+- Use fs_use_xattr for squashf
+- Fix procs_type interface +- Dovecot has a new fifo_file /var/run/dovecot/stats-mail +- Dovecot has a new fifo_file /var/run/stats-mail +- Colord does not need to connect to network +- Allow system_cronjob to dbus chat with NetworkManager +- Puppet manages content, want to make sure it labels everything correctly
This commit is contained in:
parent
e5768e0fb6
commit
4fe804b367
268
policy-F16.patch
268
policy-F16.patch
@ -18475,7 +18475,7 @@ index ff006ea..b682bcf 100644
|
||||
+ dontaudit $1 file_type:dir_file_class_set write;
|
||||
+')
|
||||
diff --git a/policy/modules/kernel/files.te b/policy/modules/kernel/files.te
|
||||
index 22821ff..4e8d594 100644
|
||||
index 22821ff..4486d80 100644
|
||||
--- a/policy/modules/kernel/files.te
|
||||
+++ b/policy/modules/kernel/files.te
|
||||
@@ -10,7 +10,9 @@ attribute files_unconfined_type;
|
||||
@ -18515,7 +18515,7 @@ index 22821ff..4e8d594 100644
|
||||
#
|
||||
type system_map_t;
|
||||
files_type(system_map_t)
|
||||
+procs_type(system_map_t)
|
||||
+kernel_proc_type(system_map_t)
|
||||
genfscon proc /kallsyms gen_context(system_u:object_r:system_map_t,s0)
|
||||
|
||||
#
|
||||
@ -19114,10 +19114,18 @@ index 97fcdac..6342520 100644
|
||||
+')
|
||||
+
|
||||
diff --git a/policy/modules/kernel/filesystem.te b/policy/modules/kernel/filesystem.te
|
||||
index f125dc2..3c6e827 100644
|
||||
index f125dc2..f5e522e 100644
|
||||
--- a/policy/modules/kernel/filesystem.te
|
||||
+++ b/policy/modules/kernel/filesystem.te
|
||||
@@ -52,6 +52,7 @@ type anon_inodefs_t;
|
||||
@@ -33,6 +33,7 @@ fs_use_xattr jffs2 gen_context(system_u:object_r:fs_t,s0);
|
||||
fs_use_xattr jfs gen_context(system_u:object_r:fs_t,s0);
|
||||
fs_use_xattr lustre gen_context(system_u:object_r:fs_t,s0);
|
||||
fs_use_xattr xfs gen_context(system_u:object_r:fs_t,s0);
|
||||
+fs_use_xattr squashfs gen_context(system_u:object_r:fs_t,s0);
|
||||
|
||||
# Use the allocating task SID to label inodes in the following filesystem
|
||||
# types, and label the filesystem itself with the specified context.
|
||||
@@ -52,6 +53,7 @@ type anon_inodefs_t;
|
||||
fs_type(anon_inodefs_t)
|
||||
files_mountpoint(anon_inodefs_t)
|
||||
genfscon anon_inodefs / gen_context(system_u:object_r:anon_inodefs_t,s0)
|
||||
@ -19125,7 +19133,7 @@ index f125dc2..3c6e827 100644
|
||||
|
||||
type bdev_t;
|
||||
fs_type(bdev_t)
|
||||
@@ -67,7 +68,7 @@ fs_type(capifs_t)
|
||||
@@ -67,7 +69,7 @@ fs_type(capifs_t)
|
||||
files_mountpoint(capifs_t)
|
||||
genfscon capifs / gen_context(system_u:object_r:capifs_t,s0)
|
||||
|
||||
@ -19134,7 +19142,7 @@ index f125dc2..3c6e827 100644
|
||||
fs_type(cgroup_t)
|
||||
files_type(cgroup_t)
|
||||
files_mountpoint(cgroup_t)
|
||||
@@ -96,6 +97,7 @@ type hugetlbfs_t;
|
||||
@@ -96,6 +98,7 @@ type hugetlbfs_t;
|
||||
fs_type(hugetlbfs_t)
|
||||
files_mountpoint(hugetlbfs_t)
|
||||
fs_use_trans hugetlbfs gen_context(system_u:object_r:hugetlbfs_t,s0);
