|
| 1 | +require { |
| 2 | + type devpts_t; |
| 3 | + type systemd_userdbd_runtime_t; |
| 4 | + type systemd_userdbd_t; |
| 5 | +} |
| 6 | + |
| 7 | +#============= cfengine_apachectl_t ============== |
| 8 | +allow cfengine_apachectl_t devpts_t:dir { getattr search }; |
| 9 | +allow cfengine_apachectl_t proc_t:file getattr; |
| 10 | +allow cfengine_apachectl_t self:capability { dac_override dac_read_search sys_ptrace }; |
| 11 | +allow cfengine_apachectl_t sysfs_t:dir read; |
| 12 | +allow cfengine_apachectl_t sysfs_t:file { open read }; |
| 13 | +allow cfengine_apachectl_t tty_device_t:chr_file getattr; |
| 14 | +allow cfengine_apachectl_t user_devpts_t:chr_file getattr; |
| 15 | + |
| 16 | +# selinux-policy requires the following http_port permissions whereas 3.14.3 does not. |
| 17 | +# these permissions are not be needed if changes from ENT-12954 to masterfiles policy move inventory from common to an agent bundle are in place. |
| 18 | +#============= cfengine_execd_t ============== |
| 19 | +allow cfengine_execd_t http_port_t:tcp_socket name_connect; |
| 20 | + |
| 21 | +#============= cfengine_httpd_t ============== |
| 22 | +allow cfengine_httpd_t hugetlbfs_t:file { read write }; |
| 23 | +allow cfengine_httpd_t systemd_userdbd_runtime_t:dir { open read getattr search }; |
| 24 | +allow cfengine_httpd_t systemd_userdbd_runtime_t:lnk_file read; |
| 25 | +allow cfengine_httpd_t systemd_userdbd_runtime_t:sock_file write; |
| 26 | +allow cfengine_httpd_t systemd_userdbd_t:unix_stream_socket connectto; |
| 27 | +allow cfengine_httpd_t kernel_t:unix_stream_socket connectto; |
| 28 | + |
| 29 | +#============= cfengine_hub_t ============== |
| 30 | +allow cfengine_hub_t cfengine_httpd_exec_t:file getattr; |
| 31 | +allow cfengine_hub_t sysfs_t:lnk_file read; |
| 32 | + |
| 33 | +#============= cfengine_postgres_t ============== |
| 34 | +allow cfengine_postgres_t systemd_userdbd_runtime_t:dir { open read getattr search }; |
| 35 | +allow cfengine_postgres_t systemd_userdbd_runtime_t:lnk_file read; |
| 36 | +allow cfengine_postgres_t systemd_userdbd_runtime_t:sock_file write; |
| 37 | +allow cfengine_postgres_t systemd_userdbd_t:unix_stream_socket connectto; |
| 38 | +allow cfengine_postgres_t kernel_t:unix_stream_socket connectto; |
| 39 | + |
| 40 | +#============= cfengine_reactor_t ============== |
| 41 | +allow cfengine_reactor_t systemd_userdbd_runtime_t:dir { open read getattr search }; |
| 42 | +allow cfengine_reactor_t systemd_userdbd_runtime_t:lnk_file read; |
| 43 | +allow cfengine_reactor_t systemd_userdbd_runtime_t:sock_file write; |
| 44 | +allow cfengine_reactor_t systemd_userdbd_t:unix_stream_socket connectto; |
| 45 | +allow cfengine_reactor_t kernel_t:unix_stream_socket connectto; |
| 46 | + |
| 47 | +#============= cfengine_serverd_t ============== |
| 48 | +allow cfengine_serverd_t http_port_t:tcp_socket name_connect; |
0 commit comments