From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id B068B139695 for ; Sun, 30 Apr 2017 09:41:04 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 91C51E0C14; Sun, 30 Apr 2017 09:40:43 +0000 (UTC) Received: from smtp.gentoo.org (dev.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 610C6E0C14 for ; Sun, 30 Apr 2017 09:40:43 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 5B6AC3416A8 for ; Sun, 30 Apr 2017 09:40:42 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id AE03C7448 for ; Sun, 30 Apr 2017 09:40:39 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1493543807.99a1aee5df78c8da42caa7bf1df6bc8110898f81.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:next commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/apache.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 99a1aee5df78c8da42caa7bf1df6bc8110898f81 X-VCS-Branch: next Date: Sun, 30 Apr 2017 09:40:39 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 8ed60fcd-a30d-40e8-8a6b-ca27b3ff03d1 X-Archives-Hash: f80625bdbfa3b730b7d78ffe2f9cee86 commit: 99a1aee5df78c8da42caa7bf1df6bc8110898f81 Author: Chris PeBenito ieee org> AuthorDate: Fri Apr 21 00:19:13 2017 +0000 Commit: Jason Zaman gentoo org> CommitDate: Sun Apr 30 09:16:47 2017 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=99a1aee5 apache: Move blocks. No rule changes. policy/modules/contrib/apache.te | 58 +++++++++++++++++++--------------------- 1 file changed, 28 insertions(+), 30 deletions(-) diff --git a/policy/modules/contrib/apache.te b/policy/modules/contrib/apache.te index ce6479e8..9593175b 100644 --- a/policy/modules/contrib/apache.te +++ b/policy/modules/contrib/apache.te @@ -745,14 +745,6 @@ tunable_policy(`httpd_use_fusefs && httpd_builtin_scripting',` fs_exec_fusefs_files(httpd_t) ') -optional_policy(` - tunable_policy(`httpd_use_nfs',` - fs_list_auto_mountpoints(httpd_t) - rpc_manage_nfs_rw_content(httpd_t) - rpc_read_nfs_content(httpd_t) - ') -') - tunable_policy(`httpd_use_nfs && httpd_builtin_scripting',` fs_exec_nfs_files(httpd_t) ') @@ -877,6 +869,12 @@ optional_policy(` optional_policy(` rpc_search_nfs_state_data(httpd_t) + + tunable_policy(`httpd_use_nfs',` + fs_list_auto_mountpoints(httpd_t) + rpc_manage_nfs_rw_content(httpd_t) + rpc_read_nfs_content(httpd_t) + ') ') optional_policy(` @@ -1016,6 +1014,10 @@ tunable_policy(`httpd_enable_cgi && httpd_unified',` domtrans_pattern(httpd_suexec_t, httpdcontent, httpd_sys_script_t) ') +tunable_policy(`httpd_enable_homedirs',` + userdom_search_user_home_dirs(httpd_suexec_t) +') + tunable_policy(`httpd_enable_homedirs && use_samba_home_dirs',` fs_list_auto_mountpoints(httpd_suexec_t) fs_read_cifs_files(httpd_suexec_t) @@ -1040,6 +1042,10 @@ tunable_policy(`httpd_execmem',` allow httpd_suexec_t self:process { execmem execstack }; ') +tunable_policy(`httpd_read_user_content',` + userdom_read_user_home_content_files(httpd_suexec_t) +') + tunable_policy(`httpd_tmp_exec',` can_exec(httpd_suexec_t, httpd_suexec_tmp_t) ') @@ -1072,14 +1078,6 @@ tunable_policy(`httpd_use_fusefs && httpd_builtin_scripting',` fs_exec_fusefs_files(httpd_suexec_t) ') -optional_policy(` - tunable_policy(`httpd_use_nfs',` - fs_list_auto_mountpoints(httpd_suexec_t) - rpc_manage_nfs_rw_content(httpd_t) - rpc_read_nfs_content(httpd_t) - ') -') - tunable_policy(`httpd_use_nfs && httpd_builtin_scripting',` fs_exec_nfs_files(httpd_suexec_t) ') @@ -1106,12 +1104,12 @@ optional_policy(` ') ') -tunable_policy(`httpd_read_user_content',` - userdom_read_user_home_content_files(httpd_suexec_t) -') - -tunable_policy(`httpd_enable_homedirs',` - userdom_search_user_home_dirs(httpd_suexec_t) +optional_policy(` + tunable_policy(`httpd_use_nfs',` + fs_list_auto_mountpoints(httpd_suexec_t) + rpc_manage_nfs_rw_content(httpd_t) + rpc_read_nfs_content(httpd_t) + ') ') ######################################## @@ -1311,14 +1309,6 @@ tunable_policy(`httpd_use_fusefs && httpd_builtin_scripting',` fs_exec_fusefs_files(httpd_sys_script_t) ') -optional_policy(` - tunable_policy(`httpd_use_nfs',` - fs_list_auto_mountpoints(httpd_sys_script_t) - rpc_manage_nfs_rw_content(httpd_t) - rpc_read_nfs_content(httpd_t) - ') -') - tunable_policy(`httpd_use_nfs && httpd_builtin_scripting',` fs_exec_nfs_files(httpd_sys_script_t) ') @@ -1331,6 +1321,14 @@ optional_policy(` postgresql_unpriv_client(httpd_sys_script_t) ') +optional_policy(` + tunable_policy(`httpd_use_nfs',` + fs_list_auto_mountpoints(httpd_sys_script_t) + rpc_manage_nfs_rw_content(httpd_t) + rpc_read_nfs_content(httpd_t) + ') +') + ######################################## # # Rotatelogs local policy From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id EC702139695 for ; Sun, 30 Apr 2017 09:33:35 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 8F3CFE0E09; Sun, 30 Apr 2017 09:33:19 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 59F8BE0E08 for ; Sun, 30 Apr 2017 09:33:09 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 52EC13416A3 for ; Sun, 30 Apr 2017 09:32:49 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 89B7F7455 for ; Sun, 30 Apr 2017 09:32:45 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1493543807.99a1aee5df78c8da42caa7bf1df6bc8110898f81.