|
||||
@ -19142,7 +19150,19 @@ index f125dc2..3c6e827 100644
|
||||
|
||||
type ibmasmfs_t;
|
||||
fs_type(ibmasmfs_t)
|
||||
@@ -175,6 +177,7 @@ fs_type(tmpfs_t)
|
||||
@@ -144,11 +147,6 @@ fs_type(spufs_t)
|
||||
genfscon spufs / gen_context(system_u:object_r:spufs_t,s0)
|
||||
files_mountpoint(spufs_t)
|
||||
|
||||
-type squash_t;
|
||||
-fs_type(squash_t)
|
||||
-genfscon squash / gen_context(system_u:object_r:squash_t,s0)
|
||||
-files_mountpoint(squash_t)
|
||||
-
|
||||
type sysv_t;
|
||||
fs_noxattr_type(sysv_t)
|
||||
files_mountpoint(sysv_t)
|
||||
@@ -175,6 +173,7 @@ fs_type(tmpfs_t)
|
||||
files_type(tmpfs_t)
|
||||
files_mountpoint(tmpfs_t)
|
||||
files_poly_parent(tmpfs_t)
|
||||
@ -19150,7 +19170,7 @@ index f125dc2..3c6e827 100644
|
||||
|
||||
# Use a transition SID based on the allocating task SID and the
|
||||
# filesystem SID to label inodes in the following filesystem types,
|
||||
@@ -254,6 +257,8 @@ genfscon udf / gen_context(system_u:object_r:iso9660_t,s0)
|
||||
@@ -254,6 +253,8 @@ genfscon udf / gen_context(system_u:object_r:iso9660_t,s0)
|
||||
type removable_t;
|
||||
allow removable_t noxattrfs:filesystem associate;
|
||||
fs_noxattr_type(removable_t)
|
||||
@ -19159,7 +19179,7 @@ index f125dc2..3c6e827 100644
|
||||
files_mountpoint(removable_t)
|
||||
|
||||
#
|
||||
@@ -273,6 +278,7 @@ genfscon ncpfs / gen_context(system_u:object_r:nfs_t,s0)
|
||||
@@ -273,6 +274,7 @@ genfscon ncpfs / gen_context(system_u:object_r:nfs_t,s0)
|
||||
genfscon reiserfs / gen_context(system_u:object_r:nfs_t,s0)
|
||||
genfscon panfs / gen_context(system_u:object_r:nfs_t,s0)
|
||||
genfscon gadgetfs / gen_context(system_u:object_r:nfs_t,s0)
|
||||
@ -19168,7 +19188,7 @@ index f125dc2..3c6e827 100644
|
||||
########################################
|
||||
#
|
||||
diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
|
||||
index 6346378..4845190 100644
|
||||
index 6346378..34c6897 100644
|
||||
--- a/policy/modules/kernel/kernel.if
|
||||
+++ b/policy/modules/kernel/kernel.if
|
||||
@@ -345,13 +345,8 @@ interface(`kernel_load_module',`
|
||||
@ -19383,9 +19403,9 @@ index 6346378..4845190 100644
|
||||
+## </summary>
|
||||
+## </param>
|
||||
+#
|
||||
+interface(`procs_type',`
|
||||
+interface(`kernel_proc_type',`
|
||||
+ gen_require(`
|
||||
+ attribute proc_type
|
||||
+ attribute proc_type;
|
||||
+ ')
|
||||
+
|
||||
+ typeattribute $1 proc_type;
|
||||
@ -31285,24 +31305,10 @@ index 0000000..ca71d08
|
||||
+')
|
||||
+
|
||||
diff --git a/policy/modules/services/colord.te b/policy/modules/services/colord.te
|
||||
index 74505cc..2f9b1bc 100644
|
||||
index 74505cc..be3683b 100644
|
||||
--- a/policy/modules/services/colord.te
|
||||
+++ b/policy/modules/services/colord.te
|
||||
@@ -5,6 +5,13 @@ policy_module(colord, 1.0.0)
|
||||
# Declarations
|
||||
#
|
||||
|
||||
+## <desc>
|
||||
+## <p>
|
||||
+## Allow colord domain to connect to the network using TCP.
