selinux-policy/mls/domains/program/rpm.te
2005-11-22 19:28:03 +00:00

261 lines
8.2 KiB
Plaintext

#DESC RPM - Red Hat package management
#
# X-Debian-Packages:
#################################
#
# Rules for running the Redhat Package Manager (RPM) tools.
#
# rpm_t is the domain for rpm and related utilities in /usr/lib/rpm
# rpm_exec_t is the type of the rpm executables.
# rpm_log_t is the type for rpm log files (/var/log/rpmpkgs*)
# rpm_var_lib_t is the type for rpm files in /var/lib
#
type rpm_t, domain, admin, etc_writer, privlog, privowner, privmem, priv_system_role, fs_domain, privfd, mlsfileread, mlsfilewrite, mlsfileupgrade;
role system_r types rpm_t;
uses_shlib(rpm_t)
type rpm_exec_t, file_type, sysadmfile, exec_type;
general_domain_access(rpm_t)
can_ps(rpm_t, domain)
allow rpm_t self:process setrlimit;
system_crond_entry(rpm_exec_t, rpm_t)
role sysadm_r types rpm_t;
domain_auto_trans(sysadm_t, rpm_exec_t, rpm_t)
type rpm_file_t, file_type, sysadmfile;
tmp_domain(rpm)
tmpfs_domain(rpm)
log_domain(rpm)
can_network(rpm_t)
allow rpm_t port_type:tcp_socket name_connect;
can_ypbind(rpm_t)
# Allow the rpm domain to execute other programs
can_exec_any(rpm_t)
# Capabilties needed by rpm utils
allow rpm_t self:capability { chown dac_override fowner fsetid setgid setuid net_bind_service sys_chroot sys_tty_config mknod };
# Access /var/lib/rpm files
var_lib_domain(rpm)
allow userdomain var_lib_t:dir { getattr search };
r_dir_file(userdomain, rpm_var_lib_t)
r_dir_file(rpm_t, proc_t)
allow rpm_t sysfs_t:dir r_dir_perms;
allow rpm_t usbdevfs_t:dir r_dir_perms;
# for installing kernel packages
allow rpm_t fixed_disk_device_t:blk_file { getattr read };
# Access terminals.
allow rpm_t admin_tty_type:chr_file rw_file_perms;
ifdef(`gnome-pty-helper.te', `allow rpm_t sysadm_gph_t:fd use;')
allow rpm_t privfd:fd use;
allow rpm_t devtty_t:chr_file rw_file_perms;
domain_auto_trans(rpm_t, ldconfig_exec_t, ldconfig_t)
domain_auto_trans(rpm_t, initrc_exec_t, initrc_t)
ifdef(`cups.te', `
r_dir_file(cupsd_t, rpm_var_lib_t)
allow cupsd_t initrc_exec_t:file { getattr read };
domain_auto_trans(rpm_script_t, cupsd_exec_t, cupsd_t)
')
# for a bug in rm
dontaudit initrc_t pidfile:file write;
# bash tries to access a block device in the initrd
dontaudit initrc_t unlabeled_t:blk_file getattr;
# bash tries ioctl for some reason
dontaudit initrc_t pidfile:file ioctl;
allow rpm_t autofs_t:dir { search getattr };
allow rpm_t autofs_t:filesystem getattr;
allow rpm_script_t autofs_t:dir { search getattr };
allow rpm_t devpts_t:dir { setattr r_dir_perms };
allow rpm_t { devpts_t proc_t usbdevfs_t fs_t }:filesystem getattr;
dontaudit rpm_t security_t:filesystem getattr;
can_getcon(rpm_t)
can_setfscreate(rpm_t)
can_setexec(rpm_t)
read_sysctl(rpm_t)
general_domain_access(rpm_script_t)
# read/write/create any files in the system
allow rpm_t { file_type -shadow_t }:{ file lnk_file dir fifo_file sock_file } { relabelfrom relabelto };
allow rpm_t { file_type - shadow_t }:dir create_dir_perms;
allow rpm_t { file_type - shadow_t }:{ file lnk_file fifo_file sock_file } create_file_perms;
allow rpm_t sysfs_t:filesystem getattr;
allow rpm_t tmpfs_t:filesystem getattr;
dontaudit rpm_t domain:{ socket unix_dgram_socket udp_socket unix_stream_socket tcp_socket fifo_file rawip_socket packet_socket } getattr;
# needs rw permission to the directory for an rpm package that includes a mount
# point
allow rpm_t fs_type:dir { setattr rw_dir_perms };
allow rpm_t fs_type:filesystem getattr;
# allow compiling and loading new policy
create_dir_file(rpm_t, { policy_src_t policy_config_t })
can_getsecurity({ rpm_t rpm_script_t })
dontaudit rpm_t shadow_t:file { getattr read };
allow rpm_t urandom_device_t:chr_file read;
allow rpm_t { device_t device_type }:{ chr_file blk_file } { create_file_perms relabelfrom relabelto };
allow rpm_t ttyfile:chr_file unlink;
allow rpm_script_t tty_device_t:chr_file getattr;
allow rpm_script_t devpts_t:dir search;
allow rpm_script_t {devpts_t devtty_t}:chr_file rw_file_perms;
allow { insmod_t depmod_t } rpm_t:fifo_file rw_file_perms;
type rpm_script_t, domain, admin, etc_writer, privlog, privowner, privmodule, privmem, fs_domain, privfd, privmail, privrole, priv_system_role, mlsfileread, mlsfilewrite;
