrans_pattern(httpd_t, httpd_$1_script_exec_t, httpd_$1_script_t)
|
||
|
- allow httpd_t httpd_$1_script_t:unix_dgram_socket sendto;
|
||
|
+ domtrans_pattern(httpd_t, $1_script_exec_t, $1_script_t)
|
||
|
+ allow httpd_t $1_script_t:unix_dgram_socket sendto;
|
||
|
')
|
||
|
')
|
||
|
|
||
|
########################################
|
||
|
## <summary>
|
||
|
+## Create a set of derived types for apache
|
||
|
+## web content.
|
||
|
+## </summary>
|
||
|
+## <param name="prefix">
|
||
|
+## <summary>
|
||
|
+## The prefix to be used for deriving new type names.
|
||
|
+## </summary>
|
||
|
+## </param>
|
||
|
+## <param name="oldprefix">
|
||
|
+## <summary>
|
||
|
+## The prefix to be used for deriving old type names.
|
||
|
+## </summary>
|
||
|
+## </param>
|
||
|
+#
|
||
|
+template(`apache_content_alias_template',`
|
||
|
+ typealias $1_htaccess_t alias httpd_$2_htaccess_t;
|
||
|
+ typealias $1_script_t alias httpd_$2_script_t;
|
||
|
+ typealias $1_script_exec_t alias httpd_$2_script_exec_t;
|
||
|
+ typealias $1_content_t alias httpd_$2_content_t;
|
||
|
+ typealias $1_rw_content_t alias httpd_$2_script_rw_content_t;
|
||
|
+ typealias $1_ra_content_t alias httpd_$2_script_ra_content_t;
|
||
|
+')
|
||
|
+
|
||
|
+########################################
|
||
|
+## <summary>
|
||
|
## Role access for apache
|
||
|
## </summary>
|
||
|
## <param name="role">
|
||
|
diff --git a/apache.te b/apache.te
|
||
|
index 0e09bca..85e992e 100644
|
||
|
--- a/apache.te
|
||
|
+++ b/apache.te
|
||
|
@@ -370,7 +370,7 @@ type httpd_suexec_tmp_t;
|
||
|
files_tmp_file(httpd_suexec_tmp_t)
|
||
|
|
||
|
# setup the system domain for system CGI scripts
|
||
|
-apache_content_template(sys)
|
||
|
+apache_content_template(httpd_sys)
|
||
|
|
||
|
typeattribute httpd_sys_content_t httpdcontent; # customizable
|
||
|
typeattribute httpd_sys_rw_content_t httpdcontent; # customizable
|
||
|
@@ -389,7 +389,7 @@ files_tmp_file(httpd_tmp_t)
|
||
|
type httpd_tmpfs_t;
|
||
|
files_tmpfs_file(httpd_tmpfs_t)
|
||
|
|
||
|
-apache_content_template(user)
|
||
|
+apache_content_template(httpd_user)
|
||
|
ubac_constrained(httpd_user_script_t)
|
||
|
|
||
|
typeattribute httpd_user_content_t httpdcontent;
|
||
|
@@ -1619,6 +1619,7 @@ allow httpd_t httpd_script_exec_type:dir list_dir_perms;
|
||
|
allow httpd_script_type self:process { setsched signal_perms };
|
||
|
allow httpd_script_type self:unix_stream_socket create_stream_socket_perms;
|
||
|
allow httpd_script_type self:unix_dgram_socket create_socket_perms;
|
||
|
+allow httpd_script_type httpd_t:unix_stream_socket rw_stream_socket_perms;
|
||
|
|
||
|
allow httpd_script_type httpd_t:fd use;
|
||
|
allow httpd_script_type httpd_t:process sigchld;
|
||
|
diff --git a/apcupsd.fc b/apcupsd.fc
|
||
|
index 1c37fe1..274704f 100644
|
||
|
--- a/apcupsd.fc
|
||
|
+++ b/apcupsd.fc
|
||
|
@@ -14,8 +14,8 @@
|
||
|
|
||
|
/var/run/apcupsd\.pid -- gen_context(system_u:object_r:apcupsd_var_run_t,s0)
|
||
|
|
||
|
-/var/www/apcupsd/multimon\.cgi -- gen_context(system_u:object_r:httpd_apcupsd_cgi_script_exec_t,s0)
|
||
|
-/var/www/apcupsd/upsfstats\.cgi -- gen_context(system_u:object_r:httpd_apcupsd_cgi_script_exec_t,s0)
|
||
|
-/var/www/apcupsd/upsimage\.cgi -- gen_context(system_u:object_r:httpd_apcupsd_cgi_script_exec_t,s0)
|
||
|
-/var/www/apcupsd/upsstats\.cgi -- gen_context(system_u:object_r:httpd_apcupsd_cgi_script_exec_t,s0)
|
||
|
-/var/www/cgi-bin/apcgui(/.*)? gen_context(system_u:object_r:httpd_apcupsd_cgi_script_exec_t,s0)
|
||
|
+/var/www/apcupsd/multimon\.cgi -- gen_context(system_u:object_r:apcupsd_cgi_script_exec_t,s0)
|
||
|
+/var/www/apcupsd/upsfstats\.cgi -- gen_context(system_u:object_r:apcupsd_cgi_script_exec_t,s0)
|
||
|
+/var/www/apcupsd/upsimage\.cgi -- gen_context(system_u:object_r:apcupsd_cgi_script_exec_t,s0)
|
||
|
+/var/www/apcupsd/upsstats\.cgi -- gen_context(system_u:object_r:apcupsd_cgi_script_exec_t,s0)
|
||
|
+/var/www/cgi-bin/apcgui(/.*)? gen_context(system_u:object_r:apcupsd_cgi_script_exec_t,s0)
|
||
|
diff --git a/apcupsd.if b/apcupsd.if
|
||
|
index b6afc90..9c06313 100644
|
||
|
--- a/apcupsd.if
|
||
|
+++ b/apcupsd.if
|
||
|
@@ -102,7 +102,7 @@ interface(`apcupsd_append_log',`
|
||
|
########################################
|
||
|
## <summary>
|
||
|
## Execute a domain transition to
|
||
|
-## run httpd_apcupsd_cgi_script.
|
||
|
+## run apcupsd_cgi_script.
|
||
|
## </summary>
|
||
|
## <param name="domain">
|
||
|
## <summary>
|
||
|
@@ -112,11 +112,11 @@ interface(`apcupsd_append_log',`
|
||
|
#
|
||
|
interface(`apcupsd_cgi_script_domtrans',`
|
||
|
gen_require(`
|
||
|
- type httpd_apcupsd_cgi_script_t, httpd_apcupsd_cgi_script_exec_t;
|
||
|
+ type apcupsd_cgi_script_t, apcupsd_cgi_script_exec_t;
|
||
|
')
|
||
|
|
||
|
files_search_var($1)
|
||
|
- domtrans_pattern($1, httpd_apcupsd_cgi_script_exec_t, httpd_apcupsd_cgi_script_t)
|
||
|
+ domtrans_pattern($1, apcupsd_cgi_script_exec_t, apcupsd_cgi_script_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_search_sys_content($1)
|
||
|
diff --git a/apcupsd.te b/apcupsd.te
|
||
|
index b4c43c7..11c215a 100644
|
||
|
--- a/apcupsd.te
|
||
|
+++ b/apcupsd.te
|
||
|
@@ -116,19 +116,20 @@ optional_policy(`
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(apcupsd_cgi)
|
||
|
-
|
||
|
- allow httpd_apcupsd_cgi_script_t self:tcp_socket create_stream_socket_perms;
|
||
|
- allow httpd_apcupsd_cgi_script_t self:udp_socket create_socket_perms;
|
||
|
-
|
||
|
- corenet_all_recvfrom_netlabel(httpd_apcupsd_cgi_script_t)
|
||
|
- corenet_tcp_sendrecv_generic_if(httpd_apcupsd_cgi_script_t)
|
||
|
- corenet_tcp_sendrecv_generic_node(httpd_apcupsd_cgi_script_t)
|
||
|
- corenet_tcp_sendrecv_all_ports(httpd_apcupsd_cgi_script_t)
|
||
|
- corenet_sendrecv_apcupsd_client_packets(httpd_apcupsd_cgi_script_t)
|
||
|
- corenet_tcp_connect_apcupsd_port(httpd_apcupsd_cgi_script_t)
|
||
|
- corenet_udp_sendrecv_generic_if(httpd_apcupsd_cgi_script_t)
|
||
|
- corenet_udp_sendrecv_generic_node(httpd_apcupsd_cgi_script_t)
|
||
|
- corenet_udp_sendrecv_all_ports(httpd_apcupsd_cgi_script_t)
|
||
|
-
|
||
|
- sysnet_dns_name_resolve(httpd_apcupsd_cgi_script_t)
|
||
|
+ apache_content_alias_template(apcupsd_cgi, apcupsd_cgi)
|
||
|
+
|
||
|
+ allow apcupsd_cgi_script_t self:tcp_socket create_stream_socket_perms;
|
||
|
+ allow apcupsd_cgi_script_t self:udp_socket create_socket_perms;
|
||
|
+
|
||
|
+ corenet_all_recvfrom_netlabel(apcupsd_cgi_script_t)
|
||
|
+ corenet_tcp_sendrecv_generic_if(apcupsd_cgi_script_t)
|
||
|
+ corenet_tcp_sendrecv_generic_node(apcupsd_cgi_script_t)
|
||
|
+ corenet_tcp_sendrecv_all_ports(apcupsd_cgi_script_t)
|
||
|
+ corenet_sendrecv_apcupsd_client_packets(apcupsd_cgi_script_t)
|
||
|
+ corenet_tcp_connect_apcupsd_port(apcupsd_cgi_script_t)
|
||
|
+ corenet_udp_sendrecv_generic_if(apcupsd_cgi_script_t)
|
||
|
+ corenet_udp_sendrecv_generic_node(apcupsd_cgi_script_t)
|
||
|
+ corenet_udp_sendrecv_all_ports(apcupsd_cgi_script_t)
|
||
|
+
|
||
|
+ sysnet_dns_name_resolve(apcupsd_cgi_script_t)
|
||
|
')
|
||
|
diff --git a/awstats.fc b/awstats.fc
|
||
|
index 11e6d5f..73b4ea4 100644
|
||
|
--- a/awstats.fc
|
||
|
+++ b/awstats.fc
|
||
|
@@ -1,5 +1,5 @@
|
||
|
/usr/share/awstats/tools/.+\.pl -- gen_context(system_u:object_r:awstats_exec_t,s0)
|
||
|
-/usr/share/awstats/wwwroot(/.*)? gen_context(system_u:object_r:httpd_awstats_content_t,s0)
|
||
|
-/usr/share/awstats/wwwroot/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_awstats_script_exec_t,s0)
|
||
|
+/usr/share/awstats/wwwroot(/.*)? gen_context(system_u:object_r:awstats_content_t,s0)
|
||
|
+/usr/share/awstats/wwwroot/cgi-bin(/.*)? gen_context(system_u:object_r:awstats_script_exec_t,s0)
|
||
|
|
||
|
/var/lib/awstats(/.*)? gen_context(system_u:object_r:awstats_var_lib_t,s0)
|
||
|
diff --git a/awstats.te b/awstats.te
|
||
|
index c222135..ffbf2cb 100644
|
||
|
--- a/awstats.te
|
||
|
+++ b/awstats.te
|
||
|
@@ -26,6 +26,7 @@ type awstats_var_lib_t;
|
||
|
files_type(awstats_var_lib_t)
|
||
|
|
||
|
apache_content_template(awstats)
|
||
|
+apache_content_alias_template(awstats, awstats)
|
||
|
|
||
|
########################################
|
||
|
#
|
||
|
@@ -40,9 +41,9 @@ files_tmp_filetrans(awstats_t, awstats_tmp_t, { dir file })
|
||
|
|
||
|
manage_files_pattern(awstats_t, awstats_var_lib_t, awstats_var_lib_t)
|
||
|
|
||
|
-allow awstats_t { httpd_awstats_content_t httpd_awstats_script_exec_t }:dir search_dir_perms;
|
||
|
+allow awstats_t { awstats_content_t awstats_script_exec_t }:dir search_dir_perms;
|
||
|
|
||
|
-can_exec(awstats_t, { awstats_exec_t httpd_awstats_script_exec_t })
|
||
|
+can_exec(awstats_t, { awstats_exec_t awstats_script_exec_t })
|
||
|
|
||
|
kernel_dontaudit_read_system_state(awstats_t)
|
||
|
|
||
|
@@ -86,13 +87,13 @@ optional_policy(`
|
||
|
# CGI local policy
|
||
|
#
|
||
|
|
||
|
-apache_read_log(httpd_awstats_script_t)
|
||
|
+apache_read_log(awstats_script_t)
|
||
|
|
||
|
-manage_dirs_pattern(httpd_awstats_script_t, awstats_tmp_t, awstats_tmp_t)
|
||
|
-manage_files_pattern(httpd_awstats_script_t, awstats_tmp_t, awstats_tmp_t)
|
||
|
-files_tmp_filetrans(httpd_awstats_script_t, awstats_tmp_t, { dir file })
|
||
|
+manage_dirs_pattern(awstats_script_t, awstats_tmp_t, awstats_tmp_t)
|
||
|
+manage_files_pattern(awstats_script_t, awstats_tmp_t, awstats_tmp_t)
|
||
|
+files_tmp_filetrans(awstats_script_t, awstats_tmp_t, { dir file })
|
||
|
|
||
|
-allow httpd_awstats_script_t awstats_var_lib_t:dir list_dir_perms;
|
||
|
+allow awstats_script_t awstats_var_lib_t:dir list_dir_perms;
|
||
|
|
||
|
-read_files_pattern(httpd_awstats_script_t, awstats_var_lib_t, awstats_var_lib_t)
|
||
|
-files_search_var_lib(httpd_awstats_script_t)
|
||
|
+read_files_pattern(awstats_script_t, awstats_var_lib_t, awstats_var_lib_t)
|
||
|
+files_search_var_lib(awstats_script_t)
|
||
|
diff --git a/bugzilla.fc b/bugzilla.fc
|
||
|
index fb6e397..9efceac 100644
|
||
|
--- a/bugzilla.fc
|
||
|
+++ b/bugzilla.fc
|
||
|
@@ -1,4 +1,4 @@
|
||
|
-/usr/share/bugzilla(/.*)? gen_context(system_u:object_r:httpd_bugzilla_content_t,s0)
|
||
|
-/usr/share/bugzilla/.*\.cgi -- gen_context(system_u:object_r:httpd_bugzilla_script_exec_t,s0)
|
||
|
+/usr/share/bugzilla(/.*)? gen_context(system_u:object_r:bugzilla_content_t,s0)
|
||
|
+/usr/share/bugzilla/.*\.cgi -- gen_context(system_u:object_r:bugzilla_script_exec_t,s0)
|
||
|
|
||
|
-/var/lib/bugzilla(/.*)? gen_context(system_u:object_r:httpd_bugzilla_rw_content_t,s0)
|
||
|
+/var/lib/bugzilla(/.*)? gen_context(system_u:object_r:bugzilla_rw_content_t,s0)
|
||
|
diff --git a/bugzilla.if b/bugzilla.if
|
||
|
index bf0cefa..d9ea246 100644
|
||
|
--- a/bugzilla.if
|
||
|
+++ b/bugzilla.if
|
||
|
@@ -12,10 +12,10 @@
|
||
|
#
|
||
|
interface(`bugzilla_search_content',`
|
||
|
gen_require(`
|
||
|
- type httpd_bugzilla_content_t;
|
||
|
+ type bugzilla_content_t;
|
||
|
')
|
||
|
|
||
|
- allow $1 httpd_bugzilla_content_t:dir search_dir_perms;
|
||
|
+ allow $1 bugzilla_content_t:dir search_dir_perms;
|
||
|
')
|
||
|
|
||
|
########################################
|
||
|
@@ -32,10 +32,10 @@ interface(`bugzilla_search_content',`
|
||
|
#
|
||
|
interface(`bugzilla_dontaudit_rw_stream_sockets',`