|
||||
+## </p>
|
||||
+## </desc>
|
||||
+gen_tunable(colord_can_network_connect, false)
|
||||
+
|
||||
type colord_t;
|
||||
type colord_exec_t;
|
||||
dbus_system_domain(colord_t, colord_exec_t)
|
||||
@@ -23,9 +30,11 @@ files_type(colord_var_lib_t)
|
||||
@@ -23,9 +23,11 @@ files_type(colord_var_lib_t)
|
||||
# colord local policy
|
||||
#
|
||||
allow colord_t self:capability { dac_read_search dac_override };
|
||||
@ -31314,7 +31320,7 @@ index 74505cc..2f9b1bc 100644
|
||||
allow colord_t self:udp_socket create_socket_perms;
|
||||
allow colord_t self:unix_dgram_socket create_socket_perms;
|
||||
|
||||
@@ -41,8 +50,14 @@ manage_dirs_pattern(colord_t, colord_var_lib_t, colord_var_lib_t)
|
||||
@@ -41,8 +43,14 @@ manage_dirs_pattern(colord_t, colord_var_lib_t, colord_var_lib_t)
|
||||
manage_files_pattern(colord_t, colord_var_lib_t, colord_var_lib_t)
|
||||
files_var_lib_filetrans(colord_t, colord_var_lib_t, { file dir })
|
||||
|
||||
@ -31330,7 +31336,7 @@ index 74505cc..2f9b1bc 100644
|
||||
|
||||
corenet_all_recvfrom_unlabeled(colord_t)
|
||||
corenet_all_recvfrom_netlabel(colord_t)
|
||||
@@ -50,6 +65,8 @@ corenet_udp_bind_generic_node(colord_t)
|
||||
@@ -50,6 +58,8 @@ corenet_udp_bind_generic_node(colord_t)
|
||||
corenet_udp_bind_ipp_port(colord_t)
|
||||
corenet_tcp_connect_ipp_port(colord_t)
|
||||
|
||||
@ -31339,7 +31345,7 @@ index 74505cc..2f9b1bc 100644
|
||||
dev_read_video_dev(colord_t)
|
||||
dev_write_video_dev(colord_t)
|
||||
dev_rw_printer(colord_t)
|
||||
@@ -65,19 +82,37 @@ files_list_mnt(colord_t)
|
||||
@@ -65,19 +75,33 @@ files_list_mnt(colord_t)
|
||||
files_read_etc_files(colord_t)
|
||||
files_read_usr_files(colord_t)
|
||||
|
||||
@ -31363,10 +31369,6 @@ index 74505cc..2f9b1bc 100644
|
||||
+userdom_rw_user_tmpfs_files(colord_t)
|
||||
+
|
||||
+userdom_home_reader(colord_t)
|
||||
+
|
||||
+tunable_policy(`colord_can_network_connect',`
|
||||
+ corenet_tcp_connect_all_ports(colord_t)
|
||||
+')
|
||||
|
||||
tunable_policy(`use_nfs_home_dirs',`
|
||||
+ fs_getattr_nfs(colord_t)
|
||||
@ -31378,7 +31380,7 @@ index 74505cc..2f9b1bc 100644
|
||||
fs_read_cifs_files(colord_t)
|
||||
')
|
||||
|
||||
@@ -89,6 +124,12 @@ optional_policy(`
|
||||
@@ -89,6 +113,12 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -31391,7 +31393,7 @@ index 74505cc..2f9b1bc 100644
|
||||
policykit_dbus_chat(colord_t)
|
||||
policykit_domtrans_auth(colord_t)
|
||||
policykit_read_lib(colord_t)
|
||||
@@ -96,5 +137,16 @@ optional_policy(`
|
||||
@@ -96,5 +126,16 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -32485,7 +32487,7 @@ index 35241ed..7a0913c 100644
|
||||
+ manage_files_pattern($1, system_cronjob_var_lib_t, system_cronjob_var_lib_t)
|
||||
')
|
||||
diff --git a/policy/modules/services/cron.te b/policy/modules/services/cron.te
|
||||
index f7583ab..230cbb2 100644
|
||||
index f7583ab..a4d25d9 100644
|
||||
--- a/policy/modules/services/cron.te
|
||||
+++ b/policy/modules/services/cron.te
|
||||
@@ -10,18 +10,18 @@ gen_require(`
|
||||
@ -32878,7 +32880,18 @@ index f7583ab..230cbb2 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -480,7 +582,7 @@ optional_policy(`
|
||||
@@ -472,6 +574,10 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
+ networkmanager_dbus_chat(system_cronjob_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
postfix_read_config(system_cronjob_t)