# policy for rpm scriptlet
role system_r types rpm_script_t;
uses_shlib(rpm_script_t)
read_locale(rpm_script_t)
can_ps(rpm_script_t, domain)
ifdef(`lpd.te', `
can_exec(rpm_script_t, printconf_t)
')
read_sysctl(rpm_script_t)
type rpm_script_exec_t, file_type, sysadmfile, exec_type;
role sysadm_r types rpm_script_t;
domain_trans(rpm_t, shell_exec_t, rpm_script_t)
ifdef(`hide_broken_symptoms', `
ifdef(`pamconsole.te', `
domain_trans(rpm_t, pam_console_exec_t, rpm_script_t)
')
')
tmp_domain(rpm_script)
tmpfs_domain(rpm_script)
# Allow the rpm domain to execute other programs
can_exec_any(rpm_script_t)
# Capabilties needed by rpm scripts utils
allow rpm_script_t self:capability { chown dac_override dac_read_search fowner fsetid setgid setuid ipc_lock sys_chroot sys_nice mknod kill };
# ideally we would not need this
allow rpm_script_t { file_type - shadow_t }:dir create_dir_perms;
allow rpm_script_t { file_type - shadow_t }:{ file lnk_file fifo_file sock_file } create_file_perms;
allow rpm_script_t { device_t device_type }:{ chr_file blk_file } create_file_perms;
# for kernel package installation
ifdef(`mount.te', `
allow mount_t rpm_t:fifo_file rw_file_perms;
')
# Commonly used from postinst scripts
ifdef(`consoletype.te', `
allow consoletype_t rpm_t:fifo_file r_file_perms;
')
ifdef(`crond.te', `
allow crond_t rpm_t:fifo_file r_file_perms;
')
allow rpm_script_t proc_t:dir r_dir_perms;
allow rpm_script_t proc_t:{ file lnk_file } r_file_perms;
allow rpm_script_t devtty_t:chr_file rw_file_perms;
allow rpm_script_t devpts_t:dir r_dir_perms;
allow rpm_script_t admin_tty_type:chr_file rw_file_perms;
allow rpm_script_t etc_runtime_t:file { getattr read };
allow rpm_script_t privfd:fd use;
allow rpm_script_t rpm_tmp_t:file { getattr read ioctl };
allow rpm_script_t urandom_device_t:chr_file read;
ifdef(`ssh-agent.te', `
domain_auto_trans(rpm_script_t, ssh_agent_exec_t, sysadm_ssh_agent_t)
')
ifdef(`useradd.te', `
domain_auto_trans(rpm_script_t, useradd_exec_t, useradd_t)
domain_auto_trans(rpm_script_t, groupadd_exec_t, groupadd_t)
role system_r types { useradd_t groupadd_t };
allow { useradd_t groupadd_t } rpm_t:fd use;
allow { useradd_t groupadd_t } rpm_t:fifo_file { read write };
')
domain_auto_trans(rpm_script_t, restorecon_exec_t, restorecon_t)
domain_auto_trans(rpm_script_t, ldconfig_exec_t, ldconfig_t)
domain_auto_trans(rpm_script_t, depmod_exec_t, depmod_t)
role sysadm_r types initrc_t;
domain_auto_trans(rpm_script_t, initrc_exec_t, initrc_t)
ifdef(`bootloader.te', `
domain_auto_trans(rpm_script_t, bootloader_exec_t, bootloader_t)
allow bootloader_t rpm_t:fifo_file rw_file_perms;
')
domain_auto_trans(rpm_script_t, load_policy_exec_t, load_policy_t)
rw_dir_file(rpm_script_t, nfs_t)
allow rpm_script_t nfs_t:filesystem getattr;
allow rpm_script_t fs_t:filesystem { getattr mount unmount };
allow rpm_script_t rpm_script_tmp_t:dir mounton;
can_exec(rpm_script_t, usr_t)
can_exec(rpm_script_t, sbin_t)
allow rpm_t mount_t:tcp_socket write;
create_dir_file(rpm_t, nfs_t)
allow rpm_t { removable_t nfs_t }:filesystem getattr;
allow rpm_script_t userdomain:fd use;
allow domain rpm_t:fifo_file r_file_perms;
allow domain rpm_t:fd use;
ifdef(`ssh.te', `
allow sshd_t rpm_script_t:fd use;
allow sshd_t rpm_t:fd use;
')
dontaudit rpm_script_t shadow_t:file getattr;
allow rpm_script_t sysfs_t:dir r_dir_perms;
ifdef(`prelink.te', `
domain_auto_trans(rpm_t, prelink_exec_t, prelink_t)
')
allow rpm_t rpc_pipefs_t:dir search;
allow rpm_script_t init_t:dir search;
type rpmbuild_exec_t, file_type, sysadmfile, exec_type;
type rpmbuild_t, domain;
allow rpmbuild_t policy_config_t:dir search;
allow rpmbuild_t policy_src_t:dir search;
allow rpmbuild_t policy_src_t:file { getattr read };
can_getsecurity(rpmbuild_t)
allow rpm_script_t domain:process { signal signull };
# Access /var/lib/rpm.
allow initrc_t rpm_var_lib_t:dir rw_dir_perms;
allow initrc_t rpm_var_lib_t:file create_file_perms;
ifdef(`unlimitedRPM', `
typeattribute rpm_t auth_write;
unconfined_domain(rpm_t)
typeattribute rpm_script_t auth_write;
unconfined_domain(rpm_script_t)
')
if (allow_execmem) {
allow rpm_script_t self:process execmem;
}