|
||
|
gen_require(`
|
||
|
- type httpd_bugzilla_script_t;
|
||
|
+ type bugzilla_script_t;
|
||
|
')
|
||
|
|
||
|
- dontaudit $1 httpd_bugzilla_script_t:unix_stream_socket { read write };
|
||
|
+ dontaudit $1 bugzilla_script_t:unix_stream_socket { read write };
|
||
|
')
|
||
|
|
||
|
########################################
|
||
|
@@ -51,32 +51,32 @@ interface(`bugzilla_dontaudit_rw_stream_sockets',`
|
||
|
#
|
||
|
interface(`bugzilla_admin',`
|
||
|
gen_require(`
|
||
|
- type httpd_bugzilla_script_t, httpd_bugzilla_content_t, httpd_bugzilla_ra_content_t;
|
||
|
- type httpd_bugzilla_rw_content_t, httpd_bugzilla_script_exec_t;
|
||
|
- type httpd_bugzilla_htaccess_t, httpd_bugzilla_tmp_t;
|
||
|
+ type bugzilla_script_t, bugzilla_content_t, bugzilla_ra_content_t;
|
||
|
+ type bugzilla_rw_content_t, bugzilla_script_exec_t;
|
||
|
+ type bugzilla_htaccess_t, bugzilla_tmp_t;
|
||
|
')
|
||
|
|
||
|
- allow $1 httpd_bugzilla_script_t:process signal_perms;
|
||
|
- ps_process_pattern($1, httpd_bugzilla_script_t)
|
||
|
+ allow $1 bugzilla_script_t:process signal_perms;
|
||
|
+ ps_process_pattern($1, bugzilla_script_t)
|
||
|
|
||
|
tunable_policy(`deny_ptrace',`',`
|
||
|
- allow $1 httpd_bugzilla_script_t:process ptrace;
|
||
|
+ allow $1 bugzilla_script_t:process ptrace;
|
||
|
')
|
||
|
|
||
|
files_list_tmp($1)
|
||
|
- admin_pattern($1, httpd_bugzilla_tmp_t)
|
||
|
+ admin_pattern($1, bugzilla_tmp_t)
|
||
|
|
||
|
- files_list_var_lib(httpd_bugzilla_script_t)
|
||
|
+ files_list_var_lib(bugzilla_script_t)
|
||
|
|
||
|
- admin_pattern($1, httpd_bugzilla_script_exec_t)
|
||
|
- admin_pattern($1, httpd_bugzilla_script_t)
|
||
|
- admin_pattern($1, httpd_bugzilla_content_t)
|
||
|
- admin_pattern($1, httpd_bugzilla_htaccess_t)
|
||
|
- admin_pattern($1, httpd_bugzilla_ra_content_t)
|
||
|
+ admin_pattern($1, bugzilla_script_exec_t)
|
||
|
+ admin_pattern($1, bugzilla_script_t)
|
||
|
+ admin_pattern($1, bugzilla_content_t)
|
||
|
+ admin_pattern($1, bugzilla_htaccess_t)
|
||
|
+ admin_pattern($1, bugzilla_ra_content_t)
|
||
|
|
||
|
files_search_tmp($1)
|
||
|
files_search_var_lib($1)
|
||
|
- admin_pattern($1, httpd_bugzilla_rw_content_t)
|
||
|
+ admin_pattern($1, bugzilla_rw_content_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_list_sys_content($1)
|
||
|
diff --git a/bugzilla.te b/bugzilla.te
|
||
|
index d9f3061..c62f617 100644
|
||
|
--- a/bugzilla.te
|
||
|
+++ b/bugzilla.te
|
||
|
@@ -6,54 +6,55 @@ policy_module(bugzilla, 1.1.0)
|
||
|
#
|
||
|
|
||
|
apache_content_template(bugzilla)
|
||
|
+apache_content_alias_template(bugzilla, bugzilla)
|
||
|
|
||
|
-type httpd_bugzilla_tmp_t;
|
||
|
-files_tmp_file(httpd_bugzilla_tmp_t)
|
||
|
+type bugzilla_tmp_t alias httpd_bugzilla_tmp_t;
|
||
|
+files_tmp_file(bugzilla_tmp_t)
|
||
|
|
||
|
########################################
|
||
|
#
|
||
|
# Local policy
|
||
|
#
|
||
|
|
||
|
-allow httpd_bugzilla_script_t self:tcp_socket { accept listen };
|
||
|
+allow bugzilla_script_t self:tcp_socket { accept listen };
|
||
|
|
||
|
-corenet_all_recvfrom_netlabel(httpd_bugzilla_script_t)
|
||
|
-corenet_tcp_sendrecv_generic_if(httpd_bugzilla_script_t)
|
||
|
-corenet_tcp_sendrecv_generic_node(httpd_bugzilla_script_t)
|
||
|
+corenet_all_recvfrom_netlabel(bugzilla_script_t)
|
||
|
+corenet_tcp_sendrecv_generic_if(bugzilla_script_t)
|
||
|
+corenet_tcp_sendrecv_generic_node(bugzilla_script_t)
|
||
|
|
||
|
-corenet_sendrecv_http_client_packets(httpd_bugzilla_script_t)
|
||
|
-corenet_tcp_connect_http_port(httpd_bugzilla_script_t)
|
||
|
-corenet_tcp_sendrecv_http_port(httpd_bugzilla_script_t)
|
||
|
+corenet_sendrecv_http_client_packets(bugzilla_script_t)
|
||
|
+corenet_tcp_connect_http_port(bugzilla_script_t)
|
||
|
+corenet_tcp_sendrecv_http_port(bugzilla_script_t)
|
||
|
|
||
|
-corenet_sendrecv_smtp_client_packets(httpd_bugzilla_script_t)
|
||
|
-corenet_tcp_connect_smtp_port(httpd_bugzilla_script_t)
|
||
|
-corenet_tcp_sendrecv_smtp_port(httpd_bugzilla_script_t)
|
||
|
+corenet_sendrecv_smtp_client_packets(bugzilla_script_t)
|
||
|
+corenet_tcp_connect_smtp_port(bugzilla_script_t)
|
||
|
+corenet_tcp_sendrecv_smtp_port(bugzilla_script_t)
|
||
|
|
||
|
-manage_dirs_pattern(httpd_bugzilla_script_t, httpd_bugzilla_tmp_t, httpd_bugzilla_tmp_t)
|
||
|
-manage_files_pattern(httpd_bugzilla_script_t, httpd_bugzilla_tmp_t, httpd_bugzilla_tmp_t)
|
||
|
-files_tmp_filetrans(httpd_bugzilla_script_t, httpd_bugzilla_tmp_t, { file dir })
|
||
|
+manage_dirs_pattern(bugzilla_script_t, bugzilla_tmp_t, bugzilla_tmp_t)
|
||
|
+manage_files_pattern(bugzilla_script_t, bugzilla_tmp_t, bugzilla_tmp_t)
|
||
|
+files_tmp_filetrans(bugzilla_script_t, bugzilla_tmp_t, { file dir })
|
||
|
|
||
|
-files_search_var_lib(httpd_bugzilla_script_t)
|
||
|
+files_search_var_lib(bugzilla_script_t)
|
||
|
|
||
|
-auth_read_passwd(httpd_bugzilla_script_t)
|
||
|
+auth_read_passwd(bugzilla_script_t)
|
||
|
|
||
|
-dev_read_sysfs(httpd_bugzilla_script_t)
|
||
|
+dev_read_sysfs(bugzilla_script_t)
|
||
|
|
||
|
-sysnet_read_config(httpd_bugzilla_script_t)
|
||
|
-sysnet_use_ldap(httpd_bugzilla_script_t)
|
||
|
+sysnet_read_config(bugzilla_script_t)
|
||
|
+sysnet_use_ldap(bugzilla_script_t)
|
||
|
|
||
|
-miscfiles_read_certs(httpd_bugzilla_script_t)
|
||
|
+miscfiles_read_certs(bugzilla_script_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
- mta_send_mail(httpd_bugzilla_script_t)
|
||
|
+ mta_send_mail(bugzilla_script_t)
|
||
|
')
|
||
|
|
||
|
optional_policy(`
|
||
|
- mysql_stream_connect(httpd_bugzilla_script_t)
|
||
|
- mysql_tcp_connect(httpd_bugzilla_script_t)
|
||
|
+ mysql_stream_connect(bugzilla_script_t)
|
||
|
+ mysql_tcp_connect(bugzilla_script_t)
|
||
|
')
|
||
|
|
||
|
optional_policy(`
|
||
|
- postgresql_stream_connect(httpd_bugzilla_script_t)
|
||
|
- postgresql_tcp_connect(httpd_bugzilla_script_t)
|
||
|
+ postgresql_stream_connect(bugzilla_script_t)
|
||
|
+ postgresql_tcp_connect(bugzilla_script_t)
|
||
|
')
|
||
|
diff --git a/collectd.fc b/collectd.fc
|
||
|
index 2e7d7ed..8d70290 100644
|
||
|
--- a/collectd.fc
|
||
|
+++ b/collectd.fc
|
||
|
@@ -8,4 +8,4 @@
|
||
|
|
||
|
/var/run/collectd\.pid -- gen_context(system_u:object_r:collectd_var_run_t,s0)
|
||
|
|
||
|
-/usr/share/collectd/collection3/bin/.*\.cgi -- gen_context(system_u:object_r:httpd_collectd_script_exec_t,s0)
|
||
|
+/usr/share/collectd/collection3/bin/.*\.cgi -- gen_context(system_u:object_r:collectd_script_exec_t,s0)
|
||
|
diff --git a/collectd.te b/collectd.te
|
||
|
index dc0423c..d078b96 100644
|
||
|
--- a/collectd.te
|
||
|
+++ b/collectd.te
|
||
|
@@ -30,9 +30,10 @@ type collectd_unit_file_t;
|
||
|
systemd_unit_file(collectd_unit_file_t)
|
||
|
|
||
|
apache_content_template(collectd)
|
||
|
+apache_content_alias_template(collectd, collectd)
|
||
|
|
||
|
-type httpd_collectd_script_tmp_t;
|
||
|
-files_tmp_file(httpd_collectd_script_tmp_t)
|
||
|
+type collectd_script_tmp_t alias httpd_collectd_script_tmp_t;
|
||
|
+files_tmp_file(collectd_script_tmp_t)
|
||
|
|
||
|
########################################
|
||
|
#
|
||
|
@@ -102,13 +103,13 @@ optional_policy(`
|
||
|
#
|
||
|
|
||
|
|
||
|
-files_search_var_lib(httpd_collectd_script_t)
|
||
|
-read_files_pattern(httpd_collectd_script_t, collectd_var_lib_t, collectd_var_lib_t)
|
||
|
-list_dirs_pattern(httpd_collectd_script_t, collectd_var_lib_t, collectd_var_lib_t)
|
||
|
-miscfiles_setattr_fonts_cache_dirs(httpd_collectd_script_t)
|
||
|
+files_search_var_lib(collectd_script_t)
|
||
|
+read_files_pattern(collectd_script_t, collectd_var_lib_t, collectd_var_lib_t)
|
||
|
+list_dirs_pattern(collectd_script_t, collectd_var_lib_t, collectd_var_lib_t)
|
||
|
+miscfiles_setattr_fonts_cache_dirs(collectd_script_t)
|
||
|
|
||
|
-manage_dirs_pattern(httpd_collectd_script_t, httpd_collectd_script_tmp_t, httpd_collectd_script_tmp_t)
|
||
|
-manage_files_pattern(httpd_collectd_script_t, httpd_collectd_script_tmp_t, httpd_collectd_script_tmp_t)
|
||
|
-files_tmp_filetrans(httpd_collectd_script_t, httpd_collectd_script_tmp_t, { file dir })
|
||
|
+manage_dirs_pattern(collectd_script_t, collectd_script_tmp_t, collectd_script_tmp_t)
|
||
|
+manage_files_pattern(collectd_script_t, collectd_script_tmp_t, collectd_script_tmp_t)
|
||
|
+files_tmp_filetrans(collectd_script_t, collectd_script_tmp_t, { file dir })
|
||
|
|
||
|
-auth_read_passwd(httpd_collectd_script_t)
|
||
|
+auth_read_passwd(collectd_script_t)
|
||
|
diff --git a/cvs.fc b/cvs.fc
|
||
|
index 75c8be9..e07e602 100644
|
||
|
--- a/cvs.fc
|
||
|
+++ b/cvs.fc
|
||
|
@@ -4,10 +4,10 @@
|
||
|
|
||
|
/usr/bin/cvs -- gen_context(system_u:object_r:cvs_exec_t,s0)
|
||
|
|
||
|
-/usr/share/cvsweb/cvsweb\.cgi -- gen_context(system_u:object_r:httpd_cvs_script_exec_t,s0)
|
||
|
+/usr/share/cvsweb/cvsweb\.cgi -- gen_context(system_u:object_r:cvs_script_exec_t,s0)
|
||
|
|
||
|
/var/cvs(/.*)? gen_context(system_u:object_r:cvs_data_t,s0)
|
||
|
|
||
|
/var/run/cvs\.pid -- gen_context(system_u:object_r:cvs_var_run_t,s0)
|
||
|
|
||
|
-/var/www/cgi-bin/cvsweb\.cgi -- gen_context(system_u:object_r:httpd_cvs_script_exec_t,s0)
|
||
|
+/var/www/cgi-bin/cvsweb\.cgi -- gen_context(system_u:object_r:cvs_script_exec_t,s0)
|
||
|
diff --git a/cvs.te b/cvs.te
|
||
|
index f98a932..c3502c3 100644
|
||
|
--- a/cvs.te
|
||
|
+++ b/cvs.te
|
||
|
@@ -125,9 +125,10 @@ optional_policy(`
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(cvs)
|
||
|
+ apache_content_alias_template(cvs, cvs)
|
||
|
|
||
|
- read_files_pattern(httpd_cvs_script_t, cvs_data_t, cvs_data_t)
|
||
|
- manage_dirs_pattern(httpd_cvs_script_t, cvs_tmp_t, cvs_tmp_t)
|
||
|
- manage_files_pattern(httpd_cvs_script_t, cvs_tmp_t, cvs_tmp_t)
|
||
|
- files_tmp_filetrans(httpd_cvs_script_t, cvs_tmp_t, { file dir })
|
||
|
+ read_files_pattern(cvs_script_t, cvs_data_t, cvs_data_t)
|
||
|
+ manage_dirs_pattern(cvs_script_t, cvs_tmp_t, cvs_tmp_t)
|
||
|
+ manage_files_pattern(cvs_script_t, cvs_tmp_t, cvs_tmp_t)
|
||
|
+ files_tmp_filetrans(cvs_script_t, cvs_tmp_t, { file dir })
|
||
|
')
|
||
|
diff --git a/dirsrv-admin.fc b/dirsrv-admin.fc
|
||
|
index 8c44697..5e44c5e 100644
|
||
|
--- a/dirsrv-admin.fc
|
||
|
+++ b/dirsrv-admin.fc
|
||
|
@@ -6,8 +6,8 @@
|
||
|
/usr/sbin/start-ds-admin -- gen_context(system_u:object_r:dirsrvadmin_exec_t,s0)
|
||
|
/usr/sbin/stop-ds-admin -- gen_context(system_u:object_r:dirsrvadmin_exec_t,s0)
|
||
|
|
||
|
-/usr/lib/dirsrv/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_dirsrvadmin_script_exec_t,s0)
|
||
|
-/usr/lib/dirsrv/dsgw-cgi-bin(/.*)? gen_context(system_u:object_r:httpd_dirsrvadmin_script_exec_t,s0)
|
||
|
+/usr/lib/dirsrv/cgi-bin(/.*)? gen_context(system_u:object_r:dirsrvadmin_script_exec_t,s0)
|
||
|
+/usr/lib/dirsrv/dsgw-cgi-bin(/.*)? gen_context(system_u:object_r:dirsrvadmin_script_exec_t,s0)
|
||
|
|
||
|
/usr/lib/dirsrv/cgi-bin/ds_create -- gen_context(system_u:object_r:dirsrvadmin_unconfined_script_exec_t,s0)
|
||
|
/usr/lib/dirsrv/cgi-bin/ds_remove -- gen_context(system_u:object_r:dirsrvadmin_unconfined_script_exec_t,s0)
|
||
|
diff --git a/dirsrv-admin.if b/dirsrv-admin.if
|
||
|
index 30416f2..e360d38 100644
|
||
|
--- a/dirsrv-admin.if
|
||
|
+++ b/dirsrv-admin.if
