patches from erich Wed, 13 Sep 2006 16:18:18 +0200
This commit is contained in:
parent
2cac32a605
commit
73ca55d311
@ -97,7 +97,7 @@ files_exec_usr_files(apt_t)
|
|||||||
files_read_etc_files(apt_t)
|
files_read_etc_files(apt_t)
|
||||||
files_read_etc_runtime_files(apt_t)
|
files_read_etc_runtime_files(apt_t)
|
||||||
|
|
||||||
fs_dontaudit_getattr_all_fs(apt_t)
|
fs_getattr_all_fs(apt_t)
|
||||||
|
|
||||||
term_list_ptys(apt_t)
|
term_list_ptys(apt_t)
|
||||||
term_use_all_terms(apt_t)
|
term_use_all_terms(apt_t)
|
||||||
|
@ -1,13 +1,7 @@
|
|||||||
/etc/cron\.(daily|weekly)/sysklogd -- gen_context(system_u:object_r:logrotate_exec_t,s0)
|
/etc/cron\.(daily|weekly)/sysklogd -- gen_context(system_u:object_r:logrotate_exec_t,s0)
|
||||||
|
|
||||||
/usr/sbin/logcheck -- gen_context(system_u:object_r:logrotate_exec_t,s0)
|
|
||||||
/usr/sbin/logrotate -- gen_context(system_u:object_r:logrotate_exec_t,s0)
|
/usr/sbin/logrotate -- gen_context(system_u:object_r:logrotate_exec_t,s0)
|
||||||
|
|
||||||
/var/lib/logcheck(/.*)? gen_context(system_u:object_r:logrotate_var_lib_t,s0)
|
|
||||||
|
|
||||||
# using a hard-coded name under /var/tmp is a bug - new version fixes it
|
|
||||||
/var/tmp/logcheck -d gen_context(system_u:object_r:logrotate_tmp_t,s0)
|
|
||||||
|
|
||||||
ifdef(`distro_debian', `
|
ifdef(`distro_debian', `
|
||||||
/usr/bin/savelog -- gen_context(system_u:object_r:logrotate_exec_t,s0)
|
/usr/bin/savelog -- gen_context(system_u:object_r:logrotate_exec_t,s0)
|
||||||
/var/lib/logrotate(/.*)? gen_context(system_u:object_r:logrotate_var_lib_t,s0)
|
/var/lib/logrotate(/.*)? gen_context(system_u:object_r:logrotate_var_lib_t,s0)
|
||||||
|
@ -1,4 +1,7 @@
|
|||||||
|
/usr/sbin/logcheck -- gen_context(system_u:object_r:logwatch_exec_t,s0)
|
||||||
|
|
||||||
/usr/share/logwatch/scripts/logwatch\.pl -- gen_context(system_u:object_r:logwatch_exec_t, s0)
|
/usr/share/logwatch/scripts/logwatch\.pl -- gen_context(system_u:object_r:logwatch_exec_t, s0)
|
||||||
|
|
||||||
/var/cache/logwatch(/.*)? gen_context(system_u:object_r:logwatch_cache_t, s0)
|
/var/cache/logwatch(/.*)? gen_context(system_u:object_r:logwatch_cache_t, s0)
|
||||||
|
/var/lib/logcheck(/.*)? gen_context(system_u:object_r:logwatch_cache_t,s0)
|
||||||
|
/var/log/logcheck/.+ -- gen_context(system_u:object_r:logwatch_lock_t,s0)
|
||||||
|
@ -18,3 +18,21 @@ interface(`logwatch_read_tmp_files',`
|
|||||||
files_search_tmp($1)
|
files_search_tmp($1)
|
||||||
allow $1 logwatch_tmp_t:file r_file_perms;
|
allow $1 logwatch_tmp_t:file r_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Search logwatch cache directory.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`logwatch_search_cache_dir',`
|
||||||
|
gen_require(`
|
||||||
|
type logwatch_cache_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 logwatch_cache_t:dir search;
|
||||||
|
')
|
||||||
|
@ -15,6 +15,9 @@ role system_r types logwatch_t;
|
|||||||
type logwatch_cache_t;
|
type logwatch_cache_t;
|
||||||
files_type(logwatch_cache_t)
|
files_type(logwatch_cache_t)
|
||||||
|
|
||||||
|
type logwatch_lock_t;
|
||||||
|
files_lock_file(logwatch_lock_t)
