add in last bits of webalizer
This commit is contained in:
parent
c2b18fa1f3
commit
be4690a5ae
@ -1 +1,47 @@
|
||||
## <summary>Web server log analysis</summary>
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Execute webalizer in the webalizer domain.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## The type of the process performing this action.
|
||||
## </param>
|
||||
#
|
||||
interface(`webalizer_domtrans',`
|
||||
gen_require(`
|
||||
type webalizer_t, webalizer_exec_t;
|
||||
')
|
||||
|
||||
domain_auto_trans($1,webalizer_exec_t,webalizer_t)
|
||||
|
||||
allow $1 webalizer_t:fd use;
|
||||
allow webalizer_t $1:fd use;
|
||||
allow webalizer_t $1:fifo_file rw_file_perms;
|
||||
allow webalizer_t $1:process sigchld;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Execute webalizer in the webalizer domain, and
|
||||
## allow the specified role the webalizer domain.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## The type of the process performing this action.
|
||||
## </param>
|
||||
## <param name="role">
|
||||
## The role to be allowed the webalizer domain.
|
||||
## </param>
|
||||
## <param name="terminal">
|
||||
## The type of the terminal allow the webalizer domain to use.
|
||||
## </param>
|
||||
#
|
||||
interface(`webalizer_run',`
|
||||
gen_require(`
|
||||
type webalizer_t;
|
||||
')
|
||||
|
||||
webalizer_domtrans($1)
|
||||
role $2 types webalizer_t;
|
||||
allow webalizer_t $3:chr_file rw_term_perms;
|
||||
')
|
||||
|
@ -86,6 +86,9 @@ sysnet_read_config(webalizer_t)
|
||||
|
||||
userdom_use_unpriv_users_fd(webalizer_t)
|
||||
|
||||
apache_read_log(webalizer_t)
|
||||
apache_manage_sys_content(webalizer_t)
|
||||
|
||||
optional_policy(`nis.te',`
|
||||
nis_use_ypbind(webalizer_t)
|
||||
')
|
||||
@ -97,17 +100,3 @@ optional_policy(`nscd.te',`
|
||||
optional_policy(`cron.te',`
|
||||
cron_system_entry(webalizer_t,webalizer_exec_t)
|
||||
')
|
||||
|
||||
ifdef(`TODO',`
|
||||
# a "run" interface needs to be
|
||||
# added, and have sysadm_t use it
|
||||
# in a optional_policy block.
|
||||
|
||||
allow webalizer_t httpd_log_t:dir { getattr read search };
|
||||
allow webalizer_t httpd_log_t:file { read getattr };
|
||||
allow webalizer_t httpd_log_t:lnk_file { getattr read };
|
||||
|
||||
allow webalizer_t httpd_sys_content_t:dir create_dir_perms;
|
||||
allow webalizer_t httpd_sys_content_t:file create_file_perms;
|
||||
allow webalizer_t httpd_sys_content_t:lnk_file create_lnk_perms;
|
||||
')
|
||||
|
@ -430,6 +430,26 @@ interface(`apache_run_helper',`
|
||||
allow httpd_helper_t $3:chr_file rw_term_perms;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Allow the specified domain to read
|
||||
## apache log files.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## Domain allowed access.
|
||||
## </param>
|
||||
#
|
||||
interface(`apache_read_log',`
|
||||
gen_require(`
|
||||
type httpd_log_t;
|
||||
')
|
||||
|
||||
files_search_var($1)
|
||||
allow $1 httpd_log_t:dir r_dir_perms;
|
||||
allow $1 httpd_log_t:file r_file_perms;
|
||||
allow $1 httpd_log_t:lnk_file { getattr read };
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Do not audit attempts to append to the
|
||||
@ -465,6 +485,27 @@ interface(`apache_list_modules',`
|
||||
allow $1 httpd_modules_t:dir r_dir_perms;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Allow the specified domain to manage
|
||||
## apache system content files.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## Domain allowed access.
|
||||
## </param>
|
||||
#
|
||||
# Note that httpd_sys_content_t is found in /var, /etc, /srv and /usr
|
||||
interface(`apache_manage_sys_content',`
|
||||
gen_require(`
|
||||
type httpd_log_t;
|
||||
')
|
||||
|
||||
files_search_var($1)
|
||||
allow $1 httpd_sys_content_t:dir create_dir_perms;
|
||||
allow $1 httpd_sys_content_t:file create_file_perms;
|
||||
allow $1 httpd_sys_content_t:lnk_file create_lnk_perms;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Execute all web scripts in the system
|
||||
|
@ -262,4 +262,8 @@ ifdef(`targeted_policy',`
|
||||
optional_policy(`vpn.te',`
|
||||
vpn_run(sysadm_t,sysadm_r,admin_terminal)
|
||||
')
|
||||
|
||||
optional_policy(`webalizer.te',`
|
||||
webalizer_run(sysadm_t,sysadm_r,admin_terminal)
|
||||
')
|
||||
')
|
||||
|
Loading…
Reference in New Issue
Block a user