Move log configuration to /etc/gruntmasterd/
[gruntmaster-daemon.git] / selinux / gruntmasterd.te
CommitLineData
fe185d88
MG
1policy_module(gruntmasterd, 1.0)
2
da905f9e
MG
3define(`read_file_perms', `{ getattr ioctl read lock open }')
4define(`read_dir_perms', `{ getattr ioctl read lock open search}')
5define(`everything_file_perms', `{ getattr ioctl read lock open unlink setattr append write create rename link }')
6define(`everything_dir_perms', `{ getattr ioctl read lock open search unlink setattr write create rename link rmdir remove_name reparent add_name }')
7define(`domain_read_files', `allow $1 $2 : dir read_dir_perms; allow $1 $2 : file read_file_perms; allow $1 $2 : lnk_file read_file_perms;')
8define(`domain_everything_files', `allow $1 $2 : dir everything_dir_perms; allow $1 $2 : file everything_file_perms; allow $1 $2 : lnk_file everything_file_perms;')
9define(`gruntmaster_read', `domain_read_files(gruntmasterd_t, $1)')
10define(`gruntmaster_everything', `domain_everything_files(gruntmasterd_t, $1)')
fe185d88
MG
11
12require{
13 type bin_t;
14 type httpd_sys_content_rw_t;
15 type httpd_sys_content_t;
16 type httpd_t;
17 type httpd_tmp_t;
3f07cf69 18 type port_t;
fe185d88
MG
19 type proc_t;
20 type urandom_device_t;
21}
5c5cd38a 22
da905f9e 23# Types
5c5cd38a 24type gruntmasterd_t;
3f07cf69 25type gruntmasterd_etc_t;
5c5cd38a 26type gruntmasterd_exec_t;
5c5cd38a 27type gruntmasterd_log_t;
3f07cf69 28type gruntmasterd_tmp_t;
5c5cd38a
MG
29type gruntmaster_job_t;
30type gruntmaster_job_exec_t;
da905f9e
MG
31type gruntmaster_compile_t;
32type gruntmaster_compile_exec_t;
3f07cf69
MG
33type gruntmaster_paged_t;
34type gruntmaster_paged_exec_t;
da905f9e
MG
35
36domain_type(gruntmaster_job_t)
37domain_entry_file(gruntmaster_job_t, gruntmaster_job_exec_t)
38role system_r types gruntmaster_job_t;
fe185d88 39
da905f9e
MG
40domain_type(gruntmaster_compile_t)
41domain_entry_file(gruntmaster_compile_t, gruntmaster_compile_exec_t)
42role system_r types gruntmaster_compile_t;
3f07cf69
MG
43type_transition gruntmaster_compile_t gruntmasterd_tmp_t : file gruntmaster_job_exec_t;
44
45init_daemon_domain(gruntmaster_paged_t, gruntmaster_paged_exec_t)
46type_transition gruntmaster_paged_t httpd_sys_content_t : { file dir } httpd_sys_content_rw_t;
fe185d88 47
da905f9e
MG
48init_daemon_domain(gruntmasterd_t, gruntmasterd_exec_t)
49logging_log_file(gruntmasterd_log_t)
50logging_log_filetrans(gruntmasterd_t, gruntmasterd_log_t, file)
51logging_search_logs(gruntmasterd_t)
3f07cf69
MG
52type_transition gruntmasterd_t gruntmaster_compile_exec_t : process gruntmaster_compile_t;
53type_transition gruntmasterd_t gruntmaster_job_exec_t : process gruntmaster_job_t;
54type_transition gruntmasterd_t tmp_t : dir gruntmasterd_tmp_t;
55files_type(gruntmasterd_tmp_t)
56files_type(gruntmasterd_etc_t)
da905f9e
MG
57
58# Daemon permissions
59allow gruntmasterd_t { gruntmaster_compile_t gruntmaster_job_t } : process { sigkill siginh rlimitinh transition };
60allow gruntmasterd_t bin_t : file { execute execute_no_trans };
61allow gruntmasterd_t self : process fork;
62allow gruntmasterd_t self:fifo_file everything_file_perms;
63allow gruntmasterd_t urandom_device_t:chr_file read_file_perms;
64allow gruntmasterd_t { gruntmaster_compile_exec_t gruntmaster_job_exec_t } : file execute;
3f07cf69
MG
65allow gruntmasterd_t port_t:tcp_socket name_connect;
66allow gruntmasterd_t self:tcp_socket { read write create ioctl connect };
da905f9e 67dontaudit gruntmasterd_t { gruntmaster_compile_t gruntmaster_job_t } : process noatsecure;