|
||
|
@@ -29,13 +29,13 @@ interface(`dirsrvadmin_run_exec',`
|
||
|
## </summary>
|
||
|
## </param>
|
||
|
#
|
||
|
-interface(`dirsrvadmin_run_httpd_script_exec',`
|
||
|
+interface(`dirsrvadmin_run_script_exec',`
|
||
|
gen_require(`
|
||
|
- type httpd_dirsrvadmin_script_exec_t;
|
||
|
+ type dirsrvadmin_script_exec_t;
|
||
|
')
|
||
|
|
||
|
- allow $1 httpd_dirsrvadmin_script_exec_t:dir search_dir_perms;
|
||
|
- can_exec($1, httpd_dirsrvadmin_script_exec_t)
|
||
|
+ allow $1 dirsrvadmin_script_exec_t:dir search_dir_perms;
|
||
|
+ can_exec($1, dirsrvadmin_script_exec_t)
|
||
|
')
|
||
|
|
||
|
########################################
|
||
|
diff --git a/dirsrv-admin.te b/dirsrv-admin.te
|
||
|
index 021c5ae..37afbd4 100644
|
||
|
--- a/dirsrv-admin.te
|
||
|
+++ b/dirsrv-admin.te
|
||
|
@@ -70,59 +70,60 @@ optional_policy(`
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(dirsrvadmin)
|
||
|
+ apache_content_alias_template(dirsrvadmin, dirsrvadmin)
|
||
|
|
||
|
- allow httpd_dirsrvadmin_script_t self:process { getsched getpgid };
|
||
|
- allow httpd_dirsrvadmin_script_t self:capability { fowner fsetid setuid net_bind_service setgid chown sys_nice kill dac_read_search dac_override };
|
||
|
- allow httpd_dirsrvadmin_script_t self:tcp_socket create_stream_socket_perms;
|
||
|
- allow httpd_dirsrvadmin_script_t self:udp_socket create_socket_perms;
|
||
|
- allow httpd_dirsrvadmin_script_t self:unix_dgram_socket create_socket_perms;
|
||
|
- allow httpd_dirsrvadmin_script_t self:netlink_route_socket r_netlink_socket_perms;
|
||
|
- allow httpd_dirsrvadmin_script_t self:sem create_sem_perms;
|
||
|
+ allow dirsrvadmin_script_t self:process { getsched getpgid };
|
||
|
+ allow dirsrvadmin_script_t self:capability { fowner fsetid setuid net_bind_service setgid chown sys_nice kill dac_read_search dac_override };
|
||
|
+ allow dirsrvadmin_script_t self:tcp_socket create_stream_socket_perms;
|
||
|
+ allow dirsrvadmin_script_t self:udp_socket create_socket_perms;
|
||
|
+ allow dirsrvadmin_script_t self:unix_dgram_socket create_socket_perms;
|
||
|
+ allow dirsrvadmin_script_t self:netlink_route_socket r_netlink_socket_perms;
|
||
|
+ allow dirsrvadmin_script_t self:sem create_sem_perms;
|
||
|
|
||
|
|
||
|
- manage_files_pattern(httpd_dirsrvadmin_script_t, dirsrvadmin_lock_t, dirsrvadmin_lock_t)
|
||
|
- files_lock_filetrans(httpd_dirsrvadmin_script_t, dirsrvadmin_lock_t, { file })
|
||
|
+ manage_files_pattern(dirsrvadmin_script_t, dirsrvadmin_lock_t, dirsrvadmin_lock_t)
|
||
|
+ files_lock_filetrans(dirsrvadmin_script_t, dirsrvadmin_lock_t, { file })
|
||
|
|
||
|
- kernel_read_kernel_sysctls(httpd_dirsrvadmin_script_t)
|
||
|
+ kernel_read_kernel_sysctls(dirsrvadmin_script_t)
|
||
|
|
||
|
|
||
|
- corenet_tcp_bind_generic_node(httpd_dirsrvadmin_script_t)
|
||
|
- corenet_udp_bind_generic_node(httpd_dirsrvadmin_script_t)
|
||
|
- corenet_all_recvfrom_netlabel(httpd_dirsrvadmin_script_t)
|
||
|
+ corenet_tcp_bind_generic_node(dirsrvadmin_script_t)
|
||
|
+ corenet_udp_bind_generic_node(dirsrvadmin_script_t)
|
||
|
+ corenet_all_recvfrom_netlabel(dirsrvadmin_script_t)
|
||
|
|
||
|
- corenet_tcp_bind_http_port(httpd_dirsrvadmin_script_t)
|
||
|
- corenet_tcp_connect_generic_port(httpd_dirsrvadmin_script_t)
|
||
|
- corenet_tcp_connect_ldap_port(httpd_dirsrvadmin_script_t)
|
||
|
- corenet_tcp_connect_http_port(httpd_dirsrvadmin_script_t)
|
||
|
+ corenet_tcp_bind_http_port(dirsrvadmin_script_t)
|
||
|
+ corenet_tcp_connect_generic_port(dirsrvadmin_script_t)
|
||
|
+ corenet_tcp_connect_ldap_port(dirsrvadmin_script_t)
|
||
|
+ corenet_tcp_connect_http_port(dirsrvadmin_script_t)
|
||
|
|
||
|
- files_search_var_lib(httpd_dirsrvadmin_script_t)
|
||
|
+ files_search_var_lib(dirsrvadmin_script_t)
|
||
|
|
||
|
- sysnet_read_config(httpd_dirsrvadmin_script_t)
|
||
|
+ sysnet_read_config(dirsrvadmin_script_t)
|
||
|
|
||
|
- manage_files_pattern(httpd_dirsrvadmin_script_t, dirsrvadmin_tmp_t, dirsrvadmin_tmp_t)
|
||
|
- manage_dirs_pattern(httpd_dirsrvadmin_script_t, dirsrvadmin_tmp_t, dirsrvadmin_tmp_t)
|
||
|
- files_tmp_filetrans(httpd_dirsrvadmin_script_t, dirsrvadmin_tmp_t, { file dir })
|
||
|
+ manage_files_pattern(dirsrvadmin_script_t, dirsrvadmin_tmp_t, dirsrvadmin_tmp_t)
|
||
|
+ manage_dirs_pattern(dirsrvadmin_script_t, dirsrvadmin_tmp_t, dirsrvadmin_tmp_t)
|
||
|
+ files_tmp_filetrans(dirsrvadmin_script_t, dirsrvadmin_tmp_t, { file dir })
|
||
|
|
||
|
optional_policy(`
|
||
|
- apache_read_modules(httpd_dirsrvadmin_script_t)
|
||
|
- apache_read_config(httpd_dirsrvadmin_script_t)
|
||
|
- apache_signal(httpd_dirsrvadmin_script_t)
|
||
|
- apache_signull(httpd_dirsrvadmin_script_t)
|
||
|
+ apache_read_modules(dirsrvadmin_script_t)
|
||
|
+ apache_read_config(dirsrvadmin_script_t)
|
||
|
+ apache_signal(dirsrvadmin_script_t)
|
||
|
+ apache_signull(dirsrvadmin_script_t)
|
||
|
')
|
||
|
|
||
|
optional_policy(`
|
||
|
# The CGI scripts must be able to manage dirsrv-admin
|
||
|
- dirsrvadmin_run_exec(httpd_dirsrvadmin_script_t)
|
||
|
- dirsrvadmin_manage_config(httpd_dirsrvadmin_script_t)
|
||
|
- dirsrv_domtrans(httpd_dirsrvadmin_script_t)
|
||
|
- dirsrv_signal(httpd_dirsrvadmin_script_t)
|
||
|
- dirsrv_signull(httpd_dirsrvadmin_script_t)
|
||
|
- dirsrv_manage_log(httpd_dirsrvadmin_script_t)
|
||
|
- dirsrv_manage_var_lib(httpd_dirsrvadmin_script_t)
|
||
|
- dirsrv_pid_filetrans(httpd_dirsrvadmin_script_t)
|
||
|
- dirsrv_manage_var_run(httpd_dirsrvadmin_script_t)
|
||
|
- dirsrv_manage_config(httpd_dirsrvadmin_script_t)
|
||
|
- dirsrv_read_share(httpd_dirsrvadmin_script_t)
|
||
|
+ dirsrvadmin_run_exec(dirsrvadmin_script_t)
|
||
|
+ dirsrvadmin_manage_config(dirsrvadmin_script_t)
|
||
|
+ dirsrv_domtrans(dirsrvadmin_script_t)
|
||
|
+ dirsrv_signal(dirsrvadmin_script_t)
|
||
|
+ dirsrv_signull(dirsrvadmin_script_t)
|
||
|
+ dirsrv_manage_log(dirsrvadmin_script_t)
|
||
|
+ dirsrv_manage_var_lib(dirsrvadmin_script_t)
|
||
|
+ dirsrv_pid_filetrans(dirsrvadmin_script_t)
|
||
|
+ dirsrv_manage_var_run(dirsrvadmin_script_t)
|
||
|
+ dirsrv_manage_config(dirsrvadmin_script_t)
|
||
|
+ dirsrv_read_share(dirsrvadmin_script_t)
|
||
|
')
|
||
|
')
|
||
|
|
||
|
diff --git a/dspam.fc b/dspam.fc
|
||
|
index 3ea0423..b5fcb77 100644
|
||
|
--- a/dspam.fc
|
||
|
+++ b/dspam.fc
|
||
|
@@ -2,7 +2,7 @@
|
||
|
|
||
|
/usr/bin/dspam -- gen_context(system_u:object_r:dspam_exec_t,s0)
|
||
|
|
||
|
-/usr/share/dspam-web/dspam\.cgi -- gen_context(system_u:object_r:httpd_dspam_script_exec_t,s0)
|
||
|
+/usr/share/dspam-web/dspam\.cgi -- gen_context(system_u:object_r:dspam_script_exec_t,s0)
|
||
|
|
||
|
/var/lib/dspam(/.*)? gen_context(system_u:object_r:dspam_var_lib_t,s0)
|
||
|
|
||
|
@@ -11,7 +11,7 @@
|
||
|
/var/run/dspam(/.*)? gen_context(system_u:object_r:dspam_var_run_t,s0)
|
||
|
|
||
|
# web
|
||
|
-/var/www/dspam/.*\.cgi -- gen_context(system_u:object_r:httpd_dspam_script_exec_t,s0)
|
||
|
-/var/www/dspam(/.*?) gen_context(system_u:object_r:httpd_dspam_content_t,s0)
|
||
|
+/var/www/dspam/.*\.cgi -- gen_context(system_u:object_r:dspam_script_exec_t,s0)
|
||
|
+/var/www/dspam(/.*?) gen_context(system_u:object_r:dspam_content_t,s0)
|
||
|
|
||
|
-/var/lib/dspam/data(/.*)? gen_context(system_u:object_r:httpd_dspam_rw_content_t,s0)
|
||
|
+/var/lib/dspam/data(/.*)? gen_context(system_u:object_r:dspam_rw_content_t,s0)
|
||
|
diff --git a/dspam.te b/dspam.te
|
||
|
index 37c844b..1ec4d89 100644
|
||
|
--- a/dspam.te
|
||
|
+++ b/dspam.te
|
||
|
@@ -75,29 +75,27 @@ logging_send_syslog_msg(dspam_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(dspam)
|
||
|
+ apache_content_alias_template(dspam, dspam)
|
||
|
|
||
|
- read_files_pattern(httpd_dspam_script_t, dspam_var_lib_t, dspam_var_lib_t)
|
||
|
+ read_files_pattern(dspam_script_t, dspam_var_lib_t, dspam_var_lib_t)
|
||
|
|
||
|
- files_search_var_lib(httpd_dspam_script_t)
|
||
|
- list_dirs_pattern(dspam_t, httpd_dspam_content_t, httpd_dspam_content_t)
|
||
|
- manage_dirs_pattern(dspam_t, httpd_dspam_content_rw_t, httpd_dspam_content_rw_t)
|
||
|
- manage_files_pattern(dspam_t, httpd_dspam_content_rw_t, httpd_dspam_content_rw_t)
|
||
|
+ files_search_var_lib(dspam_script_t)
|
||
|
|
||
|
- domain_dontaudit_read_all_domains_state(httpd_dspam_script_t)
|
||
|
+ domain_dontaudit_read_all_domains_state(dspam_script_t)
|
||
|
|
||
|
- term_dontaudit_search_ptys(httpd_dspam_script_t)
|
||
|
- term_dontaudit_getattr_all_ttys(httpd_dspam_script_t)
|
||
|
- term_dontaudit_getattr_all_ptys(httpd_dspam_script_t)
|
||
|
+ term_dontaudit_search_ptys(dspam_script_t)
|
||
|
+ term_dontaudit_getattr_all_ttys(dspam_script_t)
|
||
|
+ term_dontaudit_getattr_all_ptys(dspam_script_t)
|
||
|
|
||
|
- init_read_utmp(httpd_dspam_script_t)
|
||
|
+ init_read_utmp(dspam_script_t)
|
||
|
|
||
|
- logging_send_syslog_msg(httpd_dspam_script_t)
|
||
|
+ logging_send_syslog_msg(dspam_script_t)
|
||
|
|
||
|
- mta_send_mail(httpd_dspam_script_t)
|
||
|
+ mta_send_mail(dspam_script_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
- mysql_tcp_connect(httpd_dspam_script_t)
|
||
|
- mysql_stream_connect(httpd_dspam_script_t)
|
||
|
+ mysql_tcp_connect(dspam_script_t)
|
||
|
+ mysql_stream_connect(dspam_script_t)
|
||
|
')
|
||
|
')
|
||
|
|
||
|
diff --git a/git.fc b/git.fc
|
||
|
index 24700f8..6561d56 100644
|
||
|
--- a/git.fc
|
||
|
+++ b/git.fc
|
||
|
@@ -2,12 +2,12 @@ HOME_DIR/public_git(/.*)? gen_context(system_u:object_r:git_user_content_t,s0)
|
||
|
|
||
|
/usr/libexec/git-core/git-daemon -- gen_context(system_u:object_r:gitd_exec_t,s0)
|
||
|
|
||
|
-/var/cache/cgit(/.*)? gen_context(system_u:object_r:httpd_git_rw_content_t,s0)
|
||
|
-/var/cache/gitweb-caching(/.*)? gen_context(system_u:object_r:httpd_git_rw_content_t,s0)
|
||
|
+/var/cache/cgit(/.*)? gen_context(system_u:object_r:git_rw_content_t,s0)
|
||
|
+/var/cache/gitweb-caching(/.*)? gen_context(system_u:object_r:git_rw_content_t,s0)
|
||
|
|
||
|
/var/lib/git(/.*)? gen_context(system_u:object_r:git_sys_content_t,s0)
|
||
|
|
||
|
-/var/www/cgi-bin/cgit -- gen_context(system_u:object_r:httpd_git_script_exec_t,s0)
|
||
|
-/var/www/git(/.*)? gen_context(system_u:object_r:httpd_git_content_t,s0)
|
||
|
-/var/www/git/gitweb\.cgi -- gen_context(system_u:object_r:httpd_git_script_exec_t,s0)
|
||
|
-/var/www/gitweb-caching/gitweb\.cgi -- gen_context(system_u:object_r:httpd_git_script_exec_t,s0)
|
||
|
+/var/www/cgi-bin/cgit -- gen_context(system_u:object_r:git_script_exec_t,s0)
|
||
|
+/var/www/git(/.*)? gen_context(system_u:object_r:git_content_t,s0)
|
||
|
+/var/www/git/gitweb\.cgi -- gen_context(system_u:object_r:git_script_exec_t,s0)
|
||
|
+/var/www/gitweb-caching/gitweb\.cgi -- gen_context(system_u:object_r:git_script_exec_t,s0)
|
||
|
diff --git a/git.te b/git.te
|
||
|
index 2609364..d3caffa 100644
|
||
|
--- a/git.te
|
||
|
+++ b/git.te
|
||
|
@@ -75,6 +75,7 @@ attribute git_daemon;
|
||
|
attribute_role git_session_roles;
|
||
|
|
||
|
apache_content_template(git)
|
||
|
+apache_content_alias_template(git, git)
|
||
|
|
||
|
type git_system_t, git_daemon;
|
||
|
type gitd_exec_t;
|
||
|
@@ -210,48 +211,48 @@ tunable_policy(`git_system_use_nfs',`
|
||
|
# CGI policy
|
||
|
#
|
||
