Gentoo Archives: gentoo-commits

From: Jason Zaman <perfinion@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/admin/
Date: Sun, 27 Feb 2022 02:52:46
Message-Id: 1645927997.4b1f697b6a9ee59734e0cdf1067cc6d57a3b0799.perfinion@gentoo
1 commit: 4b1f697b6a9ee59734e0cdf1067cc6d57a3b0799
2 Author: Russell Coker <russell <AT> coker <DOT> com <DOT> au>
3 AuthorDate: Thu Feb 17 14:45:38 2022 +0000
4 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
5 CommitDate: Sun Feb 27 02:13:17 2022 +0000
6 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=4b1f697b
7
8 puppet V3
9
10 Removed the entrypoint stuff that was controversial, the rest should be fine.
11
12 I think it's ready to merge.
13
14 Signed-off-by: Russell Coker <russell <AT> coker.com.au>
15 Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
16
17 policy/modules/admin/puppet.fc | 1 +
18 policy/modules/admin/puppet.te | 9 +++++++--
19 2 files changed, 8 insertions(+), 2 deletions(-)
20
21 diff --git a/policy/modules/admin/puppet.fc b/policy/modules/admin/puppet.fc
22 index f45bdc6a..001f21fe 100644
23 --- a/policy/modules/admin/puppet.fc
24 +++ b/policy/modules/admin/puppet.fc
25 @@ -11,6 +11,7 @@
26 /usr/sbin/puppetd -- gen_context(system_u:object_r:puppet_exec_t,s0)
27 /usr/sbin/puppetmasterd -- gen_context(system_u:object_r:puppetmaster_exec_t,s0)
28
29 +/var/cache/puppet(/.*)? gen_context(system_u:object_r:puppet_cache_t,s0)
30 /var/lib/puppet(/.*)? gen_context(system_u:object_r:puppet_var_lib_t,s0)
31
32 /var/log/puppet(/.*)? gen_context(system_u:object_r:puppet_log_t,s0)
33
34 diff --git a/policy/modules/admin/puppet.te b/policy/modules/admin/puppet.te
35 index 3d5a832b..7ef5ab83 100644
36 --- a/policy/modules/admin/puppet.te
37 +++ b/policy/modules/admin/puppet.te
38 @@ -36,6 +36,9 @@ init_daemon_runtime_file(puppet_runtime_t, dir, "puppet")
39 type puppet_tmp_t;
40 files_tmp_file(puppet_tmp_t)
41
42 +type puppet_cache_t;
43 +files_type(puppet_cache_t)
44 +
45 type puppet_var_lib_t;
46 files_type(puppet_var_lib_t)
47
48 @@ -74,6 +77,9 @@ manage_dirs_pattern(puppet_t, puppet_var_lib_t, puppet_var_lib_t)
49 manage_files_pattern(puppet_t, puppet_var_lib_t, puppet_var_lib_t)
50 can_exec(puppet_t, puppet_var_lib_t)
51
52 +manage_dirs_pattern(puppet_t, puppet_cache_t, puppet_cache_t)
53 +manage_files_pattern(puppet_t, puppet_cache_t, puppet_cache_t)
54 +
55 setattr_dirs_pattern(puppet_t, puppet_runtime_t, puppet_runtime_t)
56 manage_files_pattern(puppet_t, puppet_runtime_t, puppet_runtime_t)
57 files_runtime_filetrans(puppet_t, puppet_runtime_t, { file dir })
58 @@ -182,8 +188,6 @@ optional_policy(`
59 ')
60
61 optional_policy(`
62 - files_rw_var_files(puppet_t)
63 -
64 rpm_domtrans(puppet_t)
65 rpm_manage_db(puppet_t)
66 rpm_manage_log(puppet_t)
67 @@ -267,6 +271,7 @@ allow puppetmaster_t puppet_etc_t:lnk_file read_lnk_file_perms;
68 allow puppetmaster_t puppet_log_t:dir setattr_dir_perms;
69 append_files_pattern(puppetmaster_t, puppet_log_t, puppet_log_t)
70 create_files_pattern(puppetmaster_t, puppet_log_t, puppet_log_t)
71 +read_files_pattern(puppetmaster_t, puppet_log_t, puppet_log_t)
72 setattr_files_pattern(puppetmaster_t, puppet_log_t, puppet_log_t)
73 logging_log_filetrans(puppetmaster_t, puppet_log_t, { file dir })