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/apache.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 99a1aee5df78c8da42caa7bf1df6bc8110898f81 X-VCS-Branch: master Date: Sun, 30 Apr 2017 09:32:45 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 69cd338e-1e8c-4af4-b691-ed2a98039cd7 X-Archives-Hash: 7960ef4a513a982a1a4acd69f17d34dc Message-ID: <20170430093245.zEDekxFLorpFpIOU1T8qzFTAXzAbFBsXnNcV-zFhlNA@z> commit: 99a1aee5df78c8da42caa7bf1df6bc8110898f81 Author: Chris PeBenito ieee org> AuthorDate: Fri Apr 21 00:19:13 2017 +0000 Commit: Jason Zaman gentoo org> CommitDate: Sun Apr 30 09:16:47 2017 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=99a1aee5 apache: Move blocks. No rule changes. policy/modules/contrib/apache.te | 58 +++++++++++++++++++--------------------- 1 file changed, 28 insertions(+), 30 deletions(-) diff --git a/policy/modules/contrib/apache.te b/policy/modules/contrib/apache.te index ce6479e8..9593175b 100644 --- a/policy/modules/contrib/apache.te +++ b/policy/modules/contrib/apache.te @@ -745,14 +745,6 @@ tunable_policy(`httpd_use_fusefs && httpd_builtin_scripting',` fs_exec_fusefs_files(httpd_t) ') -optional_policy(` - tunable_policy(`httpd_use_nfs',` - fs_list_auto_mountpoints(httpd_t) - rpc_manage_nfs_rw_content(httpd_t) - rpc_read_nfs_content(httpd_t) - ') -') - tunable_policy(`httpd_use_nfs && httpd_builtin_scripting',` fs_exec_nfs_files(httpd_t) ') @@ -877,6 +869,12 @@ optional_policy(` optional_policy(` rpc_search_nfs_state_data(httpd_t) + + tunable_policy(`httpd_use_nfs',` + fs_list_auto_mountpoints(httpd_t) + rpc_manage_nfs_rw_content(httpd_t) + rpc_read_nfs_content(httpd_t) + ') ') optional_policy(` @@ -1016,6 +1014,10 @@ tunable_policy(`httpd_enable_cgi && httpd_unified',` domtrans_pattern(httpd_suexec_t, httpdcontent, httpd_sys_script_t) ') +tunable_policy(`httpd_enable_homedirs',` + userdom_search_user_home_dirs(httpd_suexec_t) +') + tunable_policy(`httpd_enable_homedirs && use_samba_home_dirs',` fs_list_auto_mountpoints(httpd_suexec_t) fs_read_cifs_files(httpd_suexec_t) @@ -1040,6 +1042,10 @@ tunable_policy(`httpd_execmem',` allow httpd_suexec_t self:process { execmem execstack }; ') +tunable_policy(`httpd_read_user_content',` + userdom_read_user_home_content_files(httpd_suexec_t) +') + tunable_policy(`httpd_tmp_exec',` can_exec(httpd_suexec_t, httpd_suexec_tmp_t) ') @@ -1072,14 +1078,6 @@ tunable_policy(`httpd_use_fusefs && httpd_builtin_scripting',` fs_exec_fusefs_files(httpd_suexec_t) ') -optional_policy(` - tunable_policy(`httpd_use_nfs',` - fs_list_auto_mountpoints(httpd_suexec_t) - rpc_manage_nfs_rw_content(httpd_t) - rpc_read_nfs_content(httpd_t) - ') -') - tunable_policy(`httpd_use_nfs && httpd_builtin_scripting',` fs_exec_nfs_files(httpd_suexec_t) ') @@ -1106,12 +1104,12 @@ optional_policy(` ') ') -tunable_policy(`httpd_read_user_content',` - userdom_read_user_home_content_files(httpd_suexec_t) -') - -tunable_policy(`httpd_enable_homedirs',` - userdom_search_user_home_dirs(httpd_suexec_t) +optional_policy(` + tunable_policy(`httpd_use_nfs',` + fs_list_auto_mountpoints(httpd_suexec_t) + rpc_manage_nfs_rw_content(httpd_t) + rpc_read_nfs_content(httpd_t) + ') ') ######################################## @@ -1311,14 +1309,6 @@ tunable_policy(`httpd_use_fusefs && httpd_builtin_scripting',` fs_exec_fusefs_files(httpd_sys_script_t) ') -optional_policy(` - tunable_policy(`httpd_use_nfs',` - fs_list_auto_mountpoints(httpd_sys_script_t) - rpc_manage_nfs_rw_content(httpd_t) - rpc_read_nfs_content(httpd_t) - ') -') - tunable_policy(`httpd_use_nfs && httpd_builtin_scripting',` fs_exec_nfs_files(httpd_sys_script_t) ') @@ -1331,6 +1321,14 @@ optional_policy(` postgresql_unpriv_client(httpd_sys_script_t) ') +optional_policy(` + tunable_policy(`httpd_use_nfs',` + fs_list_auto_mountpoints(httpd_sys_script_t) + rpc_manage_nfs_rw_content(httpd_t) + rpc_read_nfs_content(httpd_t) + ') +') + ######################################## # # Rotatelogs local policy