|
|
||
|
-list_dirs_pattern(httpd_git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
||
|
-read_files_pattern(httpd_git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
||
|
-files_search_var_lib(httpd_git_script_t)
|
||
|
+list_dirs_pattern(git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
||
|
+read_files_pattern(git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
||
|
+files_search_var_lib(git_script_t)
|
||
|
|
||
|
-files_dontaudit_getattr_tmp_dirs(httpd_git_script_t)
|
||
|
+files_dontaudit_getattr_tmp_dirs(git_script_t)
|
||
|
|
||
|
-auth_use_nsswitch(httpd_git_script_t)
|
||
|
+auth_use_nsswitch(git_script_t)
|
||
|
|
||
|
tunable_policy(`git_cgi_enable_homedirs',`
|
||
|
- userdom_search_user_home_dirs(httpd_git_script_t)
|
||
|
+ userdom_search_user_home_dirs(git_script_t)
|
||
|
')
|
||
|
|
||
|
tunable_policy(`git_cgi_enable_homedirs && use_nfs_home_dirs',`
|
||
|
- fs_getattr_nfs(httpd_git_script_t)
|
||
|
- fs_list_nfs(httpd_git_script_t)
|
||
|
- fs_read_nfs_files(httpd_git_script_t)
|
||
|
+ fs_getattr_nfs(git_script_t)
|
||
|
+ fs_list_nfs(git_script_t)
|
||
|
+ fs_read_nfs_files(git_script_t)
|
||
|
',`
|
||
|
- fs_dontaudit_read_nfs_files(httpd_git_script_t)
|
||
|
+ fs_dontaudit_read_nfs_files(git_script_t)
|
||
|
')
|
||
|
|
||
|
tunable_policy(`git_cgi_enable_homedirs && use_samba_home_dirs',`
|
||
|
- fs_getattr_cifs(httpd_git_script_t)
|
||
|
- fs_list_cifs(httpd_git_script_t)
|
||
|
- fs_read_cifs_files(httpd_git_script_t)
|
||
|
+ fs_getattr_cifs(git_script_t)
|
||
|
+ fs_list_cifs(git_script_t)
|
||
|
+ fs_read_cifs_files(git_script_t)
|
||
|
',`
|
||
|
- fs_dontaudit_read_cifs_files(httpd_git_script_t)
|
||
|
+ fs_dontaudit_read_cifs_files(git_script_t)
|
||
|
')
|
||
|
|
||
|
tunable_policy(`git_cgi_use_cifs',`
|
||
|
- fs_getattr_cifs(httpd_git_script_t)
|
||
|
- fs_list_cifs(httpd_git_script_t)
|
||
|
- fs_read_cifs_files(httpd_git_script_t)
|
||
|
+ fs_getattr_cifs(git_script_t)
|
||
|
+ fs_list_cifs(git_script_t)
|
||
|
+ fs_read_cifs_files(git_script_t)
|
||
|
',`
|
||
|
- fs_dontaudit_read_cifs_files(httpd_git_script_t)
|
||
|
+ fs_dontaudit_read_cifs_files(git_script_t)
|
||
|
')
|
||
|
|
||
|
tunable_policy(`git_cgi_use_nfs',`
|
||
|
- fs_getattr_nfs(httpd_git_script_t)
|
||
|
- fs_list_nfs(httpd_git_script_t)
|
||
|
- fs_read_nfs_files(httpd_git_script_t)
|
||
|
+ fs_getattr_nfs(git_script_t)
|
||
|
+ fs_list_nfs(git_script_t)
|
||
|
+ fs_read_nfs_files(git_script_t)
|
||
|
',`
|
||
|
- fs_dontaudit_read_nfs_files(httpd_git_script_t)
|
||
|
+ fs_dontaudit_read_nfs_files(git_script_t)
|
||
|
')
|
||
|
|
||
|
########################################
|
||
|
diff --git a/lightsquid.fc b/lightsquid.fc
|
||
|
index 044390c..63e2058 100644
|
||
|
--- a/lightsquid.fc
|
||
|
+++ b/lightsquid.fc
|
||
|
@@ -1,11 +1,11 @@
|
||
|
/etc/cron\.daily/lightsquid -- gen_context(system_u:object_r:lightsquid_exec_t,s0)
|
||
|
|
||
|
-/usr/lib/cgi-bin/lightsquid/.*\.cfg -- gen_context(system_u:object_r:httpd_lightsquid_content_t,s0)
|
||
|
-/usr/lib/cgi-bin/lightsquid/.*\.cgi -- gen_context(system_u:object_r:httpd_lightsquid_script_exec_t,s0)
|
||
|
+/usr/lib/cgi-bin/lightsquid/.*\.cfg -- gen_context(system_u:object_r:lightsquid_content_t,s0)
|
||
|
+/usr/lib/cgi-bin/lightsquid/.*\.cgi -- gen_context(system_u:object_r:lightsquid_script_exec_t,s0)
|
||
|
|
||
|
-/usr/share/lightsquid/cgi/.*\.cgi -- gen_context(system_u:object_r:httpd_lightsquid_script_exec_t,s0)
|
||
|
+/usr/share/lightsquid/cgi/.*\.cgi -- gen_context(system_u:object_r:lightsquid_script_exec_t,s0)
|
||
|
|
||
|
/var/lightsquid(/.*)? gen_context(system_u:object_r:lightsquid_rw_content_t,s0)
|
||
|
|
||
|
-/var/www/html/lightsquid(/.*)? gen_context(system_u:object_r:httpd_lightsquid_content_t,s0)
|
||
|
-/var/www/html/lightsquid/report(/.*)? gen_context(system_u:object_r:lightsquid_rw_content_t,s0)
|
||
|
+/var/www/html/lightsquid(/.*)? gen_context(system_u:object_r:lightsquid_content_t,s0)
|
||
|
+/var/www/html/lightsquid/report(/.*)? gen_context(system_u:object_r:lightsquid_report_content_t,s0)
|
||
|
diff --git a/lightsquid.te b/lightsquid.te
|
||
|
index 75854ed..6c7855e 100644
|
||
|
--- a/lightsquid.te
|
||
|
+++ b/lightsquid.te
|
||
|
@@ -13,18 +13,18 @@ type lightsquid_exec_t;
|
||
|
application_domain(lightsquid_t, lightsquid_exec_t)
|
||
|
role lightsquid_roles types lightsquid_t;
|
||
|
|
||
|
-type lightsquid_rw_content_t;
|
||
|
-files_type(lightsquid_rw_content_t)
|
||
|
+type lightsquid_report_content_t;
|
||
|
+files_type(lightsquid_report_content_t)
|
||
|
|
||
|
########################################
|
||
|
#
|
||
|
# Local policy
|
||
|
#
|
||
|
|
||
|
-manage_dirs_pattern(lightsquid_t, lightsquid_rw_content_t, lightsquid_rw_content_t)
|
||
|
-manage_files_pattern(lightsquid_t, lightsquid_rw_content_t, lightsquid_rw_content_t)
|
||
|
-manage_lnk_files_pattern(lightsquid_t, lightsquid_rw_content_t, lightsquid_rw_content_t)
|
||
|
-files_var_filetrans(lightsquid_t, lightsquid_rw_content_t, dir)
|
||
|
+manage_dirs_pattern(lightsquid_t, lightsquid_report_content_t, lightsquid_report_content_t)
|
||
|
+manage_files_pattern(lightsquid_t, lightsquid_report_content_t, lightsquid_report_content_t)
|
||
|
+manage_lnk_files_pattern(lightsquid_t, lightsquid_report_content_t, lightsquid_report_content_t)
|
||
|
+files_var_filetrans(lightsquid_t, lightsquid_report_content_t, dir)
|
||
|
|
||
|
corecmd_exec_bin(lightsquid_t)
|
||
|
corecmd_exec_shell(lightsquid_t)
|
||
|
@@ -36,10 +36,11 @@ squid_read_log(lightsquid_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(lightsquid)
|
||
|
+ apache_content_alias_template(lightsquid, lightsquid)
|
||
|
|
||
|
- list_dirs_pattern(httpd_lightsquid_script_t, lightsquid_rw_content_t, lightsquid_rw_content_t)
|
||
|
- read_files_pattern(httpd_lightsquid_script_t, lightsquid_rw_content_t, lightsquid_rw_content_t)
|
||
|
- read_lnk_files_pattern(httpd_lightsquid_script_t, lightsquid_rw_content_t, lightsquid_rw_content_t)
|
||
|
+ list_dirs_pattern(lightsquid_script_t, lightsquid_report_content_t, lightsquid_report_content_t)
|
||
|
+ read_files_pattern(lightsquid_script_t, lightsquid_report_content_t, lightsquid_report_content_t)
|
||
|
+ read_lnk_files_pattern(lightsquid_script_t, lightsquid_report_content_t, lightsquid_report_content_t)
|
||
|
')
|
||
|
|
||
|
optional_policy(`
|
||
|
diff --git a/man2html.fc b/man2html.fc
|
||
|
index 82f6255..3686732 100644
|
||
|
--- a/man2html.fc
|
||
|
+++ b/man2html.fc
|
||
|
@@ -1,5 +1,5 @@
|
||
|
-/usr/lib/man2html/cgi-bin/man/man2html -- gen_context(system_u:object_r:httpd_man2html_script_exec_t,s0)
|
||
|
-/usr/lib/man2html/cgi-bin/man/mansec -- gen_context(system_u:object_r:httpd_man2html_script_exec_t,s0)
|
||
|
-/usr/lib/man2html/cgi-bin/man/manwhatis -- gen_context(system_u:object_r:httpd_man2html_script_exec_t,s0)
|
||
|
+/usr/lib/man2html/cgi-bin/man/man2html -- gen_context(system_u:object_r:man2html_script_exec_t,s0)
|
||
|
+/usr/lib/man2html/cgi-bin/man/mansec -- gen_context(system_u:object_r:man2html_script_exec_t,s0)
|
||
|
+/usr/lib/man2html/cgi-bin/man/manwhatis -- gen_context(system_u:object_r:man2html_script_exec_t,s0)
|
||
|
|
||
|
-/var/cache/man2html(/.*)? gen_context(system_u:object_r:httpd_man2html_script_cache_t,s0)
|
||
|
+/var/cache/man2html(/.*)? gen_context(system_u:object_r:man2html_rw_content_t,s0)
|
||
|
diff --git a/man2html.if b/man2html.if
|
||
|
index fe43dea..53eaf61 100644
|
||
|
--- a/man2html.if
|
||
|
+++ b/man2html.if
|
||
|
@@ -2,7 +2,7 @@
|
||
|
|
||
|
########################################
|
||
|
## <summary>
|
||
|
-## Transition to httpd_man2html_script.
|
||
|
+## Transition to man2html_script.
|
||
|
## </summary>
|
||
|
## <param name="domain">
|
||
|
## <summary>
|
||
|
@@ -10,18 +10,18 @@
|
||
|
## </summary>
|
||
|
## </param>
|
||
|
#
|
||
|
-interface(`httpd_man2html_script_domtrans',`
|
||
|
+interface(`man2html_script_domtrans',`
|
||
|
gen_require(`
|
||
|
- type httpd_man2html_script_t, httpd_man2html_script_exec_t;
|
||
|
+ type man2html_script_t, man2html_script_exec_t;
|
||
|
')
|
||
|
|
||
|
corecmd_search_bin($1)
|
||
|
- domtrans_pattern($1, httpd_man2html_script_exec_t, httpd_man2html_script_t)
|
||
|
+ domtrans_pattern($1, man2html_script_exec_t, man2html_script_t)
|
||
|
')
|
||
|
|
||
|
########################################
|
||
|
## <summary>
|
||
|
-## Search httpd_man2html_script cache directories.
|
||
|
+## Search man2html_script content directories.
|
||
|
## </summary>
|
||
|
## <param name="domain">
|
||
|
## <summary>
|
||
|
@@ -29,18 +29,19 @@ interface(`httpd_man2html_script_domtrans',`
|
||
|
## </summary>
|
||
|
## </param>
|
||
|
#
|
||
|
-interface(`httpd_man2html_script_search_cache',`
|
||
|
+interface(`man2html_search_content',`
|
||
|
gen_require(`
|
||
|
- type httpd_man2html_script_cache_t;
|
||
|
+ type man2html_content_t;
|
||
|
+ type man2html_rw_content_t;
|
||
|
')
|
||
|
|
||
|
- allow $1 httpd_man2html_script_cache_t:dir search_dir_perms;
|
||
|
+ allow $1 { man2html_rw_content_t man2html_content_t }:dir search_dir_perms;
|
||
|
files_search_var($1)
|
||
|
')
|
||
|
|
||
|
########################################
|
||
|
## <summary>
|
||
|
-## Read httpd_man2html_script cache files.
|
||
|
+## Read man2html cache files.
|
||
|
## </summary>
|
||
|
## <param name="domain">
|
||
|
## <summary>
|
||
|
@@ -48,19 +49,22 @@ interface(`httpd_man2html_script_search_cache',`
|
||
|
## </summary>
|
||
|
## </param>
|
||
|
#
|
||
|
-interface(`httpd_man2html_script_read_cache_files',`
|
||
|
+interface(`man2html_read_content_files',`
|
||
|
gen_require(`
|
||
|
- type httpd_man2html_script_cache_t;
|
||
|
+ type man2html_content_t;
|
||
|
+ type man2html_rw_content_t;
|
||
|
')
|
||
|
|
||
|
files_search_var($1)
|
||
|
- read_files_pattern($1, httpd_man2html_script_cache_t, httpd_man2html_script_cache_t)
|
||
|
+ allow $1 { man2html_rw_content_t man2html_content_t }:dir search_dir_perms;
|
||
|
+ read_files_pattern($1, man2html_rw_content_t, man2html_rw_content_t)
|
||
|
+ read_files_pattern($1, man2html_content_t, man2html_content_t)
|
||
|
')
|
||
|
|
||
|
########################################
|
||
|
## <summary>
|
||
|
## Create, read, write, and delete
|
||
|
-## httpd_man2html_script cache files.
|
||
|
+## man2html content files.
|
||
|
## </summary>
|
||
|
## <param name="domain">
|
||
|
## <summary>
|
||
|
@@ -68,18 +72,21 @@ interface(`httpd_man2html_script_read_cache_files',`
|
||
|
## </summary>
|
||
|
## </param>
|
||
|
#
|
||
|
-interface(`httpd_man2html_script_manage_cache_files',`
|
||
|
+interface(`man2html_manage_content_files',`
|
||
|
gen_require(`
|
||
|
- type httpd_man2html_script_cache_t;
|
||
|
+ type man2html_content_t;
|
||
|
+ type man2html_rw_content_t;
|
||
|
')
|
||
|
|
||
|
files_search_var($1)
|
||
|
- manage_files_pattern($1, httpd_man2html_script_cache_t, httpd_man2html_script_cache_t)
|
||
|
+ manage_files_pattern($1, man2html_rw_content_t, man2html_rw_content_t)
|
||
|
+ manage_files_pattern($1, man2html_content_t, man2html_content_t)
|
||
|
')
|
||
|
|
||
|
########################################
|
||
|
## <summary>
|
||
|
-## Manage httpd_man2html_script cache dirs.
