Gentoo Archives: gentoo-commits

From: Sven Vermeulen <sven.vermeulen@××××××.be>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/
Date: Fri, 02 Nov 2012 19:09:45
Message-Id: 1351882835.f7841ba8bc8cc2ba32a7ae7c1bdf38af3f5ae3f3.SwifT@gentoo
1 commit: f7841ba8bc8cc2ba32a7ae7c1bdf38af3f5ae3f3
2 Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
3 AuthorDate: Fri Nov 2 19:00:35 2012 +0000
4 Commit: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
5 CommitDate: Fri Nov 2 19:00:35 2012 +0000
6 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=f7841ba8
7
8 Reshuffle gentoo specific puppet code
9
10 ---
11 policy/modules/contrib/puppet.te | 31 +++++++++++++++++--------------
12 1 files changed, 17 insertions(+), 14 deletions(-)
13
14 diff --git a/policy/modules/contrib/puppet.te b/policy/modules/contrib/puppet.te
15 index fe4f5a1..d9de41f 100644
16 --- a/policy/modules/contrib/puppet.te
17 +++ b/policy/modules/contrib/puppet.te
18 @@ -58,7 +58,7 @@ files_tmp_file(puppetmaster_tmp_t)
19 # Local policy
20 #
21
22 -allow puppet_t self:capability { fowner fsetid setuid setgid dac_override sys_nice sys_tty_config chown };
23 +allow puppet_t self:capability { fowner fsetid setuid setgid dac_override sys_nice sys_tty_config };
24 allow puppet_t self:process { signal signull getsched setsched };
25 allow puppet_t self:fifo_file rw_fifo_file_perms;
26 allow puppet_t self:netlink_route_socket nlmsg_write;
27 @@ -86,8 +86,7 @@ manage_files_pattern(puppet_t, puppet_tmp_t, puppet_tmp_t)
28 files_tmp_filetrans(puppet_t, puppet_tmp_t, { file dir })
29
30 kernel_dontaudit_search_sysctl(puppet_t)
31 -kernel_read_kernel_sysctls(puppet_t)
32 -kernel_read_network_state(puppet_t)
33 +kernel_dontaudit_search_kernel_sysctl(puppet_t)
34 kernel_read_system_state(puppet_t)
35 kernel_read_crypto_sysctls(puppet_t)
36 kernel_read_kernel_sysctls(puppet_t)
37 @@ -145,9 +144,22 @@ seutil_domtrans_setfiles(puppet_t)
38 seutil_domtrans_semanage(puppet_t)
39
40 sysnet_run_ifconfig(puppet_t, system_r)
41 -sysnet_use_ldap(puppet_t)
42
43 -usermanage_domtrans_passwd(puppet_t)
44 +ifdef(`distro_gentoo',`
45 + allow puppet_t self:capability chown;
46 +
47 + kernel_read_kernel_sysctls(puppet_t)
48 + kernel_read_network_state(puppet_t)
49 +
50 + sysnet_use_ldap(puppet_t)
51 +
52 + usermanage_domtrans_passwd(puppet_t)
53 +
54 + optional_policy(`
55 + init_exec_rc(puppet_t)
56 + portage_run(puppet_t, system_r)
57 + ')
58 +')
59
60 tunable_policy(`puppet_manage_all_files',`
61 files_manage_non_auth_files(puppet_t)
62 @@ -203,15 +215,6 @@ optional_policy(`
63 ')
64
65 optional_policy(`
66 - mta_send_mail(puppet_t)
67 -')
68 -
69 -optional_policy(`
70 - init_exec_rc(puppet_t)
71 - portage_run(puppet_t, system_r)
72 -')
73 -
74 -optional_policy(`
75 files_rw_var_files(puppet_t)
76
77 rpm_domtrans(puppet_t)