5c5cd38a 68
3f07cf69
MG
69allow gruntmasterd_t tmp_t : dir { getattr write search add_name };
70
fe185d88 71gruntmaster_read(bin_t)
da905f9e 72gruntmaster_read(gruntmaster_compile_exec_t)
3f07cf69
MG
73gruntmaster_read(gruntmasterd_etc_t)
74gruntmaster_read(gruntmaster_job_exec_t)
da905f9e 75gruntmaster_read(httpd_sys_content_t)
fe185d88 76gruntmaster_read(lib_t)
da905f9e 77gruntmaster_read(proc_t)
fe185d88 78gruntmaster_read(usr_t)
fe185d88 79
da905f9e 80gruntmaster_everything(gruntmasterd_log_t)
3f07cf69 81gruntmaster_everything(gruntmasterd_tmp_t)
fe185d88 82
da905f9e
MG
83files_read_etc_files(gruntmasterd_t)
84files_search_etc(gruntmasterd_t)
85libs_use_ld_so(gruntmasterd_t)
86libs_use_shared_libs(gruntmasterd_t)
87miscfiles_read_localization(gruntmasterd_t)
5c5cd38a 88
da905f9e
MG
89# Executor and job permissions
90domain_read_files(gruntmaster_job_t, bin_t)
91domain_read_files(gruntmaster_job_t, usr_t)
92allow gruntmaster_job_t gruntmaster_job_exec_t : file { execute execute_no_trans };
93allow gruntmaster_job_t gruntmasterd_t:fd use;
94allow gruntmaster_job_t gruntmasterd_t:process sigchld;
3f07cf69
MG
95allow gruntmaster_job_t gruntmasterd_tmp_t : dir read_dir_perms;
96allow gruntmaster_job_t gruntmasterd_tmp_t : file { getattr ioctl read write };
da905f9e
MG
97allow gruntmaster_job_t init_t:fd use;
98allow gruntmaster_job_t self:process setrlimit;
99allow gruntmaster_job_t urandom_device_t:chr_file read_file_perms;
5c5cd38a 100
fe185d88 101libs_use_ld_so(gruntmaster_job_t)
fe185d88 102libs_use_shared_libs(gruntmaster_job_t)
fe185d88
MG
103miscfiles_read_localization(gruntmaster_job_t)
104
da905f9e
MG
105# Compile permissions
106domain_everything_files(gruntmaster_compile_t, gruntmaster_job_exec_t)
107domain_everything_files(gruntmaster_compile_t, tmp_t)
108domain_read_files(gruntmaster_compile_t, bin_t)
da905f9e
MG
109domain_read_files(gruntmaster_compile_t, lib_t)
110domain_read_files(gruntmaster_compile_t, proc_t)
111domain_read_files(gruntmaster_compile_t, proc_t)
112domain_read_files(gruntmaster_compile_t, usr_t)
3f07cf69 113domain_read_files(gruntmaster_compile_t, gruntmasterd_tmp_t)
da905f9e
MG
114allow gruntmaster_compile_t gruntmasterd_t : fifo_file { read write ioctl };
115allow gruntmaster_compile_t gruntmasterd_t:fd use;
116allow gruntmaster_compile_t gruntmasterd_t:process sigchld;
3f07cf69 117allow gruntmaster_compile_t gruntmasterd_tmp_t:dir { write add_name };
da905f9e
MG
118allow gruntmaster_compile_t self : fifo_file { read write ioctl };
119allow gruntmaster_compile_t self:process signal;
120allow gruntmaster_compile_t urandom_device_t:chr_file read_file_perms;
121allow gruntmaster_compile_t { bin_t lib_t } : file { execute execute_no_trans };
122
123libs_use_ld_so(gruntmaster_compile_t)
124libs_use_shared_libs(gruntmaster_compile_t)
125miscfiles_read_localization(gruntmaster_compile_t)
3f07cf69
MG
126
127# Page generator permissions
128domain_everything_files(gruntmaster_paged_t, httpd_sys_content_rw_t)
129domain_read_files(gruntmaster_paged_t, usr_t)
130domain_read_files(gruntmaster_paged_t, bin_t)
131allow gruntmaster_paged_t urandom_device_t:chr_file read_file_perms;
132allow gruntmaster_paged_t port_t:tcp_socket name_connect;
133allow gruntmaster_paged_t self:tcp_socket { read write create ioctl connect };
134
135libs_use_ld_so(gruntmaster_paged_t)
136libs_use_shared_libs(gruntmaster_paged_t)
137miscfiles_read_localization(gruntmaster_paged_t)
This page took 0.019801 seconds and 4 git commands to generate.