|
||
|
+## Create, read, write, and delete
|
||
|
+## man2html content dirs.
|
||
|
## </summary>
|
||
|
## <param name="domain">
|
||
|
## <summary>
|
||
|
@@ -87,20 +94,21 @@ interface(`httpd_man2html_script_manage_cache_files',`
|
||
|
## </summary>
|
||
|
## </param>
|
||
|
#
|
||
|
-interface(`httpd_man2html_script_manage_cache_dirs',`
|
||
|
+interface(`man2html_manage_content_dirs',`
|
||
|
gen_require(`
|
||
|
- type httpd_man2html_script_cache_t;
|
||
|
+ type man2html_content_t;
|
||
|
+ type man2html_rw_content_t;
|
||
|
')
|
||
|
|
||
|
files_search_var($1)
|
||
|
- manage_dirs_pattern($1, httpd_man2html_script_cache_t, httpd_man2html_script_cache_t)
|
||
|
+ manage_dirs_pattern($1, man2html_rw_content_t, man2html_rw_content_t)
|
||
|
+ manage_dirs_pattern($1, man2html_content_t, man2html_content_t)
|
||
|
')
|
||
|
|
||
|
-
|
||
|
########################################
|
||
|
## <summary>
|
||
|
## All of the rules required to administrate
|
||
|
-## an httpd_man2html_script environment
|
||
|
+## an man2html environment
|
||
|
## </summary>
|
||
|
## <param name="domain">
|
||
|
## <summary>
|
||
|
@@ -108,17 +116,19 @@ interface(`httpd_man2html_script_manage_cache_dirs',`
|
||
|
## </summary>
|
||
|
## </param>
|
||
|
#
|
||
|
-interface(`httpd_man2html_script_admin',`
|
||
|
+interface(`man2html_admin',`
|
||
|
gen_require(`
|
||
|
- type httpd_man2html_script_t;
|
||
|
- type httpd_man2html_script_cache_t;
|
||
|
+ type man2html_script_t;
|
||
|
+ type man2html_rw_content_t;
|
||
|
+ type man2html_content_t;
|
||
|
')
|
||
|
|
||
|
- allow $1 httpd_man2html_script_t:process { ptrace signal_perms };
|
||
|
- ps_process_pattern($1, httpd_man2html_script_t)
|
||
|
+ allow $1 man2html_script_t:process { ptrace signal_perms };
|
||
|
+ ps_process_pattern($1, man2html_script_t)
|
||
|
|
||
|
files_search_var($1)
|
||
|
- admin_pattern($1, httpd_man2html_script_cache_t)
|
||
|
+ admin_pattern($1, man2html_content_t)
|
||
|
+ admin_pattern($1, man2html_rw_content_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
systemd_passwd_agent_exec($1)
|
||
|
diff --git a/man2html.te b/man2html.te
|
||
|
index 9e634bd..24b56e9 100644
|
||
|
--- a/man2html.te
|
||
|
+++ b/man2html.te
|
||
|
@@ -6,23 +6,17 @@ policy_module(man2html, 1.0.0)
|
||
|
#
|
||
|
|
||
|
|
||
|
-type httpd_man2html_script_cache_t;
|
||
|
-files_type(httpd_man2html_script_cache_t)
|
||
|
-
|
||
|
########################################
|
||
|
#
|
||
|
-# httpd_man2html_script local policy
|
||
|
+# man2html_script local policy
|
||
|
#
|
||
|
|
||
|
optional_policy(`
|
||
|
-
|
||
|
apache_content_template(man2html)
|
||
|
+ apache_content_alias_template(man2html, man2html)
|
||
|
|
||
|
- allow httpd_man2html_script_t self:process { fork };
|
||
|
-
|
||
|
- manage_dirs_pattern(httpd_man2html_script_t, httpd_man2html_script_cache_t, httpd_man2html_script_cache_t)
|
||
|
- manage_files_pattern(httpd_man2html_script_t, httpd_man2html_script_cache_t, httpd_man2html_script_cache_t)
|
||
|
- manage_lnk_files_pattern(httpd_man2html_script_t, httpd_man2html_script_cache_t, httpd_man2html_script_cache_t)
|
||
|
- files_var_filetrans(httpd_man2html_script_t, httpd_man2html_script_cache_t, { dir file })
|
||
|
+ allow man2html_script_t self:process fork;
|
||
|
|
||
|
+ typealias man2html_rw_content_t alias man2html_script_cache_t;
|
||
|
+ files_var_filetrans(man2html_script_t, man2html_rw_content_t, { dir file })
|
||
|
')
|
||
|
diff --git a/mediawiki.fc b/mediawiki.fc
|
||
|
index 99f7c41..93ec6db 100644
|
||
|
--- a/mediawiki.fc
|
||
|
+++ b/mediawiki.fc
|
||
|
@@ -1,8 +1,8 @@
|
||
|
-/usr/lib/mediawiki/math/texvc -- gen_context(system_u:object_r:httpd_mediawiki_script_exec_t,s0)
|
||
|
-/usr/lib/mediawiki/math/texvc_tex -- gen_context(system_u:object_r:httpd_mediawiki_script_exec_t,s0)
|
||
|
-/usr/lib/mediawiki/math/texvc_tes -- gen_context(system_u:object_r:httpd_mediawiki_script_exec_t,s0)
|
||
|
+/usr/lib/mediawiki/math/texvc -- gen_context(system_u:object_r:mediawiki_script_exec_t,s0)
|
||
|
+/usr/lib/mediawiki/math/texvc_tex -- gen_context(system_u:object_r:mediawiki_script_exec_t,s0)
|
||
|
+/usr/lib/mediawiki/math/texvc_tes -- gen_context(system_u:object_r:mediawiki_script_exec_t,s0)
|
||
|
|
||
|
-/usr/share/mediawiki(/.*)? gen_context(system_u:object_r:httpd_mediawiki_content_t,s0)
|
||
|
+/usr/share/mediawiki(/.*)? gen_context(system_u:object_r:mediawiki_content_t,s0)
|
||
|
|
||
|
-/var/www/wiki(/.*)? gen_context(system_u:object_r:httpd_mediawiki_rw_content_t,s0)
|
||
|
-/var/www/wiki/.*\.php -- gen_context(system_u:object_r:httpd_mediawiki_content_t,s0)
|
||
|
+/var/www/wiki(/.*)? gen_context(system_u:object_r:mediawiki_rw_content_t,s0)
|
||
|
+/var/www/wiki/.*\.php -- gen_context(system_u:object_r:mediawiki_content_t,s0)
|
||
|
diff --git a/mediawiki.if b/mediawiki.if
|
||
|
index 1c1d012..9b183e6 100644
|
||
|
--- a/mediawiki.if
|
||
|
+++ b/mediawiki.if
|
||
|
@@ -13,12 +13,12 @@
|
||
|
#
|
||
|
interface(`mediawiki_read_tmp_files',`
|
||
|
gen_require(`
|
||
|
- type httpd_mediawiki_tmp_t;
|
||
|
+ type mediawiki_tmp_t;
|
||
|
')
|
||
|
|
||
|
files_search_tmp($1)
|
||
|
- read_files_pattern($1, httpd_mediawiki_tmp_t, httpd_mediawiki_tmp_t)
|
||
|
- read_lnk_files_pattern($1, httpd_mediawiki_tmp_t, httpd_mediawiki_tmp_t)
|
||
|
+ read_files_pattern($1, mediawiki_tmp_t, mediawiki_tmp_t)
|
||
|
+ read_lnk_files_pattern($1, mediawiki_tmp_t, mediawiki_tmp_t)
|
||
|
')
|
||
|
|
||
|
#######################################
|
||
|
@@ -33,8 +33,8 @@ interface(`mediawiki_read_tmp_files',`
|
||
|
#
|
||
|
interface(`mediawiki_delete_tmp_files',`
|
||
|
gen_require(`
|
||
|
- type httpd_mediawiki_tmp_t;
|
||
|
+ type mediawiki_tmp_t;
|
||
|
')
|
||
|
|
||
|
- delete_files_pattern($1, httpd_mediawiki_tmp_t, httpd_mediawiki_tmp_t)
|
||
|
+ delete_files_pattern($1, mediawiki_tmp_t, mediawiki_tmp_t)
|
||
|
')
|
||
|
diff --git a/mediawiki.te b/mediawiki.te
|
||
|
index 212712c..fcbc191 100644
|
||
|
--- a/mediawiki.te
|
||
|
+++ b/mediawiki.te
|
||
|
@@ -5,16 +5,26 @@ policy_module(mediawiki, 1.0.0)
|
||
|
# Declarations
|
||
|
#
|
||
|
|
||
|
-optional_policy(`
|
||
|
-
|
||
|
- apache_content_template(mediawiki)
|
||
|
+type mediawiki_tmp_t;
|
||
|
+files_tmp_file(mediawiki_tmp_t)
|
||
|
|
||
|
########################################
|
||
|
#
|
||
|
# Local policy
|
||
|
#
|
||
|
|
||
|
- files_search_var_lib(httpd_mediawiki_script_t)
|
||
|
+optional_policy(`
|
||
|
+
|
||
|
+ apache_content_template(mediawiki)
|
||
|
+ apache_content_alias_template(mediawiki, mediawiki)
|
||
|
+
|
||
|
+ manage_dirs_pattern(mediawiki_script_t, mediawiki_tmp_t, mediawiki_tmp_t)
|
||
|
+ manage_files_pattern(mediawiki_script_t, mediawiki_tmp_t, mediawiki_tmp_t)
|
||
|
+ manage_sock_files_pattern(mediawiki_script_t, mediawiki_tmp_t, mediawiki_tmp_t)
|
||
|
+ manage_lnk_files_pattern(mediawiki_script_t, mediawiki_tmp_t, mediawiki_tmp_t)
|
||
|
+ files_tmp_filetrans(mediawiki_script_t, mediawiki_tmp_t, { file dir lnk_file })
|
||
|
+
|
||
|
+ files_search_var_lib(mediawiki_script_t)
|
||
|
|
||
|
- miscfiles_read_tetex_data(httpd_mediawiki_script_t)
|
||
|
+ miscfiles_read_tetex_data(mediawiki_script_t)
|
||
|
')
|
||
|
diff --git a/mojomojo.fc b/mojomojo.fc
|
||
|
index 7b827ca..5ee8a0f 100644
|
||
|
--- a/mojomojo.fc
|
||
|
+++ b/mojomojo.fc
|
||
|
@@ -1,5 +1,5 @@
|
||
|
-/usr/bin/mojomojo_fastcgi\.pl -- gen_context(system_u:object_r:httpd_mojomojo_script_exec_t,s0)
|
||
|
+/usr/bin/mojomojo_fastcgi\.pl -- gen_context(system_u:object_r:mojomojo_script_exec_t,s0)
|
||
|
|
||
|
-/usr/share/mojomojo/root(/.*)? gen_context(system_u:object_r:httpd_mojomojo_content_t,s0)
|
||
|
+/usr/share/mojomojo/root(/.*)? gen_context(system_u:object_r:mojomojo_content_t,s0)
|
||
|
|
||
|
-/var/lib/mojomojo(/.*)? gen_context(system_u:object_r:httpd_mojomojo_rw_content_t,s0)
|
||
|
+/var/lib/mojomojo(/.*)? gen_context(system_u:object_r:mojomojo_rw_content_t,s0)
|
||
|
diff --git a/mojomojo.te b/mojomojo.te
|
||
|
index 9556487..25d1d33 100644
|
||
|
--- a/mojomojo.te
|
||
|
+++ b/mojomojo.te
|
||
|
@@ -5,8 +5,8 @@ policy_module(mojomojo, 1.1.0)
|
||
|
# Declarations
|
||
|
#
|
||
|
|
||
|
-type httpd_mojomojo_tmp_t;
|
||
|
-files_tmp_file(httpd_mojomojo_tmp_t)
|
||
|
+type mojomojo_tmp_t alias httpd_mojomojo_tmp_t;
|
||
|
+files_tmp_file(mojomojo_tmp_t)
|
||
|
|
||
|
########################################
|
||
|
#
|
||
|
@@ -15,31 +15,30 @@ files_tmp_file(httpd_mojomojo_tmp_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(mojomojo)
|
||
|
+ apache_content_alias_template(mojomojo, mojomojo)
|
||
|
|
||
|
- allow httpd_mojomojo_script_t httpd_t:unix_stream_socket rw_stream_socket_perms;
|
||
|
+ manage_dirs_pattern(mojomojo_script_t, mojomojo_tmp_t, mojomojo_tmp_t)
|
||
|
+ manage_files_pattern(mojomojo_script_t, mojomojo_tmp_t, mojomojo_tmp_t)
|
||
|
+ files_tmp_filetrans(mojomojo_script_t, mojomojo_tmp_t, { file dir })
|
||
|
|
||
|
- manage_dirs_pattern(httpd_mojomojo_script_t, httpd_mojomojo_tmp_t, httpd_mojomojo_tmp_t)
|
||
|
- manage_files_pattern(httpd_mojomojo_script_t, httpd_mojomojo_tmp_t, httpd_mojomojo_tmp_t)
|
||
|
- files_tmp_filetrans(httpd_mojomojo_script_t, httpd_mojomojo_tmp_t, { file dir })
|
||
|
+ corenet_tcp_connect_postgresql_port(mojomojo_script_t)
|
||
|
+ corenet_tcp_connect_mysqld_port(mojomojo_script_t)
|
||
|
+ corenet_tcp_connect_smtp_port(mojomojo_script_t)
|
||
|
+ corenet_sendrecv_postgresql_client_packets(mojomojo_script_t)
|
||
|
+ corenet_sendrecv_mysqld_client_packets(mojomojo_script_t)
|
||
|
+ corenet_sendrecv_smtp_client_packets(mojomojo_script_t)
|
||
|
|
||
|
- corenet_tcp_connect_postgresql_port(httpd_mojomojo_script_t)
|
||
|
- corenet_tcp_connect_mysqld_port(httpd_mojomojo_script_t)
|
||
|
- corenet_tcp_connect_smtp_port(httpd_mojomojo_script_t)
|
||
|
- corenet_sendrecv_postgresql_client_packets(httpd_mojomojo_script_t)
|
||
|
- corenet_sendrecv_mysqld_client_packets(httpd_mojomojo_script_t)
|
||
|
- corenet_sendrecv_smtp_client_packets(httpd_mojomojo_script_t)
|
||
|
+ files_search_var_lib(mojomojo_script_t)
|
||
|
|
||
|
- files_search_var_lib(httpd_mojomojo_script_t)
|
||
|
