From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 294E21395E1 for ; Sun, 2 Aug 2015 19:06:37 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id A83FF14015; Sun, 2 Aug 2015 19:06:36 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 092C614015 for ; Sun, 2 Aug 2015 19:06:36 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 44ADB3406C7 for ; Sun, 2 Aug 2015 19:06:35 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 44482121 for ; Sun, 2 Aug 2015 19:06:33 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1438274488.d12c961da29084ced47ff21373925c02fc73e022.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:next commit in: policy/modules/system/, policy/modules/roles/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/roles/sysadm.te policy/modules/system/setrans.if X-VCS-Directories: policy/modules/roles/ policy/modules/system/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: d12c961da29084ced47ff21373925c02fc73e022 X-VCS-Branch: next Date: Sun, 2 Aug 2015 19:06:33 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: fd050b0f-f69c-48ee-87d0-98cc0971980e X-Archives-Hash: 41521700b5cb1dc60235ec58f4992c74 commit: d12c961da29084ced47ff21373925c02fc73e022 Author: Jason Zaman perfinion com> AuthorDate: Sat Jul 11 09:15:46 2015 +0000 Commit: Jason Zaman gentoo org> CommitDate: Thu Jul 30 16:41:28 2015 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=d12c961d Introduce setrans_admin interface policy/modules/roles/sysadm.te | 4 ++++ policy/modules/system/setrans.if | 31 +++++++++++++++++++++++++++++++ 2 files changed, 35 insertions(+) diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te index 5901b2f..e96c1fd 100644 --- a/policy/modules/roles/sysadm.te +++ b/policy/modules/roles/sysadm.te @@ -952,6 +952,10 @@ optional_policy(` ') optional_policy(` + setrans_admin(sysadm_t, sysadm_r) +') + +optional_policy(` setroubleshoot_admin(sysadm_t, sysadm_r) ') diff --git a/policy/modules/system/setrans.if b/policy/modules/system/setrans.if index efa9c27..2a8ecaa 100644 --- a/policy/modules/system/setrans.if +++ b/policy/modules/system/setrans.if @@ -40,3 +40,34 @@ interface(`setrans_translate_context',` stream_connect_pattern($1, setrans_var_run_t, setrans_var_run_t, setrans_t) files_list_pids($1) ') + +###################################### +## +## All of the rules required to +## administrate an setrans environment. +## +## +## +## Domain allowed access. +## +## +## +## +## Role allowed access. +## +## +# +interface(`setrans_admin',` + gen_require(` + type setrans_t, setrans_initrc_exec_t; + type setrans_var_run_t; + ') + + allow $1 setrans_t:process { ptrace signal_perms }; + ps_process_pattern($1, setrans_t) + + init_startstop_service($1, $2, setrans_t, setrans_initrc_exec_t) + + files_search_pids($1) + admin_pattern($1, setrans_var_run_t) +') From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 194AB1395D2 for ; Fri, 31 Jul 2015 14:15:44 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id C1DD214025; Fri, 31 Jul 2015 14:15:42 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id CE4B41401E for ; Fri, 31 Jul 2015 14:15:41 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 2C861340A22 for ; Fri, 31 Jul 2015 14:15:41 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 8C9A3115 for ; Fri, 31 Jul 2015 14:15:38 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1438274488.d12c961da29084ced47ff21373925c02fc73e022.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/roles/, policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/roles/sysadm.te policy/modules/system/setrans.if X-VCS-Directories: policy/modules/system/ policy/modules/roles/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: d12c961da29084ced47ff21373925c02fc73e022 X-VCS-Branch: master Date: Fri, 31 Jul 2015 14:15:38 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 593f3c3c-00e8-4f23-8a78-ddf33571ddbf X-Archives-Hash: 97e9f02f24ec6a0eac6d430acc7399fe Message-ID: <20150731141538.snVOSH2hExmlTdmOUTtTW7rSVvDx2SeuUJrI3YF3DJM@z> commit: d12c961da29084ced47ff21373925c02fc73e022 Author: Jason Zaman perfinion com> AuthorDate: Sat Jul 11 09:15:46 2015 +0000 Commit: Jason Zaman gentoo org> CommitDate: Thu Jul 30 16:41:28 2015 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=d12c961d Introduce setrans_admin interface policy/modules/roles/sysadm.te | 4 ++++ policy/modules/system/setrans.if | 31 +++++++++++++++++++++++++++++++ 2 files changed, 35 insertions(+) diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te index 5901b2f..e96c1fd 100644 --- a/policy/modules/roles/sysadm.te +++ b/policy/modules/roles/sysadm.te @@ -952,6 +952,10 @@ optional_policy(` ') optional_policy(` + setrans_admin(sysadm_t, sysadm_r) +') + +optional_policy(` setroubleshoot_admin(sysadm_t, sysadm_r) ') diff --git a/policy/modules/system/setrans.if b/policy/modules/system/setrans.if index efa9c27..2a8ecaa 100644 --- a/policy/modules/system/setrans.if +++ b/policy/modules/system/setrans.if @@ -40,3 +40,34 @@ interface(`setrans_translate_context',` stream_connect_pattern($1, setrans_var_run_t, setrans_var_run_t, setrans_t) files_list_pids($1) ') + +###################################### +## +## All of the rules required to +## administrate an setrans environment. +## +## +## +## Domain allowed access. +## +## +## +## +## Role allowed access. +## +## +# +interface(`setrans_admin',` + gen_require(` + type setrans_t, setrans_initrc_exec_t; + type setrans_var_run_t; + ') + + allow $1 setrans_t:process { ptrace signal_perms }; + ps_process_pattern($1, setrans_t) + + init_startstop_service($1, $2, setrans_t, setrans_initrc_exec_t) + + files_search_pids($1) + admin_pattern($1, setrans_var_run_t) +')