|
||||
')
|
||||
|
||||
@@ -480,7 +586,7 @@ optional_policy(`
|
||||
prelink_manage_lib(system_cronjob_t)
|
||||
prelink_manage_log(system_cronjob_t)
|
||||
prelink_read_cache(system_cronjob_t)
|
||||
@ -32887,7 +32900,7 @@ index f7583ab..230cbb2 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -495,6 +597,7 @@ optional_policy(`
|
||||
@@ -495,6 +601,7 @@ optional_policy(`
|
||||
|
||||
optional_policy(`
|
||||
spamassassin_manage_lib_files(system_cronjob_t)
|
||||
@ -32895,7 +32908,7 @@ index f7583ab..230cbb2 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -502,7 +605,13 @@ optional_policy(`
|
||||
@@ -502,7 +609,13 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -32909,7 +32922,7 @@ index f7583ab..230cbb2 100644
|
||||
userdom_user_home_dir_filetrans_user_home_content(system_cronjob_t, { dir file lnk_file fifo_file sock_file })
|
||||
')
|
||||
|
||||
@@ -595,9 +704,12 @@ userdom_manage_user_home_content_sockets(cronjob_t)
|
||||
@@ -595,9 +708,12 @@ userdom_manage_user_home_content_sockets(cronjob_t)
|
||||
#userdom_user_home_dir_filetrans_user_home_content(cronjob_t, notdevfile_class_set)
|
||||
|
||||
list_dirs_pattern(crond_t, user_cron_spool_t, user_cron_spool_t)
|
||||
@ -36655,7 +36668,7 @@ index e1d7dc5..0557be0 100644
|
||||
admin_pattern($1, dovecot_var_run_t)
|
||||
|
||||
diff --git a/policy/modules/services/dovecot.te b/policy/modules/services/dovecot.te
|
||||
index acf6d4f..194f170 100644
|
||||
index acf6d4f..47969fe 100644
|
||||
--- a/policy/modules/services/dovecot.te
|
||||
+++ b/policy/modules/services/dovecot.te
|
||||
@@ -18,7 +18,7 @@ type dovecot_auth_tmp_t;
|
||||
@ -36709,7 +36722,7 @@ index acf6d4f..194f170 100644
|
||||
files_search_etc(dovecot_t)
|
||||
|
||||
can_exec(dovecot_t, dovecot_exec_t)
|
||||
@@ -94,10 +99,11 @@ manage_dirs_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
||||
@@ -94,10 +99,12 @@ manage_dirs_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
||||
manage_files_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
||||
manage_lnk_files_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
||||
|
||||
@ -36718,11 +36731,12 @@ index acf6d4f..194f170 100644
|
||||
manage_lnk_files_pattern(dovecot_t, dovecot_var_run_t, dovecot_var_run_t)
|
||||
manage_sock_files_pattern(dovecot_t, dovecot_var_run_t, dovecot_var_run_t)
|
||||
-files_pid_filetrans(dovecot_t, dovecot_var_run_t, file)
|
||||
+files_pid_filetrans(dovecot_t, dovecot_var_run_t, { dir file })
|
||||
+manage_fifo_files_pattern(dovecot_t, dovecot_var_run_t, dovecot_var_run_t)
|
||||
+files_pid_filetrans(dovecot_t, dovecot_var_run_t, { dir file fifo_file })
|
||||
|
||||
kernel_read_kernel_sysctls(dovecot_t)
|
||||
kernel_read_system_state(dovecot_t)
|
||||
@@ -110,6 +116,7 @@ corenet_tcp_sendrecv_all_ports(dovecot_t)
|
||||
@@ -110,6 +117,7 @@ corenet_tcp_sendrecv_all_ports(dovecot_t)
|
||||
corenet_tcp_bind_generic_node(dovecot_t)
|
||||
corenet_tcp_bind_mail_port(dovecot_t)
|
||||
corenet_tcp_bind_pop_port(dovecot_t)
|
||||
@ -36730,7 +36744,7 @@ index acf6d4f..194f170 100644
|
||||
corenet_tcp_bind_sieve_port(dovecot_t)
|
||||
corenet_tcp_connect_all_ports(dovecot_t)
|
||||
corenet_tcp_connect_postgresql_port(dovecot_t)
|
||||
@@ -135,6 +142,7 @@ files_dontaudit_list_default(dovecot_t)
|
||||
@@ -135,6 +143,7 @@ files_dontaudit_list_default(dovecot_t)
