Fixes for cluster policy
This commit is contained in:
parent
14ffaf836d
commit
be5142fc6f
@ -18,6 +18,25 @@ interface(`corosync_domtrans',`
|
||||
domtrans_pattern($1, corosync_exec_t, corosync_t)
|
||||
')
|
||||
|
||||
######################################
|
||||
## <summary>
|
||||
## Execute corosync in the caller domain.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allowed to transition.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`corosync_exec',`
|
||||
gen_require(`
|
||||
type corosync_exec_t;
|
||||
')
|
||||
|
||||
corecmd_search_bin($1)
|
||||
can_exec($1, corosync_exec_t)
|
||||
')
|
||||
|
||||
#######################################
|
||||
## <summary>
|
||||
## Allow the specified domain to read corosync's log files.
|
||||
|
@ -117,6 +117,7 @@ optional_policy(`
|
||||
rhcs_rw_cluster_shm(corosync_t)
|
||||
rhcs_rw_cluster_semaphores(corosync_t)
|
||||
rhcs_stream_connect_cluster(corosync_t)
|
||||
rhcs_read_cluster_lib_files(corosync_t)
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
|
@ -10,6 +10,7 @@
|
||||
|
||||
/var/lib/qdiskd(/.*)? gen_context(system_u:object_r:qdiskd_var_lib_t,s0)
|
||||
|
||||
/var/log/cluster/.*\.*log <<none>>
|
||||
/var/log/cluster/dlm_controld\.log.* -- gen_context(system_u:object_r:dlm_controld_var_log_t,s0)
|
||||
/var/log/cluster/fenced\.log.* -- gen_context(system_u:object_r:fenced_var_log_t,s0)
|
||||
/var/log/cluster/gfs_controld\.log.* -- gen_context(system_u:object_r:gfs_controld_var_log_t,s0)
|
||||
|
@ -434,3 +434,22 @@ interface(`rhcs_read_qdiskd_tmpfs_files',`
|
||||
|
||||
allow $1 qdiskd_tmpfs_t:file read_file_perms;
|
||||
')
|
||||
|
||||
######################################
|
||||
## <summary>
|
||||
## Allow domain to read cluster lib files
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allowed access.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`rhcs_read_cluster_lib_files',`
|
||||
gen_require(`
|
||||
type cluster_var_lib_t;
|
||||
')
|
||||
|
||||
files_search_var_lib($1)
|
||||
read_files_pattern($1, cluster_var_lib_t, cluster_var_lib_t)
|
||||
')
|
||||
|
@ -35,6 +35,10 @@ rhcs_domain_template(qdiskd)
|
||||
type qdiskd_var_lib_t;
|
||||
files_type(qdiskd_var_lib_t)
|
||||
|
||||
# type for cluster lib files
|
||||
type cluster_var_lib_t;
|
||||
files_type(cluster_var_lib_t)
|
||||
|
||||
#####################################
|
||||
#
|
||||
# dlm_controld local policy
|
||||
@ -105,6 +109,11 @@ tunable_policy(`fenced_can_network_connect',`
|
||||
corenet_tcp_connect_all_ports(fenced_t)
|
||||
')
|
||||
|
||||
# needed by fence_scsi
|
||||
optional_policy(`
|
||||
corosync_exec(fenced_t)
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
ccs_read_config(fenced_t)
|
||||
')
|
||||
@ -223,6 +232,9 @@ allow cluster_domain self:fifo_file rw_fifo_file_perms;
|
||||
allow cluster_domain self:unix_stream_socket create_stream_socket_perms;
|
||||
allow cluster_domain self:unix_dgram_socket create_socket_perms;
|
||||
|
||||
manage_files_pattern(cluster_domain, cluster_var_lib_t, cluster_var_lib_t)
|
||||
manage_dirs_pattern(cluster_domain, cluster_var_lib_t, cluster_var_lib_t)
|
||||
|
||||
logging_send_syslog_msg(cluster_domain)
|
||||
|
||||
miscfiles_read_localization(cluster_domain)
|
||||
|
Loading…
Reference in New Issue
Block a user