+ sysnet_dns_name_resolve(mojomojo_script_t)
|
||
|
|
||
|
- sysnet_dns_name_resolve(httpd_mojomojo_script_t)
|
||
|
-
|
||
|
- mta_send_mail(httpd_mojomojo_script_t)
|
||
|
+ mta_send_mail(mojomojo_script_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
- mysql_stream_connect(httpd_mojomojo_script_t)
|
||
|
+ mysql_stream_connect(mojomojo_script_t)
|
||
|
')
|
||
|
|
||
|
optional_policy(`
|
||
|
- postgresql_stream_connect(httpd_mojomojo_script_t)
|
||
|
+ postgresql_stream_connect(mojomojo_script_t)
|
||
|
')
|
||
|
')
|
||
|
diff --git a/munin.fc b/munin.fc
|
||
|
index 4968324..af28bb5 100644
|
||
|
--- a/munin.fc
|
||
|
+++ b/munin.fc
|
||
|
@@ -73,7 +73,7 @@
|
||
|
/var/lib/munin/plugin-state(/.*)? gen_context(system_u:object_r:munin_plugin_state_t,s0)
|
||
|
/var/log/munin.* gen_context(system_u:object_r:munin_log_t,s0)
|
||
|
/var/run/munin(/.*)? gen_context(system_u:object_r:munin_var_run_t,s0)
|
||
|
-/var/www/html/munin(/.*)? gen_context(system_u:object_r:httpd_munin_content_t,s0)
|
||
|
-/var/www/html/munin/cgi(/.*)? gen_context(system_u:object_r:httpd_munin_script_exec_t,s0)
|
||
|
-/var/www/html/cgi/munin.* gen_context(system_u:object_r:httpd_munin_script_exec_t,s0)
|
||
|
-/var/www/cgi-bin/munin.* gen_context(system_u:object_r:httpd_munin_script_exec_t,s0)
|
||
|
+/var/www/html/munin(/.*)? gen_context(system_u:object_r:munin_content_t,s0)
|
||
|
+/var/www/html/munin/cgi(/.*)? gen_context(system_u:object_r:munin_script_exec_t,s0)
|
||
|
+/var/www/html/cgi/munin.* gen_context(system_u:object_r:munin_script_exec_t,s0)
|
||
|
+/var/www/cgi-bin/munin.* gen_context(system_u:object_r:munin_script_exec_t,s0)
|
||
|
diff --git a/munin.if b/munin.if
|
||
|
index 4c1b6a8..900d083 100644
|
||
|
--- a/munin.if
|
||
|
+++ b/munin.if
|
||
|
@@ -209,7 +209,7 @@ interface(`munin_admin',`
|
||
|
attribute munin_plugin_domain, munin_plugin_tmp_content;
|
||
|
type munin_t, munin_etc_t, munin_tmp_t;
|
||
|
type munin_log_t, munin_var_lib_t, munin_var_run_t;
|
||
|
- type httpd_munin_content_t, munin_plugin_state_t, munin_initrc_exec_t;
|
||
|
+ type munin_content_t, munin_plugin_state_t, munin_initrc_exec_t;
|
||
|
')
|
||
|
|
||
|
allow $1 munin_t:process signal_perms;
|
||
|
@@ -239,5 +239,5 @@ interface(`munin_admin',`
|
||
|
files_list_pids($1)
|
||
|
admin_pattern($1, munin_var_run_t)
|
||
|
|
||
|
- admin_pattern($1, httpd_munin_content_t)
|
||
|
+ admin_pattern($1, munin_content_t)
|
||
|
')
|
||
|
diff --git a/munin.te b/munin.te
|
||
|
index cead88c..16b96d0 100644
|
||
|
--- a/munin.te
|
||
|
+++ b/munin.te
|
||
|
@@ -44,8 +44,8 @@ files_tmpfs_file(services_munin_plugin_tmpfs_t)
|
||
|
munin_plugin_template(system)
|
||
|
munin_plugin_template(unconfined)
|
||
|
|
||
|
-type httpd_munin_script_tmp_t;
|
||
|
-files_tmp_file(httpd_munin_script_tmp_t)
|
||
|
+type munin_script_tmp_t alias httpd_munin_script_tmp_t;
|
||
|
+files_tmp_file(munin_script_tmp_t)
|
||
|
|
||
|
################################
|
||
|
#
|
||
|
@@ -435,22 +435,23 @@ optional_policy(`
|
||
|
#
|
||
|
|
||
|
apache_content_template(munin)
|
||
|
+apache_content_alias_template(munin, munin)
|
||
|
|
||
|
-manage_dirs_pattern(munin_t, httpd_munin_content_t, httpd_munin_content_t)
|
||
|
-manage_files_pattern(munin_t, httpd_munin_content_t, httpd_munin_content_t)
|
||
|
+manage_dirs_pattern(munin_t, munin_content_t, munin_content_t)
|
||
|
+manage_files_pattern(munin_t, munin_content_t, munin_content_t)
|
||
|
|
||
|
-manage_dirs_pattern(httpd_munin_script_t, httpd_munin_script_tmp_t, httpd_munin_script_tmp_t)
|
||
|
-manage_files_pattern(httpd_munin_script_t, httpd_munin_script_tmp_t,httpd_munin_script_tmp_t)
|
||
|
+manage_dirs_pattern(munin_script_t, munin_script_tmp_t, munin_script_tmp_t)
|
||
|
+manage_files_pattern(munin_script_t, munin_script_tmp_t,munin_script_tmp_t)
|
||
|
|
||
|
-read_files_pattern(httpd_munin_script_t, munin_var_lib_t, munin_var_lib_t)
|
||
|
-read_files_pattern(httpd_munin_script_t, munin_etc_t, munin_etc_t)
|
||
|
+read_files_pattern(munin_script_t, munin_var_lib_t, munin_var_lib_t)
|
||
|
+read_files_pattern(munin_script_t, munin_etc_t, munin_etc_t)
|
||
|
|
||
|
-read_files_pattern(httpd_munin_script_t, munin_log_t, munin_log_t)
|
||
|
-append_files_pattern(httpd_munin_script_t, munin_log_t, munin_log_t)
|
||
|
+read_files_pattern(munin_script_t, munin_log_t, munin_log_t)
|
||
|
+append_files_pattern(munin_script_t, munin_log_t, munin_log_t)
|
||
|
|
||
|
-files_search_var_lib(httpd_munin_script_t)
|
||
|
+files_search_var_lib(munin_script_t)
|
||
|
|
||
|
-auth_read_passwd(httpd_munin_script_t)
|
||
|
+auth_read_passwd(munin_script_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_search_sys_content(munin_t)
|
||
|
diff --git a/mythtv.fc b/mythtv.fc
|
||
|
index 3a1c423..d62cf88 100644
|
||
|
--- a/mythtv.fc
|
||
|
+++ b/mythtv.fc
|
||
|
@@ -1,9 +1,9 @@
|
||
|
-/usr/share/mythweb/mythweb\.pl -- gen_context(system_u:object_r:httpd_mythtv_script_exec_t,s0)
|
||
|
+/usr/share/mythweb/mythweb\.pl -- gen_context(system_u:object_r:mythtv_script_exec_t,s0)
|
||
|
|
||
|
/var/lib/mythtv(/.*)? gen_context(system_u:object_r:mythtv_var_lib_t,s0)
|
||
|
|
||
|
/var/log/mythtv(/.*)? gen_context(system_u:object_r:mythtv_var_log_t,s0)
|
||
|
|
||
|
-/usr/share/mythtv(/.*)? gen_context(system_u:object_r:httpd_mythtv_content_t,s0)
|
||
|
-/usr/share/mythweb(/.*)? gen_context(system_u:object_r:httpd_mythtv_content_t,s0)
|
||
|
-/usr/share/mythtv/mythweather/scripts(/.*)? gen_context(system_u:object_r:httpd_mythtv_script_exec_t,s0)
|
||
|
+/usr/share/mythtv(/.*)? gen_context(system_u:object_r:mythtv_content_t,s0)
|
||
|
+/usr/share/mythweb(/.*)? gen_context(system_u:object_r:mythtv_content_t,s0)
|
||
|
+/usr/share/mythtv/mythweather/scripts(/.*)? gen_context(system_u:object_r:mythtv_script_exec_t,s0)
|
||
|
diff --git a/mythtv.if b/mythtv.if
|
||
|
index 171f666..e2403dd 100644
|
||
|
--- a/mythtv.if
|
||
|
+++ b/mythtv.if
|
||
|
@@ -1,9 +1,9 @@
|
||
|
|
||
|
-## <summary>policy for httpd_mythtv_script</summary>
|
||
|
+## <summary>policy for mythtv_script</summary>
|
||
|
|
||
|
########################################
|
||
|
## <summary>
|
||
|
-## Execute TEMPLATE in the httpd_mythtv_script domin.
|
||
|
+## Execute TEMPLATE in the mythtv_script domin.
|
||
|
## </summary>
|
||
|
## <param name="domain">
|
||
|
## <summary>
|
||
|
@@ -11,13 +11,13 @@
|
||
|
## </summary>
|
||
|
## </param>
|
||
|
#
|
||
|
-interface(`httpd_mythtv_script_domtrans',`
|
||
|
+interface(`mythtv_script_domtrans',`
|
||
|
gen_require(`
|
||
|
- type httpd_mythtv_script_t, httpd_mythtv_script_exec_t;
|
||
|
+ type mythtv_script_t, mythtv_script_exec_t;
|
||
|
')
|
||
|
|
||
|
corecmd_search_bin($1)
|
||
|
- domtrans_pattern($1, httpd_mythtv_script_exec_t, httpd_mythtv_script_t)
|
||
|
+ domtrans_pattern($1, mythtv_script_exec_t, mythtv_script_t)
|
||
|
')
|
||
|
|
||
|
#######################################
|
||
|
@@ -133,15 +133,15 @@ interface(`mythtv_manage_log',`
|
||
|
#
|
||
|
interface(`mythtv_admin',`
|
||
|
gen_require(`
|
||
|
- type httpd_mythtv_script_t, mythtv_var_lib_t;
|
||
|
+ type mythtv_script_t, mythtv_var_lib_t;
|
||
|
type mythtv_var_log_t;
|
||
|
')
|
||
|
|
||
|
- allow $1 httpd_mythtv_script_t:process signal_perms;
|
||
|
- ps_process_pattern($1, httpd_mythtv_script_t)
|
||
|
+ allow $1 mythtv_script_t:process signal_perms;
|
||
|
+ ps_process_pattern($1, mythtv_script_t)
|
||
|
|
||
|
tunable_policy(`deny_ptrace',`',`
|
||
|
- allow $1 httpd_mythtv_script_t:process ptrace;
|
||
|
+ allow $1 mythtv_script_t:process ptrace;
|
||
|
')
|
||
|
|
||
|
logging_list_logs($1)
|
||
|
diff --git a/mythtv.te b/mythtv.te
|
||
|
index 90129ac..7a4910c 100644
|
||
|
--- a/mythtv.te
|
||
|
+++ b/mythtv.te
|
||
|
@@ -6,6 +6,7 @@ policy_module(mythtv, 1.0.0)
|
||
|
#
|
||
|
|
||
|
apache_content_template(mythtv)
|
||
|
+apache_content_alias_template(mythtv, mythtv)
|
||
|
|
||
|
type mythtv_var_lib_t;
|
||
|
files_type(mythtv_var_lib_t)
|
||
|
@@ -15,27 +16,27 @@ logging_log_file(mythtv_var_log_t)
|
||
|
|
||
|
########################################
|
||
|
#
|
||
|
-# httpd_mythtv_script local policy
|
||
|
+# mythtv_script local policy
|
||
|
#
|
||
|
|
||
|
-manage_files_pattern(httpd_mythtv_script_t, mythtv_var_lib_t, mythtv_var_lib_t)
|
||
|
-manage_dirs_pattern(httpd_mythtv_script_t, mythtv_var_lib_t, mythtv_var_lib_t)
|
||
|
-files_var_lib_filetrans(httpd_mythtv_script_t, mythtv_var_lib_t, { dir file })
|
||
|
+manage_files_pattern(mythtv_script_t, mythtv_var_lib_t, mythtv_var_lib_t)
|
||
|
+manage_dirs_pattern(mythtv_script_t, mythtv_var_lib_t, mythtv_var_lib_t)
|
||
|
+files_var_lib_filetrans(mythtv_script_t, mythtv_var_lib_t, { dir file })
|
||
|
|
||
|
-manage_files_pattern(httpd_mythtv_script_t, mythtv_var_log_t, mythtv_var_log_t)
|
||
|
-manage_dirs_pattern(httpd_mythtv_script_t, mythtv_var_log_t, mythtv_var_log_t)
|
||
|
-logging_log_filetrans(httpd_mythtv_script_t, mythtv_var_log_t, file )
|
||
|
+manage_files_pattern(mythtv_script_t, mythtv_var_log_t, mythtv_var_log_t)
|
||
|
+manage_dirs_pattern(mythtv_script_t, mythtv_var_log_t, mythtv_var_log_t)
|
||
|
+logging_log_filetrans(mythtv_script_t, mythtv_var_log_t, file )
|
||
|
|
||
|
-domain_use_interactive_fds(httpd_mythtv_script_t)
|
||
|
+domain_use_interactive_fds(mythtv_script_t)
|
||
|
|
||
|
-files_read_etc_files(httpd_mythtv_script_t)
|
||
|
+files_read_etc_files(mythtv_script_t)
|
||
|
|
||
|
-fs_read_nfs_files(httpd_mythtv_script_t)
|
||
|
+fs_read_nfs_files(mythtv_script_t)
|
||
|
|
||
|
-miscfiles_read_localization(httpd_mythtv_script_t)
|
||
|
+miscfiles_read_localization(mythtv_script_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
- mysql_read_config(httpd_mythtv_script_t)
|
||
|
- mysql_stream_connect(httpd_mythtv_script_t)
|
||
|
- mysql_tcp_connect(httpd_mythtv_script_t)
|
||
|
+ mysql_read_config(mythtv_script_t)
|
||
|
+ mysql_stream_connect(mythtv_script_t)
|
||
|
+ mysql_tcp_connect(mythtv_script_t)
|
||
|
')
|
||
|
diff --git a/nagios.fc b/nagios.fc
|
||
|
index a00cc2d..24a2dec 100644
|
||
|
--- a/nagios.fc
|
||
|
+++ b/nagios.fc
|
||
|
@@ -6,8 +6,8 @@
|
||
|
/usr/s?bin/nagios -- gen_context(system_u:object_r:nagios_exec_t,s0)
