1 |
commit: f7841ba8bc8cc2ba32a7ae7c1bdf38af3f5ae3f3 |
2 |
Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> |
3 |
AuthorDate: Fri Nov 2 19:00:35 2012 +0000 |
4 |
Commit: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> |
5 |
CommitDate: Fri Nov 2 19:00:35 2012 +0000 |
6 |
URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=f7841ba8 |
7 |
|
8 |
Reshuffle gentoo specific puppet code |
9 |
|
10 |
--- |
11 |
policy/modules/contrib/puppet.te | 31 +++++++++++++++++-------------- |
12 |
1 files changed, 17 insertions(+), 14 deletions(-) |
13 |
|
14 |
diff --git a/policy/modules/contrib/puppet.te b/policy/modules/contrib/puppet.te |
15 |
index fe4f5a1..d9de41f 100644 |
16 |
--- a/policy/modules/contrib/puppet.te |
17 |
+++ b/policy/modules/contrib/puppet.te |
18 |
@@ -58,7 +58,7 @@ files_tmp_file(puppetmaster_tmp_t) |
19 |
# Local policy |
20 |
# |
21 |
|
22 |
-allow puppet_t self:capability { fowner fsetid setuid setgid dac_override sys_nice sys_tty_config chown }; |
23 |
+allow puppet_t self:capability { fowner fsetid setuid setgid dac_override sys_nice sys_tty_config }; |
24 |
allow puppet_t self:process { signal signull getsched setsched }; |
25 |
allow puppet_t self:fifo_file rw_fifo_file_perms; |
26 |
allow puppet_t self:netlink_route_socket nlmsg_write; |
27 |
@@ -86,8 +86,7 @@ manage_files_pattern(puppet_t, puppet_tmp_t, puppet_tmp_t) |
28 |
files_tmp_filetrans(puppet_t, puppet_tmp_t, { file dir }) |
29 |
|
30 |
kernel_dontaudit_search_sysctl(puppet_t) |
31 |
-kernel_read_kernel_sysctls(puppet_t) |
32 |
-kernel_read_network_state(puppet_t) |
33 |
+kernel_dontaudit_search_kernel_sysctl(puppet_t) |
34 |
kernel_read_system_state(puppet_t) |
35 |
kernel_read_crypto_sysctls(puppet_t) |
36 |
kernel_read_kernel_sysctls(puppet_t) |
37 |
@@ -145,9 +144,22 @@ seutil_domtrans_setfiles(puppet_t) |
38 |
seutil_domtrans_semanage(puppet_t) |
39 |
|
40 |
sysnet_run_ifconfig(puppet_t, system_r) |
41 |
-sysnet_use_ldap(puppet_t) |
42 |
|
43 |
-usermanage_domtrans_passwd(puppet_t) |
44 |
+ifdef(`distro_gentoo',` |
45 |
+ allow puppet_t self:capability chown; |
46 |
+ |
47 |
+ kernel_read_kernel_sysctls(puppet_t) |
48 |
+ kernel_read_network_state(puppet_t) |
49 |
+ |
50 |
+ sysnet_use_ldap(puppet_t) |
51 |
+ |
52 |
+ usermanage_domtrans_passwd(puppet_t) |
53 |
+ |
54 |
+ optional_policy(` |
55 |
+ init_exec_rc(puppet_t) |
56 |
+ portage_run(puppet_t, system_r) |
57 |
+ ') |
58 |
+') |
59 |
|
60 |
tunable_policy(`puppet_manage_all_files',` |
61 |
files_manage_non_auth_files(puppet_t) |
62 |
@@ -203,15 +215,6 @@ optional_policy(` |
63 |
') |
64 |
|
65 |
optional_policy(` |
66 |
- mta_send_mail(puppet_t) |
67 |
-') |
68 |
- |
69 |
-optional_policy(` |
70 |
- init_exec_rc(puppet_t) |
71 |
- portage_run(puppet_t, system_r) |
72 |
-') |
73 |
- |
74 |
-optional_policy(` |
75 |
files_rw_var_files(puppet_t) |
76 |
|
77 |
rpm_domtrans(puppet_t) |