Skip to content

Commit 1433c0c

Browse files
authored
Merge pull request cfengine#6035 from aleksandrychev/ENT-13666
ENT-13666: Added RHEL 10 specific SELinux policy
2 parents 3a117c0 + bb48d08 commit 1433c0c

File tree

2 files changed

+49
-0
lines changed

2 files changed

+49
-0
lines changed

misc/selinux/Makefile.am

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,5 +18,6 @@ endif
1818
# tarball even without running './configure --with-selinux-policy'
1919
DISTFILES = Makefile.in Makefile.am cfengine-enterprise.fc cfengine-enterprise.te.all
2020
DISTFILES += cfengine-enterprise.te.el9
21+
DISTFILES += cfengine-enterprise.te.el10
2122

2223
CLEANFILES = cfengine-enterprise.pp cfengine-enterprise.if cfengine-enterprise.te
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
require {
2+
type devpts_t;
3+
type systemd_userdbd_runtime_t;
4+
type systemd_userdbd_t;
5+
}
6+
7+
#============= cfengine_apachectl_t ==============
8+
allow cfengine_apachectl_t devpts_t:dir { getattr search };
9+
allow cfengine_apachectl_t proc_t:file getattr;
10+
allow cfengine_apachectl_t self:capability { dac_override dac_read_search sys_ptrace };
11+
allow cfengine_apachectl_t sysfs_t:dir read;
12+
allow cfengine_apachectl_t sysfs_t:file { open read };
13+
allow cfengine_apachectl_t tty_device_t:chr_file getattr;
14+
allow cfengine_apachectl_t user_devpts_t:chr_file getattr;
15+
16+
# selinux-policy requires the following http_port permissions whereas 3.14.3 does not.
17+
# these permissions are not be needed if changes from ENT-12954 to masterfiles policy move inventory from common to an agent bundle are in place.
18+
#============= cfengine_execd_t ==============
19+
allow cfengine_execd_t http_port_t:tcp_socket name_connect;
20+
21+
#============= cfengine_httpd_t ==============
22+
allow cfengine_httpd_t hugetlbfs_t:file { read write };
23+
allow cfengine_httpd_t systemd_userdbd_runtime_t:dir { open read getattr search };
24+
allow cfengine_httpd_t systemd_userdbd_runtime_t:lnk_file read;
25+
allow cfengine_httpd_t systemd_userdbd_runtime_t:sock_file write;
26+
allow cfengine_httpd_t systemd_userdbd_t:unix_stream_socket connectto;
27+
allow cfengine_httpd_t kernel_t:unix_stream_socket connectto;
28+
29+
#============= cfengine_hub_t ==============
30+
allow cfengine_hub_t cfengine_httpd_exec_t:file getattr;
31+
allow cfengine_hub_t sysfs_t:lnk_file read;
32+
33+
#============= cfengine_postgres_t ==============
34+
allow cfengine_postgres_t systemd_userdbd_runtime_t:dir { open read getattr search };
35+
allow cfengine_postgres_t systemd_userdbd_runtime_t:lnk_file read;
36+
allow cfengine_postgres_t systemd_userdbd_runtime_t:sock_file write;
37+
allow cfengine_postgres_t systemd_userdbd_t:unix_stream_socket connectto;
38+
allow cfengine_postgres_t kernel_t:unix_stream_socket connectto;
39+
40+
#============= cfengine_reactor_t ==============
41+
allow cfengine_reactor_t systemd_userdbd_runtime_t:dir { open read getattr search };
42+
allow cfengine_reactor_t systemd_userdbd_runtime_t:lnk_file read;
43+
allow cfengine_reactor_t systemd_userdbd_runtime_t:sock_file write;
44+
allow cfengine_reactor_t systemd_userdbd_t:unix_stream_socket connectto;
45+
allow cfengine_reactor_t kernel_t:unix_stream_socket connectto;
46+
47+
#============= cfengine_serverd_t ==============
48+
allow cfengine_serverd_t http_port_t:tcp_socket name_connect;

0 commit comments

Comments
 (0)