|
||
|
/usr/s?bin/nrpe -- gen_context(system_u:object_r:nrpe_exec_t,s0)
|
||
|
|
||
|
-/usr/lib/cgi-bin/netsaint(/.*)? gen_context(system_u:object_r:httpd_nagios_script_exec_t,s0)
|
||
|
-/usr/lib/nagios/cgi(/.*)? gen_context(system_u:object_r:httpd_nagios_script_exec_t,s0)
|
||
|
+/usr/lib/cgi-bin/netsaint(/.*)? gen_context(system_u:object_r:nagios_script_exec_t,s0)
|
||
|
+/usr/lib/nagios/cgi(/.*)? gen_context(system_u:object_r:nagios_script_exec_t,s0)
|
||
|
|
||
|
/var/log/nagios(/.*)? gen_context(system_u:object_r:nagios_log_t,s0)
|
||
|
/var/log/netsaint(/.*)? gen_context(system_u:object_r:nagios_log_t,s0)
|
||
|
@@ -19,8 +19,8 @@
|
||
|
ifdef(`distro_debian',`
|
||
|
/usr/sbin/nagios -- gen_context(system_u:object_r:nagios_exec_t,s0)
|
||
|
')
|
||
|
-/usr/lib/cgi-bin/nagios(/.+)? gen_context(system_u:object_r:httpd_nagios_script_exec_t,s0)
|
||
|
-/usr/lib/nagios/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_nagios_script_exec_t,s0)
|
||
|
+/usr/lib/cgi-bin/nagios(/.+)? gen_context(system_u:object_r:nagios_script_exec_t,s0)
|
||
|
+/usr/lib/nagios/cgi-bin(/.*)? gen_context(system_u:object_r:nagios_script_exec_t,s0)
|
||
|
|
||
|
# admin plugins
|
||
|
/usr/lib/nagios/plugins/check_file_age -- gen_context(system_u:object_r:nagios_admin_plugin_exec_t,s0)
|
||
|
diff --git a/nagios.te b/nagios.te
|
||
|
index f565a0e..1726e88 100644
|
||
|
--- a/nagios.te
|
||
|
+++ b/nagios.te
|
||
|
@@ -186,33 +186,34 @@ optional_policy(`
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(nagios)
|
||
|
- typealias httpd_nagios_script_t alias nagios_cgi_t;
|
||
|
- typealias httpd_nagios_script_exec_t alias nagios_cgi_exec_t;
|
||
|
+ apache_content_alias_template(nagios, nagios)
|
||
|
+ typealias nagios_script_t alias nagios_cgi_t;
|
||
|
+ typealias nagios_script_exec_t alias nagios_cgi_exec_t;
|
||
|
|
||
|
- allow httpd_nagios_script_t self:process signal_perms;
|
||
|
+ allow nagios_script_t self:process signal_perms;
|
||
|
|
||
|
- read_files_pattern(httpd_nagios_script_t, nagios_t, nagios_t)
|
||
|
- read_lnk_files_pattern(httpd_nagios_script_t, nagios_t, nagios_t)
|
||
|
+ read_files_pattern(nagios_script_t, nagios_t, nagios_t)
|
||
|
+ read_lnk_files_pattern(nagios_script_t, nagios_t, nagios_t)
|
||
|
|
||
|
- allow httpd_nagios_script_t nagios_etc_t:dir list_dir_perms;
|
||
|
- allow httpd_nagios_script_t nagios_etc_t:file read_file_perms;
|
||
|
- allow httpd_nagios_script_t nagios_etc_t:lnk_file read_lnk_file_perms;
|
||
|
+ allow nagios_script_t nagios_etc_t:dir list_dir_perms;
|
||
|
+ allow nagios_script_t nagios_etc_t:file read_file_perms;
|
||
|
+ allow nagios_script_t nagios_etc_t:lnk_file read_lnk_file_perms;
|
||
|
|
||
|
- files_search_spool(httpd_nagios_script_t)
|
||
|
- rw_fifo_files_pattern(httpd_nagios_script_t, nagios_spool_t, nagios_spool_t)
|
||
|
+ files_search_spool(nagios_script_t)
|
||
|
+ rw_fifo_files_pattern(nagios_script_t, nagios_spool_t, nagios_spool_t)
|
||
|
|
||
|
- allow httpd_nagios_script_t nagios_log_t:dir list_dir_perms;
|
||
|
- read_files_pattern(httpd_nagios_script_t, nagios_etc_t, nagios_log_t)
|
||
|
- read_lnk_files_pattern(httpd_nagios_script_t, nagios_etc_t, nagios_log_t)
|
||
|
+ allow nagios_script_t nagios_log_t:dir list_dir_perms;
|
||
|
+ read_files_pattern(nagios_script_t, nagios_etc_t, nagios_log_t)
|
||
|
+ read_lnk_files_pattern(nagios_script_t, nagios_etc_t, nagios_log_t)
|
||
|
|
||
|
- kernel_read_system_state(httpd_nagios_script_t)
|
||
|
+ kernel_read_system_state(nagios_script_t)
|
||
|
|
||
|
- domain_dontaudit_read_all_domains_state(httpd_nagios_script_t)
|
||
|
+ domain_dontaudit_read_all_domains_state(nagios_script_t)
|
||
|
|
||
|
- files_read_etc_runtime_files(httpd_nagios_script_t)
|
||
|
- files_read_kernel_symbol_table(httpd_nagios_script_t)
|
||
|
+ files_read_etc_runtime_files(nagios_script_t)
|
||
|
+ files_read_kernel_symbol_table(nagios_script_t)
|
||
|
|
||
|
- logging_send_syslog_msg(httpd_nagios_script_t)
|
||
|
+ logging_send_syslog_msg(nagios_script_t)
|
||
|
')
|
||
|
|
||
|
########################################
|
||
|
diff --git a/nut.fc b/nut.fc
|
||
|
index 41ff159..fac7d7b 100644
|
||
|
--- a/nut.fc
|
||
|
+++ b/nut.fc
|
||
|
@@ -11,6 +11,6 @@
|
||
|
|
||
|
/var/run/nut(/.*)? gen_context(system_u:object_r:nut_var_run_t,s0)
|
||
|
|
||
|
-/var/www/nut-cgi-bin/upsimage\.cgi -- gen_context(system_u:object_r:httpd_nutups_cgi_script_exec_t,s0)
|
||
|
-/var/www/nut-cgi-bin/upsset\.cgi -- gen_context(system_u:object_r:httpd_nutups_cgi_script_exec_t,s0)
|
||
|
-/var/www/nut-cgi-bin/upsstats\.cgi -- gen_context(system_u:object_r:httpd_nutups_cgi_script_exec_t,s0)
|
||
|
+/var/www/nut-cgi-bin/upsimage\.cgi -- gen_context(system_u:object_r:nutups_cgi_script_exec_t,s0)
|
||
|
+/var/www/nut-cgi-bin/upsset\.cgi -- gen_context(system_u:object_r:nutups_cgi_script_exec_t,s0)
|
||
|
+/var/www/nut-cgi-bin/upsstats\.cgi -- gen_context(system_u:object_r:nutups_cgi_script_exec_t,s0)
|
||
|
diff --git a/nut.te b/nut.te
|
||
|
index 1701352..249224e 100644
|
||
|
--- a/nut.te
|
||
|
+++ b/nut.te
|
||
|
@@ -166,17 +166,18 @@ logging_send_syslog_msg(nut_upsdrvctl_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(nutups_cgi)
|
||
|
+ apache_content_alias_template(nutups_cgi,nutups_cgi)
|
||
|
|
||
|
- read_files_pattern(httpd_nutups_cgi_script_t, nut_conf_t, nut_conf_t)
|
||
|
+ read_files_pattern(nutups_cgi_script_t, nut_conf_t, nut_conf_t)
|
||
|
|
||
|
- corenet_all_recvfrom_netlabel(httpd_nutups_cgi_script_t)
|
||
|
- corenet_tcp_sendrecv_generic_if(httpd_nutups_cgi_script_t)
|
||
|
- corenet_tcp_sendrecv_generic_node(httpd_nutups_cgi_script_t)
|
||
|
- corenet_tcp_sendrecv_all_ports(httpd_nutups_cgi_script_t)
|
||
|
- corenet_tcp_connect_ups_port(httpd_nutups_cgi_script_t)
|
||
|
- corenet_udp_sendrecv_generic_if(httpd_nutups_cgi_script_t)
|
||
|
- corenet_udp_sendrecv_generic_node(httpd_nutups_cgi_script_t)
|
||
|
- corenet_udp_sendrecv_all_ports(httpd_nutups_cgi_script_t)
|
||
|
+ corenet_all_recvfrom_netlabel(nutups_cgi_script_t)
|
||
|
+ corenet_tcp_sendrecv_generic_if(nutups_cgi_script_t)
|
||
|
+ corenet_tcp_sendrecv_generic_node(nutups_cgi_script_t)
|
||
|
+ corenet_tcp_sendrecv_all_ports(nutups_cgi_script_t)
|
||
|
+ corenet_tcp_connect_ups_port(nutups_cgi_script_t)
|
||
|
+ corenet_udp_sendrecv_generic_if(nutups_cgi_script_t)
|
||
|
+ corenet_udp_sendrecv_generic_node(nutups_cgi_script_t)
|
||
|
+ corenet_udp_sendrecv_all_ports(nutups_cgi_script_t)
|
||
|
|
||
|
- sysnet_dns_name_resolve(httpd_nutups_cgi_script_t)
|
||
|
+ sysnet_dns_name_resolve(nutups_cgi_script_t)
|
||
|
')
|
||
|
diff --git a/openshift.fc b/openshift.fc
|
||
|
index f2d6119..71ba1bd 100644
|
||
|
--- a/openshift.fc
|
||
|
+++ b/openshift.fc
|
||
|
@@ -18,7 +18,7 @@
|
||
|
/usr/s?bin/(oo|rhc)-cgroup-read -- gen_context(system_u:object_r:openshift_cgroup_read_exec_t,s0)
|
||
|
|
||
|
/usr/s?bin/(oo|rhc)-restorer -- gen_context(system_u:object_r:openshift_initrc_exec_t,s0)
|
||
|
-/usr/s?bin/(oo|rhc)-restorer-wrapper.sh -- gen_context(system_u:object_r:httpd_openshift_script_exec_t,s0)
|
||
|
+/usr/s?bin/(oo|rhc)-restorer-wrapper.sh -- gen_context(system_u:object_r:openshift_script_exec_t,s0)
|
||
|
/usr/s?bin/oo-admin-ctl-gears -- gen_context(system_u:object_r:openshift_initrc_exec_t,s0)
|
||
|
/usr/s?bin/mcollectived -- gen_context(system_u:object_r:openshift_initrc_exec_t,s0)
|
||
|
|
||
|
diff --git a/openshift.te b/openshift.te
|
||
|
index cd25e8e..7965e82 100644
|
||
|
--- a/openshift.te
|
||
|
+++ b/openshift.te
|
||
|
@@ -294,13 +294,14 @@ optional_policy(`
|
||
|
# openshift cgi script policy
|
||
|
#
|
||
|
apache_content_template(openshift)
|
||
|
- domtrans_pattern(httpd_openshift_script_t, openshift_initrc_exec_t, openshift_initrc_t)
|
||
|
+ apache_content_alias_template(openshift, openshift)
|
||
|
+ domtrans_pattern(openshift_script_t, openshift_initrc_exec_t, openshift_initrc_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
- dbus_system_bus_client(httpd_openshift_script_t)
|
||
|
+ dbus_system_bus_client(openshift_script_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
- oddjob_dbus_chat(httpd_openshift_script_t)
|
||
|
+ oddjob_dbus_chat(openshift_script_t)
|
||
|
oddjob_dontaudit_rw_fifo_file(openshift_domain)
|
||
|
')
|
||
|
')
|
||
|
diff --git a/pki.if b/pki.if
|
||
|
index b975b85..798efb6 100644
|
||
|
--- a/pki.if
|
||
|
+++ b/pki.if
|
||
|
@@ -134,13 +134,6 @@ template(`pki_apache_template',`
|
||
|
|
||
|
# need to resolve addresses?
|
||
|
auth_use_nsswitch($1_t)
|
||
|
-
|
||
|
- #pki_apache_domain_signal(httpd_t)
|
||
|
- #pki_apache_domain_signal(httpd_t)
|
||
|
- #pki_manage_apache_run(httpd_t)
|
||
|
- #pki_manage_apache_config_files(httpd_t)
|
||
|
- #pki_manage_apache_log_files(httpd_t)
|
||
|
- #pki_manage_apache_lib(httpd_t)
|
||
|
')
|
||
|
|
||
|
#######################################
|
||
|
diff --git a/pki.te b/pki.te
|
||
|
index 17f5d18..d656f71 100644
|
||
|
--- a/pki.te
|
||
|
+++ b/pki.te
|
||
|
@@ -43,7 +43,6 @@ typealias pki_tomcat_etc_rw_t alias { pki_ca_etc_rw_t pki_kra_etc_rw_t pki_ocsp_
|
||
|
typealias pki_tomcat_var_lib_t alias { pki_ca_var_lib_t pki_kra_var_lib_t pki_ocsp_var_lib_t pki_tks_var_lib_t };
|
||
|
typealias pki_tomcat_var_run_t alias { pki_ca_var_run_t pki_kra_var_run_t pki_ocsp_var_run_t pki_tks_var_run_t };
|
||
|
typealias pki_tomcat_log_t alias { pki_ca_log_t pki_kra_log_t pki_ocsp_log_t pki_tks_log_t };
|
||
|
-# typealias http_port_t alias { pki_ca_port_t pki_kra_port_t pki_ocsp_port_t pki_tks_port_t };
|
||
|
|
||
|
|
||
|
# pki policy types
|
||
|
@@ -126,10 +125,6 @@ miscfiles_read_hwdata(pki_tomcat_t)
|
||
|
userdom_manage_user_tmp_dirs(pki_tomcat_t)
|
||
|
userdom_manage_user_tmp_files(pki_tomcat_t)
|
||
|
|
||
|
-# forward proxy
|
||
|
-# need to define ports to fix this
|
||
|
-#corenet_tcp_connect_pki_tomcat_port(httpd_t)
|
||
|
-
|
||
|
# for crl publishing
|
||
|
allow pki_tomcat_t pki_tomcat_var_lib_t:lnk_file { rename create unlink };
|
||
|
|
||
|
@@ -166,9 +161,6 @@ corenet_tcp_connect_pki_tks_port(pki_tps_t)
|
||
|
|
||
|
files_exec_usr_files(pki_tps_t)
|
||
|
|
||
|
-# why do I need to add this?