|
||||
# Dovecot now has quota support and it uses getmntent() to find the mountpoints.
|
||||
files_read_etc_runtime_files(dovecot_t)
|
||||
files_search_all_mountpoints(dovecot_t)
|
||||
@ -36738,7 +36752,7 @@ index acf6d4f..194f170 100644
|
||||
|
||||
init_getattr_utmp(dovecot_t)
|
||||
|
||||
@@ -145,6 +153,7 @@ logging_send_syslog_msg(dovecot_t)
|
||||
@@ -145,6 +154,7 @@ logging_send_syslog_msg(dovecot_t)
|
||||
miscfiles_read_generic_certs(dovecot_t)
|
||||
miscfiles_read_localization(dovecot_t)
|
||||
|
||||
@ -36746,7 +36760,7 @@ index acf6d4f..194f170 100644
|
||||
userdom_dontaudit_use_unpriv_user_fds(dovecot_t)
|
||||
userdom_manage_user_home_content_dirs(dovecot_t)
|
||||
userdom_manage_user_home_content_files(dovecot_t)
|
||||
@@ -160,6 +169,15 @@ optional_policy(`
|
||||
@@ -160,6 +170,15 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -36762,7 +36776,7 @@ index acf6d4f..194f170 100644
|
||||
postgresql_stream_connect(dovecot_t)
|
||||
')
|
||||
|
||||
@@ -180,8 +198,8 @@ optional_policy(`
|
||||
@@ -180,8 +199,8 @@ optional_policy(`
|
||||
# dovecot auth local policy
|
||||
#
|
||||
|
||||
@ -36773,7 +36787,7 @@ index acf6d4f..194f170 100644
|
||||
allow dovecot_auth_t self:fifo_file rw_fifo_file_perms;
|
||||
allow dovecot_auth_t self:unix_dgram_socket create_socket_perms;
|
||||
allow dovecot_auth_t self:unix_stream_socket create_stream_socket_perms;
|
||||
@@ -190,6 +208,9 @@ allow dovecot_auth_t dovecot_t:unix_stream_socket { connectto rw_stream_socket_p
|
||||
@@ -190,6 +209,9 @@ allow dovecot_auth_t dovecot_t:unix_stream_socket { connectto rw_stream_socket_p
|
||||
|
||||
read_files_pattern(dovecot_auth_t, dovecot_passwd_t, dovecot_passwd_t)
|
||||
|
||||
@ -36783,7 +36797,7 @@ index acf6d4f..194f170 100644
|
||||
manage_dirs_pattern(dovecot_auth_t, dovecot_auth_tmp_t, dovecot_auth_tmp_t)
|
||||
manage_files_pattern(dovecot_auth_t, dovecot_auth_tmp_t, dovecot_auth_tmp_t)
|
||||
files_tmp_filetrans(dovecot_auth_t, dovecot_auth_tmp_t, { file dir })
|
||||
@@ -201,9 +222,12 @@ dovecot_stream_connect_auth(dovecot_auth_t)
|
||||
@@ -201,9 +223,12 @@ dovecot_stream_connect_auth(dovecot_auth_t)
|
||||
kernel_read_all_sysctls(dovecot_auth_t)
|
||||
kernel_read_system_state(dovecot_auth_t)
|
||||
|
||||
@ -36796,7 +36810,7 @@ index acf6d4f..194f170 100644
|
||||
dev_read_urand(dovecot_auth_t)
|
||||
|
||||
auth_domtrans_chk_passwd(dovecot_auth_t)
|
||||
@@ -216,7 +240,8 @@ files_read_usr_files(dovecot_auth_t)
|
||||
@@ -216,7 +241,8 @@ files_read_usr_files(dovecot_auth_t)
|
||||
files_read_usr_symlinks(dovecot_auth_t)
|
||||
files_read_var_lib_files(dovecot_auth_t)
|
||||
files_search_tmp(dovecot_auth_t)
|
||||
@ -36806,7 +36820,7 @@ index acf6d4f..194f170 100644
|
||||
|
||||
init_rw_utmp(dovecot_auth_t)
|
||||
|
||||
@@ -236,6 +261,8 @@ optional_policy(`
|
||||
@@ -236,6 +262,8 @@ optional_policy(`
|
||||
optional_policy(`
|
||||
mysql_search_db(dovecot_auth_t)
|
||||
mysql_stream_connect(dovecot_auth_t)
|
||||
@ -36815,7 +36829,7 @@ index acf6d4f..194f170 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -243,6 +270,8 @@ optional_policy(`
|
||||
@@ -243,6 +271,8 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -36824,7 +36838,7 @@ index acf6d4f..194f170 100644