|
||||||
|
|
||||||
type logwatch_tmp_t;
|
type logwatch_tmp_t;
|
||||||
files_tmp_file(logwatch_tmp_t)
|
files_tmp_file(logwatch_tmp_t)
|
||||||
|
|
||||||
@ -24,12 +27,16 @@ files_tmp_file(logwatch_tmp_t)
|
|||||||
#
|
#
|
||||||
|
|
||||||
allow logwatch_t self:capability { dac_override dac_read_search setgid };
|
allow logwatch_t self:capability { dac_override dac_read_search setgid };
|
||||||
|
allow logwatch_t self:process signal;
|
||||||
allow logwatch_t self:fifo_file rw_file_perms;
|
allow logwatch_t self:fifo_file rw_file_perms;
|
||||||
allow logwatch_t self:unix_stream_socket create_stream_socket_perms;
|
allow logwatch_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
|
|
||||||
allow logwatch_t logwatch_cache_t:dir create_dir_perms;
|
allow logwatch_t logwatch_cache_t:dir create_dir_perms;
|
||||||
allow logwatch_t logwatch_cache_t:file create_file_perms;
|
allow logwatch_t logwatch_cache_t:file create_file_perms;
|
||||||
|
|
||||||
|
allow logwatch_t logwatch_lock_t:file manage_file_perms;
|
||||||
|
files_lock_filetrans(logwatch_t,logwatch_lock_t,file)
|
||||||
|
|
||||||
allow logwatch_t logwatch_tmp_t:dir create_dir_perms;
|
allow logwatch_t logwatch_tmp_t:dir create_dir_perms;
|
||||||
allow logwatch_t logwatch_tmp_t:file create_file_perms;
|
allow logwatch_t logwatch_tmp_t:file create_file_perms;
|
||||||
files_tmp_filetrans(logwatch_t, logwatch_tmp_t, { file dir })
|
files_tmp_filetrans(logwatch_t, logwatch_tmp_t, { file dir })
|
||||||
@ -41,7 +48,9 @@ kernel_read_system_state(logwatch_t)
|
|||||||
corecmd_read_sbin_symlinks(logwatch_t)
|
corecmd_read_sbin_symlinks(logwatch_t)
|
||||||
corecmd_read_sbin_files(logwatch_t)
|
corecmd_read_sbin_files(logwatch_t)
|
||||||
corecmd_exec_bin(logwatch_t)
|
corecmd_exec_bin(logwatch_t)
|
||||||
|
corecmd_exec_sbin(logwatch_t)
|
||||||
corecmd_exec_shell(logwatch_t)
|
corecmd_exec_shell(logwatch_t)
|
||||||
|
corecmd_exec_ls(logwatch_t)
|
||||||
|
|
||||||
dev_read_urand(logwatch_t)
|
dev_read_urand(logwatch_t)
|
||||||
|
|
||||||
@ -92,6 +101,10 @@ optional_policy(`
|
|||||||
cron_system_entry(logwatch_t, logwatch_exec_t)
|
cron_system_entry(logwatch_t, logwatch_exec_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
hostname_exec(logwatch_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
mta_getattr_spool(logwatch_t)
|
mta_getattr_spool(logwatch_t)
|
||||||
')
|
')
|
||||||
|
@ -140,6 +140,13 @@ userdom_list_all_users_home_dirs(crond_t)
|
|||||||
|
|
||||||
mta_send_mail(crond_t)
|
mta_send_mail(crond_t)
|
||||||
|
|
||||||
|
ifdef(`distro_debian',`
|
||||||
|
optional_policy(`
|
||||||
|
# Debian logcheck has the home dir set to its cache
|
||||||
|
logwatch_search_cache_dir(crond_t)
|
||||||
|
')
|
||||||
|
')
|
||||||
|
|
||||||
ifdef(`distro_redhat', `
|
ifdef(`distro_redhat', `
|
||||||
# Run the rpm program in the rpm_t domain. Allow creation of RPM log files
|
# Run the rpm program in the rpm_t domain. Allow creation of RPM log files
|
||||||
# via redirection of standard out.
|
# via redirection of standard out.
|
||||||
|
Loading…
Reference in New Issue
Block a user