|
||
|
-#allow httpd_t httpd_config_t:file execute;
|
||
|
-
|
||
|
######################################
|
||
|
#
|
||
|
# ra local policy
|
||
|
@@ -268,13 +260,8 @@ optional_policy(`
|
||
|
apache_list_modules(pki_apache_domain)
|
||
|
apache_read_config(pki_apache_domain)
|
||
|
apache_exec(pki_apache_domain)
|
||
|
- apache_exec_suexec(pki_apache_domain)
|
||
|
+ apache_exec_suexec(pki_apache_domain)
|
||
|
apache_entrypoint(pki_apache_domain)
|
||
|
-
|
||
|
- # should be started using a script which will execute httpd
|
||
|
- # start up httpd in pki_apache_domain mode
|
||
|
- #can_exec(pki_apache_domain, httpd_config_t)
|
||
|
- #can_exec(pki_apache_domain, httpd_suexec_exec_t)
|
||
|
')
|
||
|
|
||
|
# allow rpm -q in init scripts
|
||
|
diff --git a/prelude.fc b/prelude.fc
|
||
|
index 8dbc763..b580f85 100644
|
||
|
--- a/prelude.fc
|
||
|
+++ b/prelude.fc
|
||
|
@@ -12,7 +12,7 @@
|
||
|
|
||
|
/usr/sbin/audisp-prelude -- gen_context(system_u:object_r:prelude_audisp_exec_t,s0)
|
||
|
|
||
|
-/usr/share/prewikka/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_prewikka_script_exec_t,s0)
|
||
|
+/usr/share/prewikka/cgi-bin(/.*)? gen_context(system_u:object_r:prewikka_script_exec_t,s0)
|
||
|
|
||
|
/var/lib/prelude-lml(/.*)? gen_context(system_u:object_r:prelude_var_lib_t,s0)
|
||
|
|
||
|
diff --git a/prelude.te b/prelude.te
|
||
|
index 509fd0a..e1f4f70 100644
|
||
|
--- a/prelude.te
|
||
|
+++ b/prelude.te
|
||
|
@@ -265,27 +265,28 @@ optional_policy(`
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(prewikka)
|
||
|
+ apache_content_alias_template(prewikka, prewikka)
|
||
|
|
||
|
- can_exec(httpd_prewikka_script_t, httpd_prewikka_script_exec_t)
|
||
|
+ can_exec(prewikka_script_t, prewikka_script_exec_t)
|
||
|
|
||
|
- files_search_tmp(httpd_prewikka_script_t)
|
||
|
+ files_search_tmp(prewikka_script_t)
|
||
|
|
||
|
- kernel_read_sysctl(httpd_prewikka_script_t)
|
||
|
- kernel_search_network_sysctl(httpd_prewikka_script_t)
|
||
|
+ kernel_read_sysctl(prewikka_script_t)
|
||
|
+ kernel_search_network_sysctl(prewikka_script_t)
|
||
|
|
||
|
- auth_use_nsswitch(httpd_prewikka_script_t)
|
||
|
+ auth_use_nsswitch(prewikka_script_t)
|
||
|
|
||
|
- logging_send_syslog_msg(httpd_prewikka_script_t)
|
||
|
+ logging_send_syslog_msg(prewikka_script_t)
|
||
|
|
||
|
- apache_search_sys_content(httpd_prewikka_script_t)
|
||
|
+ apache_search_sys_content(prewikka_script_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
- mysql_stream_connect(httpd_prewikka_script_t)
|
||
|
- mysql_tcp_connect(httpd_prewikka_script_t)
|
||
|
+ mysql_stream_connect(prewikka_script_t)
|
||
|
+ mysql_tcp_connect(prewikka_script_t)
|
||
|
')
|
||
|
|
||
|
optional_policy(`
|
||
|
- postgresql_stream_connect(httpd_prewikka_script_t)
|
||
|
- postgresql_tcp_connect(httpd_prewikka_script_t)
|
||
|
+ postgresql_stream_connect(prewikka_script_t)
|
||
|
+ postgresql_tcp_connect(prewikka_script_t)
|
||
|
')
|
||
|
')
|
||
|
diff --git a/smokeping.fc b/smokeping.fc
|
||
|
index 3359819..a231ecb 100644
|
||
|
--- a/smokeping.fc
|
||
|
+++ b/smokeping.fc
|
||
|
@@ -2,7 +2,7 @@
|
||
|
|
||
|
/usr/sbin/smokeping -- gen_context(system_u:object_r:smokeping_exec_t,s0)
|
||
|
|
||
|
-/usr/share/smokeping/cgi(/.*)? gen_context(system_u:object_r:httpd_smokeping_cgi_script_exec_t,s0)
|
||
|
+/usr/share/smokeping/cgi(/.*)? gen_context(system_u:object_r:smokeping_cgi_script_exec_t,s0)
|
||
|
|
||
|
/var/lib/smokeping(/.*)? gen_context(system_u:object_r:smokeping_var_lib_t,s0)
|
||
|
|
||
|
diff --git a/smokeping.te b/smokeping.te
|
||
|
index ebf575f..26b6da1 100644
|
||
|
--- a/smokeping.te
|
||
|
+++ b/smokeping.te
|
||
|
@@ -58,19 +58,20 @@ netutils_domtrans_ping(smokeping_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(smokeping_cgi)
|
||
|
+ apache_content_alias_template(smokeping_cgi, smokeping_cgi)
|
||
|
|
||
|
- manage_dirs_pattern(httpd_smokeping_cgi_script_t, smokeping_var_lib_t, smokeping_var_lib_t)
|
||
|
- manage_files_pattern(httpd_smokeping_cgi_script_t, smokeping_var_lib_t, smokeping_var_lib_t)
|
||
|
+ manage_dirs_pattern(smokeping_cgi_script_t, smokeping_var_lib_t, smokeping_var_lib_t)
|
||
|
+ manage_files_pattern(smokeping_cgi_script_t, smokeping_var_lib_t, smokeping_var_lib_t)
|
||
|
|
||
|
- getattr_files_pattern(httpd_smokeping_cgi_script_t, smokeping_var_run_t, smokeping_var_run_t)
|
||
|
+ getattr_files_pattern(smokeping_cgi_script_t, smokeping_var_run_t, smokeping_var_run_t)
|
||
|
|
||
|
- files_read_etc_files(httpd_smokeping_cgi_script_t)
|
||
|
- files_search_tmp(httpd_smokeping_cgi_script_t)
|
||
|
- files_search_var_lib(httpd_smokeping_cgi_script_t)
|
||
|
+ files_read_etc_files(smokeping_cgi_script_t)
|
||
|
+ files_search_tmp(smokeping_cgi_script_t)
|
||
|
+ files_search_var_lib(smokeping_cgi_script_t)
|
||
|
|
||
|
- auth_read_passwd(httpd_smokeping_cgi_script_t)
|
||
|
+ auth_read_passwd(smokeping_cgi_script_t)
|
||
|
|
||
|
- sysnet_dns_name_resolve(httpd_smokeping_cgi_script_t)
|
||
|
+ sysnet_dns_name_resolve(smokeping_cgi_script_t)
|
||
|
|
||
|
- netutils_domtrans_ping(httpd_smokeping_cgi_script_t)
|
||
|
+ netutils_domtrans_ping(smokeping_cgi_script_t)
|
||
|
')
|
||
|
diff --git a/squid.fc b/squid.fc
|
||
|
index ebbec17..5b066d3 100644
|
||
|
--- a/squid.fc
|
||
|
+++ b/squid.fc
|
||
|
@@ -2,14 +2,14 @@
|
||
|
/etc/squid(/.*)? gen_context(system_u:object_r:squid_conf_t,s0)
|
||
|
/etc/lightsquid(/.*)? gen_context(system_u:object_r:squid_conf_t,s0)
|
||
|
|
||
|
-/usr/lib/squid/cachemgr\.cgi -- gen_context(system_u:object_r:httpd_squid_script_exec_t,s0)
|
||
|
+/usr/lib/squid/cachemgr\.cgi -- gen_context(system_u:object_r:squid_script_exec_t,s0)
|
||
|
|
||
|
/usr/sbin/lightparser.pl -- gen_context(system_u:object_r:squid_cron_exec_t,s0)
|
||
|
|
||
|
/usr/sbin/squid -- gen_context(system_u:object_r:squid_exec_t,s0)
|
||
|
|
||
|
/usr/share/squid(/.*)? gen_context(system_u:object_r:squid_conf_t,s0)
|
||
|
-/usr/share/lightsquid/cgi(/.*)? gen_context(system_u:object_r:httpd_squid_script_exec_t,s0)
|
||
|
+/usr/share/lightsquid/cgi(/.*)? gen_context(system_u:object_r:squid_script_exec_t,s0)
|
||
|
|
||
|
/var/cache/squid(/.*)? gen_context(system_u:object_r:squid_cache_t,s0)
|
||
|
|
||
|
diff --git a/squid.te b/squid.te
|
||
|
index 7cb8bec..4ade5f1 100644
|
||
|
--- a/squid.te
|
||
|
+++ b/squid.te
|
||
|
@@ -201,24 +201,25 @@ tunable_policy(`squid_use_tproxy',`
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(squid)
|
||
|
+ apache_content_alias_template(squid, squid)
|
||
|
|
||
|
- allow httpd_squid_script_t self:tcp_socket create_socket_perms;
|
||
|
+ allow squid_script_t self:tcp_socket create_socket_perms;
|
||
|
|
||
|
- corenet_all_recvfrom_unlabeled(httpd_squid_script_t)
|
||
|
- corenet_all_recvfrom_netlabel(httpd_squid_script_t)
|
||
|
- corenet_tcp_sendrecv_generic_if(httpd_squid_script_t)
|
||
|
- corenet_tcp_sendrecv_generic_node(httpd_squid_script_t)
|
||
|
+ corenet_all_recvfrom_unlabeled(squid_script_t)
|
||
|
+ corenet_all_recvfrom_netlabel(squid_script_t)
|
||
|
+ corenet_tcp_sendrecv_generic_if(squid_script_t)
|
||
|
+ corenet_tcp_sendrecv_generic_node(squid_script_t)
|
||
|
|
||
|
- corenet_sendrecv_http_cache_client_packets(httpd_squid_script_t)
|
||
|
- corenet_tcp_connect_http_cache_port(httpd_squid_script_t)
|
||
|
- corenet_tcp_sendrecv_http_cache_port(httpd_squid_script_t)
|
||
|
+ corenet_sendrecv_http_cache_client_packets(squid_script_t)
|
||
|
+ corenet_tcp_connect_http_cache_port(squid_script_t)
|
||
|
+ corenet_tcp_sendrecv_http_cache_port(squid_script_t)
|
||
|
|
||
|
- corenet_tcp_connect_squid_port(httpd_squid_script_t)
|
||
|
+ corenet_tcp_connect_squid_port(squid_script_t)
|
||
|
|
||
|
- sysnet_dns_name_resolve(httpd_squid_script_t)
|
||
|
+ sysnet_dns_name_resolve(squid_script_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
- squid_read_config(httpd_squid_script_t)
|
||
|
+ squid_read_config(squid_script_t)
|
||
|
')
|
||
|
')
|
||
|
|
||
|
diff --git a/w3c.fc b/w3c.fc
|
||
|
index 463c799..227feaf 100644
|
||
|
--- a/w3c.fc
|
||
|
+++ b/w3c.fc
|
||
|
@@ -1,4 +1,4 @@
|
||
|
-/usr/lib/cgi-bin/check -- gen_context(system_u:object_r:httpd_w3c_validator_script_exec_t,s0)
|
||
|
+/usr/lib/cgi-bin/check -- gen_context(system_u:object_r:w3c_validator_script_exec_t,s0)
|
||
|
|
||
|
-/usr/share/w3c-markup-validator(/.*)? gen_context(system_u:object_r:httpd_w3c_validator_content_t,s0)
|
||
|
-/usr/share/w3c-markup-validator/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_w3c_validator_script_exec_t,s0)
|
||
|
+/usr/share/w3c-markup-validator(/.*)? gen_context(system_u:object_r:w3c_validator_content_t,s0)
|
||
|
+/usr/share/w3c-markup-validator/cgi-bin(/.*)? gen_context(system_u:object_r:w3c_validator_script_exec_t,s0)
|
||
|
diff --git a/w3c.te b/w3c.te
|
||
|
index b14d6a9..ac1944e 100644
|
||
|
--- a/w3c.te
|
||
|
+++ b/w3c.te
|
||
|
@@ -6,29 +6,30 @@ policy_module(w3c, 1.1.0)
|
||
|
#
|
||
|
|
||
|
apache_content_template(w3c_validator)
|
||
|
+apache_content_alias_template(w3c_validator, w3c_validator)
|
||
|
|
||
|
########################################
|
||
|
#
|
||
|
# Local policy
|
||
|
#
|
||
|
|
||
|
-corenet_all_recvfrom_unlabeled(httpd_w3c_validator_script_t)
|
||
|
-corenet_all_recvfrom_netlabel(httpd_w3c_validator_script_t)
|
||
|
-corenet_tcp_sendrecv_generic_if(httpd_w3c_validator_script_t)
|
||
|
-corenet_tcp_sendrecv_generic_node(httpd_w3c_validator_script_t)
|
||
|
+corenet_all_recvfrom_unlabeled(w3c_validator_script_t)
|
||
|
+corenet_all_recvfrom_netlabel(w3c_validator_script_t)
|
||
|
+corenet_tcp_sendrecv_generic_if(w3c_validator_script_t)
|
||
|
+corenet_tcp_sendrecv_generic_node(w3c_validator_script_t)
|
||
|
|
||
|
-corenet_sendrecv_ftp_client_packets(httpd_w3c_validator_script_t)
|
||
|
-corenet_tcp_connect_ftp_port(httpd_w3c_validator_script_t)
|
||
|
-corenet_tcp_sendrecv_ftp_port(httpd_w3c_validator_script_t)
|
||
|
+corenet_sendrecv_ftp_client_packets(w3c_validator_script_t)
|
||
|
+corenet_tcp_connect_ftp_port(w3c_validator_script_t)
|
||
|
+corenet_tcp_sendrecv_ftp_port(w3c_validator_script_t)
|
||
|
|
||
|
-corenet_sendrecv_http_client_packets(httpd_w3c_validator_script_t)
|
||
|
-corenet_tcp_connect_http_port(httpd_w3c_validator_script_t)
|
||
|
-corenet_tcp_sendrecv_http_port(httpd_w3c_validator_script_t)
|
||
|
+corenet_sendrecv_http_client_packets(w3c_validator_script_t)
|
||
|
+corenet_tcp_connect_http_port(w3c_validator_script_t)
|
||
|
+corenet_tcp_sendrecv_http_port(w3c_validator_script_t)
|
||
|
|
||
|
-corenet_sendrecv_http_cache_client_packets(httpd_w3c_validator_script_t)
|
||
|
-corenet_tcp_connect_http_cache_port(httpd_w3c_validator_script_t)
|
||
|
-corenet_tcp_sendrecv_http_cache_port(httpd_w3c_validator_script_t)
|
||
|
+corenet_sendrecv_http_cache_client_packets(w3c_validator_script_t)
|
||
|
+corenet_tcp_connect_http_cache_port(w3c_validator_script_t)
|
||
|
+corenet_tcp_sendrecv_http_cache_port(w3c_validator_script_t)
|
||
|
|
||
|
-miscfiles_read_generic_certs(httpd_w3c_validator_script_t)
|
||
|
+miscfiles_read_generic_certs(w3c_validator_script_t)
|
||
|
|
||
|
-sysnet_dns_name_resolve(httpd_w3c_validator_script_t)
|
||
|
+sysnet_dns_name_resolve(w3c_validator_script_t)
|
||
|
diff --git a/webalizer.fc b/webalizer.fc
|
||
|
index 64baf67..76c753b 100644
|
||
|
--- a/webalizer.fc
|
||
|
+++ b/webalizer.fc
|
||
|
@@ -6,4 +6,4 @@
|
||
|
|
||
|
/var/lib/webalizer(/.*)? gen_context(system_u:object_r:webalizer_var_lib_t,s0)
|
||
|
|
||
|
-/var/www/usage(/.*)? gen_context(system_u:object_r:httpd_webalizer_content_t,s0)
|
||
|
+/var/www/usage(/.*)? gen_context(system_u:object_r:webalizer_rw_content_t,s0)
|
||
|
diff --git a/webalizer.te b/webalizer.te
|
||
|
index e0b1983..32cbf8c 100644
|
||
|
--- a/webalizer.te
|
||
|
+++ b/webalizer.te
|
||
|
@@ -83,9 +83,8 @@ userdom_dontaudit_search_user_home_content(webalizer_t)
|
||
|
optional_policy(`
|
||
|
apache_read_log(webalizer_t)
|
||
|
apache_content_template(webalizer)
|
||
|
+ apache_content_alias_template(webalizer, webalizer)
|
||
|
apache_manage_sys_content(webalizer_t)
|
||
|
- manage_dirs_pattern(webalizer_t, httpd_webalizer_content_t, httpd_webalizer_content_t)
|
||
|
- manage_files_pattern(webalizer_t, httpd_webalizer_content_t, httpd_webalizer_content_t)
|
||
|
')
|
||
|
|
||
|
optional_policy(`
|
||
|
diff --git a/zoneminder.fc b/zoneminder.fc
|
||
|
index 8c61505..ceaa219 100644
|
||
|
--- a/zoneminder.fc
|
||
|
+++ b/zoneminder.fc
|
||
|
@@ -4,7 +4,7 @@
|
||
|
|
||
|
/usr/lib/systemd/system/zoneminder.* -- gen_context(system_u:object_r:zoneminder_unit_file_t,s0)
|
||
|
|
||
|
-/usr/libexec/zoneminder/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_zoneminder_script_exec_t,s0)
|
||
|
+/usr/libexec/zoneminder/cgi-bin(/.*)? gen_context(system_u:object_r:zoneminder_script_exec_t,s0)
|
||
|
|
||
|
/var/lib/zoneminder(/.*)? gen_context(system_u:object_r:zoneminder_var_lib_t,s0)
|
||
|
|
||
|
diff --git a/zoneminder.te b/zoneminder.te
|
||
|
index add28f7..b66e76d 100644
|
||
|
--- a/zoneminder.te
|
||
|
+++ b/zoneminder.te
|
||
|
@@ -164,24 +164,24 @@ optional_policy(`
|
||
|
|
||
|
optional_policy(`
|
||
|
apache_content_template(zoneminder)
|
||
|
+ apache_content_alias_template(zoneminder, zoneminder)
|
||
|
|
||
|
# need more testing
|
||
|
- #allow httpd_zoneminder_script_t self:shm create_shm_perms;
|
||
|
+ #allow zoneminder_script_t self:shm create_shm_perms;
|
||
|
|
||
|
- manage_sock_files_pattern(httpd_zoneminder_script_t, zoneminder_var_lib_t, zoneminder_var_lib_t)
|
||
|
+ manage_sock_files_pattern(zoneminder_script_t, zoneminder_var_lib_t, zoneminder_var_lib_t)
|
||
|
|
||
|
- rw_files_pattern(httpd_zoneminder_script_t, zoneminder_tmpfs_t, zoneminder_tmpfs_t)
|
||
|
+ rw_files_pattern(zoneminder_script_t, zoneminder_tmpfs_t, zoneminder_tmpfs_t)
|
||
|
|
||
|
- zoneminder_stream_connect(httpd_zoneminder_script_t)
|
||
|
+ zoneminder_stream_connect(zoneminder_script_t)
|
||
|
|
||
|
- can_exec(zoneminder_t, httpd_zoneminder_script_exec_t)
|
||
|
+ can_exec(zoneminder_t, zoneminder_script_exec_t)
|
||
|
|
||
|
- files_search_var_lib(httpd_zoneminder_script_t)
|
||
|
+ files_search_var_lib(zoneminder_script_t)
|
||
|
|
||
|
- logging_send_syslog_msg(httpd_zoneminder_script_t)
|
||
|
+ logging_send_syslog_msg(zoneminder_script_t)
|
||
|
|
||
|
optional_policy(`
|
||
|
- mysql_stream_connect(httpd_zoneminder_script_t)
|
||
|
+ mysql_stream_connect(zoneminder_script_t)
|
||
|
')
|
||
|
-
|
||
|
')
|