|
||||
postfix_search_spool(dovecot_auth_t)
|
||||
')
|
||||
|
||||
@@ -250,23 +279,42 @@ optional_policy(`
|
||||
@@ -250,23 +280,42 @@ optional_policy(`
|
||||
#
|
||||
# dovecot deliver local policy
|
||||
#
|
||||
@ -36869,7 +36883,7 @@ index acf6d4f..194f170 100644
|
||||
|
||||
miscfiles_read_localization(dovecot_deliver_t)
|
||||
|
||||
@@ -283,24 +331,22 @@ userdom_manage_user_home_content_pipes(dovecot_deliver_t)
|
||||
@@ -283,24 +332,22 @@ userdom_manage_user_home_content_pipes(dovecot_deliver_t)
|
||||
userdom_manage_user_home_content_sockets(dovecot_deliver_t)
|
||||
userdom_user_home_dir_filetrans_user_home_content(dovecot_deliver_t, { dir file lnk_file fifo_file sock_file })
|
||||
|
||||
@ -53252,7 +53266,7 @@ index 2855a44..58bb459 100644
|
||||
+ allow $1 puppet_var_run_t:dir search_dir_perms;
|
||||
+')
|
||||
diff --git a/policy/modules/services/puppet.te b/policy/modules/services/puppet.te
|
||||
index 64c5f95..fa3c113 100644
|
||||
index 64c5f95..39d23dc 100644
|
||||
--- a/policy/modules/services/puppet.te
|
||||
+++ b/policy/modules/services/puppet.te
|
||||
@@ -6,12 +6,19 @@ policy_module(puppet, 1.0.0)
|
||||
@ -53376,7 +53390,7 @@ index 64c5f95..fa3c113 100644
|
||||
files_rw_var_files(puppet_t)
|
||||
|
||||
rpm_domtrans(puppet_t)
|
||||
@@ -156,13 +188,68 @@ optional_policy(`
|
||||
@@ -156,13 +188,136 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -53387,8 +53401,77 @@ index 64c5f95..fa3c113 100644
|
||||
+ usermanage_access_check_useradd(puppet_t)
|
||||
+')
|
||||
+
|
||||
+########################################
|
||||
+#
|
||||
+optional_policy(`
|
||||
+ auth_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ alsa_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ bootloader_filetrans_config(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ devicekit_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ dnsmasq_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ kerberos_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ libs_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ miscfiles_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ mta_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ modules_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ networkmanager_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ nx_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ postfix_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ quota_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ sysnet_filetrans_named_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ virt_filetrans_home_content(puppet_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ ssh_filetrans_admin_home_content(puppet_t)
|
||||
')
|
||||
|
||||
########################################
|
||||
#
|
||||
-# Pupper master personal policy
|
||||
+# PuppetCA personal policy
|
||||
+#
|
||||
+
|
||||
@ -53439,16 +53522,15 @@ index 64c5f95..fa3c113 100644
|
||||
+ usermanage_access_check_groupadd(puppet_t)
|
||||
+ usermanage_access_check_passwd(puppet_t)
|
||||
+ usermanage_access_check_useradd(puppet_t)
|
||||
')
|
||||
|
||||
########################################
|
||||
#
|
||||
-# Pupper master personal policy
