From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id DEA40139694 for ; Thu, 30 Mar 2017 17:06:57 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 532FC234012; Thu, 30 Mar 2017 17:06:46 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 31A35234013 for ; Thu, 30 Mar 2017 17:06:41 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 0D85E341650 for ; Thu, 30 Mar 2017 17:06:25 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 485D373EE for ; Thu, 30 Mar 2017 17:06:22 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1490882410.63a3fc2863f04cafbd4f160861133e064764b0d4.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/monit.if policy/modules/contrib/monit.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 63a3fc2863f04cafbd4f160861133e064764b0d4 X-VCS-Branch: master Date: Thu, 30 Mar 2017 17:06:22 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 448e3550-5aae-4445-a45a-6e666135f327 X-Archives-Hash: 650e104b689d19f59c94faaaa81606d8 Message-ID: <20170330170622.Wk7TiP-NI6aklUyNEfOI1iMdIm3Aa8odnS_9EK2sA90@z> commit: 63a3fc2863f04cafbd4f160861133e064764b0d4 Author: cgzones googlemail com> AuthorDate: Tue Mar 14 15:01:16 2017 +0000 Commit: Jason Zaman gentoo org> CommitDate: Thu Mar 30 14:00:10 2017 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=63a3fc28 monit: add syslog access and support for monit systemd service policy/modules/contrib/monit.if | 8 ++++---- policy/modules/contrib/monit.te | 3 +++ 2 files changed, 7 insertions(+), 4 deletions(-) diff --git a/policy/modules/contrib/monit.if b/policy/modules/contrib/monit.if index 6107ef9d..d249dfbd 100644 --- a/policy/modules/contrib/monit.if +++ b/policy/modules/contrib/monit.if @@ -58,10 +58,10 @@ interface(`monit_run_cli',` interface(`monit_reload',` gen_require(` class service { reload status }; - type monit_initrc_exec_t; + type monit_initrc_exec_t, monit_unit_t; ') - allow $1 monit_initrc_exec_t:service { reload status }; + allow $1 { monit_initrc_exec_t monit_unit_t }:service { reload status }; ') ######################################## @@ -77,10 +77,10 @@ interface(`monit_reload',` interface(`monit_startstop_service',` gen_require(` class service { start status stop }; - type monit_initrc_exec_t; + type monit_initrc_exec_t, monit_unit_t; ') - allow $1 monit_initrc_exec_t:service { start status stop }; + allow $1 { monit_initrc_exec_t monit_unit_t }:service { start status stop }; ') ######################################## diff --git a/policy/modules/contrib/monit.te b/policy/modules/contrib/monit.te index 470c44f4..feedbd7e 100644 --- a/policy/modules/contrib/monit.te +++ b/policy/modules/contrib/monit.te @@ -88,6 +88,7 @@ dontaudit monit_t self:capability net_admin; allow monit_t self:fifo_file rw_fifo_file_perms; allow monit_t self:rawip_socket connected_socket_perms; allow monit_t self:tcp_socket server_stream_socket_perms; +allow monit_t self:unix_dgram_socket { connect create }; allow monit_t monit_log_t:file { create read_file_perms append_file_perms }; logging_log_filetrans(monit_t, monit_log_t, file) @@ -111,6 +112,8 @@ domain_read_all_domains_state(monit_t) files_read_all_pids(monit_t) +logging_send_syslog_msg(monit_t) + ifdef(`hide_broken_symptoms',` # kernel bug: https://github.com/SELinuxProject/selinux-kernel/issues/6 dontaudit monit_t self:capability dac_override;