|
||||
+')
|
||||
+
|
||||
+########################################
|
||||
+#
|
||||
+# Puppet master personal policy
|
||||
#
|
||||
|
||||
allow puppetmaster_t self:capability { dac_read_search dac_override setuid setgid fowner chown fsetid sys_tty_config };
|
||||
@@ -171,29 +258,36 @@ allow puppetmaster_t self:fifo_file rw_fifo_file_perms;
|
||||
@@ -171,29 +326,36 @@ allow puppetmaster_t self:fifo_file rw_fifo_file_perms;
|
||||
allow puppetmaster_t self:netlink_route_socket create_netlink_socket_perms;
|
||||
allow puppetmaster_t self:socket create;
|
||||
allow puppetmaster_t self:tcp_socket create_stream_socket_perms;
|
||||
@ -53488,7 +53570,7 @@ index 64c5f95..fa3c113 100644
|
||||
|
||||
corecmd_exec_bin(puppetmaster_t)
|
||||
corecmd_exec_shell(puppetmaster_t)
|
||||
@@ -206,21 +300,46 @@ corenet_tcp_bind_generic_node(puppetmaster_t)
|
||||
@@ -206,21 +368,46 @@ corenet_tcp_bind_generic_node(puppetmaster_t)
|
||||
corenet_tcp_bind_puppet_port(puppetmaster_t)
|
||||
corenet_sendrecv_puppet_server_packets(puppetmaster_t)
|
||||
|
||||
@ -53502,11 +53584,11 @@ index 64c5f95..fa3c113 100644
|
||||
|
||||
domain_read_all_domains_state(puppetmaster_t)
|
||||
+domain_obj_id_change_exemption(puppetmaster_t)
|
||||
+
|
||||
+files_read_usr_files(puppetmaster_t)
|
||||
|
||||
-files_read_etc_files(puppetmaster_t)
|
||||
-files_search_var_lib(puppetmaster_t)
|
||||
+files_read_usr_files(puppetmaster_t)
|
||||
+
|
||||
+selinux_validate_context(puppetmaster_t)
|
||||
+
|
||||
+auth_use_nsswitch(puppetmaster_t)
|
||||
@ -53538,7 +53620,7 @@ index 64c5f95..fa3c113 100644
|
||||
optional_policy(`
|
||||
hostname_exec(puppetmaster_t)
|
||||
')
|
||||
@@ -231,3 +350,9 @@ optional_policy(`
|
||||
@@ -231,3 +418,9 @@ optional_policy(`
|
||||
rpm_exec(puppetmaster_t)
|
||||
rpm_read_db(puppetmaster_t)
|
||||
')
|
||||
@ -59443,7 +59525,7 @@ index 623c8fa..0a802f7 100644
|
||||
/var/run/snmpd(/.*)? gen_context(system_u:object_r:snmpd_var_run_t,s0)
|
||||
/var/run/snmpd\.pid -- gen_context(system_u:object_r:snmpd_var_run_t,s0)
|
||||
diff --git a/policy/modules/services/snmp.if b/policy/modules/services/snmp.if
|
||||
index 275f9fb..ad10bef 100644
|
||||
index 275f9fb..f1343b7 100644
|
||||
--- a/policy/modules/services/snmp.if
|
||||
+++ b/policy/modules/services/snmp.if
|
||||
@@ -11,12 +11,12 @@
|
||||
@ -59463,7 +59545,7 @@ index 275f9fb..ad10bef 100644
|
||||
')
|
||||
|
||||
########################################
|
||||
@@ -62,6 +62,7 @@ interface(`snmp_read_snmp_var_lib_files',`
|
||||
@@ -62,11 +62,70 @@ interface(`snmp_read_snmp_var_lib_files',`
|
||||
type snmpd_var_lib_t;
|
||||
')
|
||||
|
||||
@ -59471,10 +59553,29 @@ index 275f9fb..ad10bef 100644
|
||||
allow $1 snmpd_var_lib_t:dir list_dir_perms;
|
||||
read_files_pattern($1, snmpd_var_lib_t, snmpd_var_lib_t)
|
||||
read_lnk_files_pattern($1, snmpd_var_lib_t, snmpd_var_lib_t)
|
||||
@@ -69,6 +70,45 @@ interface(`snmp_read_snmp_var_lib_files',`
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
+#######################################
|
||||
+## <summary>
|
||||
+## Read snmpd libraries directories
|
||||
+## </summary>
|
||||
+## <param name="domain">
|
||||
+## <summary>
|
||||
+## Domain allowed access.
|
||||
+## </summary>
|
||||
+## </param>
|
||||
+#
|
||||
+interface(`snmp_read_snmp_var_lib_dirs',`
|
||||
+ gen_require(`
|
||||
+ type snmpd_var_lib_t;
|
||||
+ ')
|
||||
+
|
||||
+ files_search_var_lib($1)
|
||||
+ allow $1 snmpd_var_lib_t:dir list_dir_perms;
|
||||
+')
|
||||
+
|
||||
+########################################
|
||||
+## <summary>
|
||||
+## Manage snmpd libraries directories
|
||||
+## </summary>
|
||||
+## <param name="domain">
|
||||
@ -59512,12 +59613,10 @@ index 275f9fb..ad10bef 100644
|
||||
+ manage_files_pattern($1, snmpd_var_lib_t, snmpd_var_lib_t)
|
||||
+')
|
||||
+
|
||||
+########################################
|
||||
+## <summary>
|
||||
########################################
|
||||
## <summary>
|
||||
## dontaudit Read snmpd libraries.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
@@ -81,9 +121,10 @@ interface(`snmp_dontaudit_read_snmp_var_lib_files',`
|
||||
@@ -81,9 +140,10 @@ interface(`snmp_dontaudit_read_snmp_var_lib_files',`
|
||||
gen_require(`
|
||||
type snmpd_var_lib_t;
|
||||
')
|
||||
@ -59529,7 +59628,7 @@ index 275f9fb..ad10bef 100644
|
||||
')
|
||||
|
||||
########################################
|
||||
@@ -123,13 +164,15 @@ interface(`snmp_dontaudit_write_snmp_var_lib_files',`
|
||||
@@ -123,13 +183,15 @@ interface(`snmp_dontaudit_write_snmp_var_lib_files',`
|
||||
#
|
||||
interface(`snmp_admin',`
|
||||
gen_require(`
|
||||
@ -63903,7 +64002,7 @@ index 7c5d8d8..3fd8f12 100644
|
||||
+')
|
||||
+
|
||||
diff --git a/policy/modules/services/virt.te b/policy/modules/services/virt.te
|
||||
index 3eca020..30c47b0 100644
|
||||
index 3eca020..59444ba 100644
|
||||
--- a/policy/modules/services/virt.te
|
||||
+++ b/policy/modules/services/virt.te
|
||||
@@ -5,56 +5,84 @@ policy_module(virt, 1.4.0)
|
||||
@ -64460,7 +64559,7 @@ index 3eca020..30c47b0 100644
|
||||
files_read_usr_files(virt_domain)
|
||||
files_read_var_files(virt_domain)
|
||||
files_search_all(virt_domain)
|
||||
@@ -440,25 +626,358 @@ files_search_all(virt_domain)
|
||||
@@ -440,25 +626,359 @@ files_search_all(virt_domain)
|
||||
fs_getattr_tmpfs(virt_domain)
|
||||
fs_rw_anon_inodefs_files(virt_domain)
|
||||
fs_rw_tmpfs_files(virt_domain)
|
||||
@ -64796,6 +64895,7 @@ index 3eca020..30c47b0 100644
|
||||
+
|
||||
+domain_entry_file(svirt_lxc_net_t, svirt_lxc_file_t)
|
||||
+domtrans_pattern(virtd_lxc_t, svirt_lxc_file_t, svirt_lxc_net_t)
|
||||
+corecmd_shell_domtrans(virtd_lxc_t, svirt_lxc_net_t)
|
||||
+fs_noxattr_type(svirt_lxc_file_t)
|
||||
+term_pty(svirt_lxc_file_t)
|
||||
+
|
||||
|
@ -17,7 +17,7 @@
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 3.10.0
|
||||
Release: 63%{?dist}
|
||||
Release: 64%{?dist}
|
||||
License: GPLv2+
|
||||
Group: System Environment/Base
|
||||
Source: serefpolicy-%{version}.tgz
|
||||
@ -470,6 +470,15 @@ SELinux Reference policy mls base module.
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Thu Dec 1 2011 Miroslav Grepl <mgrepl@redhat.com> 3.10.0-64
|
||||
- Use fs_use_xattr for squashf
|
||||
- Fix procs_type interface
|
||||
- Dovecot has a new fifo_file /var/run/dovecot/stats-mail
|
||||
- Dovecot has a new fifo_file /var/run/stats-mail
|
||||
- Colord does not need to connect to network
|
||||
- Allow system_cronjob to dbus chat with NetworkManager
|
||||
- Puppet manages content, want to make sure it labels everything correctly
|
||||
|
||||
* Tue Nov 29 2011 Miroslav Grepl <mgrepl@redhat.com> 3.10.0-63
|
||||
- Change port 9050 to tor_socks_port_t and then allow openvpn to connect to it
|
||||
- Allow all postfix domains to use the fifo_file
|
||||
|
Loading…
Reference in New Issue
Block a user