policy_module(dirsrv-admin,1.0.0) ######################################## # # Declarations for the daemon # type dirsrvadmin_t; type dirsrvadmin_exec_t; init_daemon_domain(dirsrvadmin_t, dirsrvadmin_exec_t) role system_r types dirsrvadmin_t; type dirsrvadmin_config_t; files_type(dirsrvadmin_config_t) type dirsrvadmin_lock_t; files_lock_file(dirsrvadmin_lock_t) type dirsrvadmin_tmp_t; files_tmp_file(dirsrvadmin_tmp_t) type dirsrvadmin_unconfined_script_t; type dirsrvadmin_unconfined_script_exec_t; domain_type(dirsrvadmin_unconfined_script_t) domain_entry_file(dirsrvadmin_unconfined_script_t, dirsrvadmin_unconfined_script_exec_t) corecmd_shell_entry_type(dirsrvadmin_unconfined_script_t) role system_r types dirsrvadmin_unconfined_script_t; ######################################## # # Local policy for the daemon # allow dirsrvadmin_t self:fifo_file rw_fifo_file_perms; allow dirsrvadmin_t self:capability { dac_read_search dac_override sys_tty_config sys_resource }; allow dirsrvadmin_t self:process setrlimit; manage_files_pattern(dirsrvadmin_t, dirsrvadmin_tmp_t, dirsrvadmin_tmp_t) manage_dirs_pattern(dirsrvadmin_t, dirsrvadmin_tmp_t, dirsrvadmin_tmp_t) files_tmp_filetrans(dirsrvadmin_t, dirsrvadmin_tmp_t, { file dir }) kernel_read_system_state(dirsrvadmin_t) corecmd_exec_bin(dirsrvadmin_t) corecmd_read_bin_symlinks(dirsrvadmin_t) corecmd_search_bin(dirsrvadmin_t) corecmd_shell_entry_type(dirsrvadmin_t) files_exec_etc_files(dirsrvadmin_t) libs_exec_ld_so(dirsrvadmin_t) logging_search_logs(dirsrvadmin_t) miscfiles_read_localization(dirsrvadmin_t) # Needed for stop and restart scripts dirsrv_read_var_run(dirsrvadmin_t) optional_policy(` apache_domtrans(dirsrvadmin_t) apache_signal(dirsrvadmin_t) ') ######################################## # # Local policy for the CGIs # # # # Create a domain for the CGI scripts optional_policy(` apache_content_template(dirsrvadmin) allow httpd_dirsrvadmin_script_t self:process { getsched getpgid }; allow httpd_dirsrvadmin_script_t self:capability { setuid net_bind_service setgid chown sys_nice kill dac_read_search dac_override }; allow httpd_dirsrvadmin_script_t self:tcp_socket create_stream_socket_perms; allow httpd_dirsrvadmin_script_t self:udp_socket create_socket_perms; allow httpd_dirsrvadmin_script_t self:unix_dgram_socket create_socket_perms; allow httpd_dirsrvadmin_script_t self:netlink_route_socket r_netlink_socket_perms; allow httpd_dirsrvadmin_script_t self:sem create_sem_perms; manage_files_pattern(httpd_dirsrvadmin_script_t, dirsrvadmin_lock_t, dirsrvadmin_lock_t) files_lock_filetrans(httpd_dirsrvadmin_script_t, dirsrvadmin_lock_t, { file }) kernel_read_kernel_sysctls(httpd_dirsrvadmin_script_t) corenet_all_recvfrom_unlabeled(httpd_dirsrvadmin_script_t) corenet_all_recvfrom_netlabel(httpd_dirsrvadmin_script_t) corenet_tcp_connect_generic_port(httpd_dirsrvadmin_script_t) corenet_tcp_connect_ldap_port(httpd_dirsrvadmin_script_t) corenet_tcp_connect_http_port(httpd_dirsrvadmin_script_t) files_search_var_lib(httpd_dirsrvadmin_script_t) sysnet_read_config(httpd_dirsrvadmin_script_t) manage_files_pattern(httpd_dirsrvadmin_script_t, dirsrvadmin_tmp_t, dirsrvadmin_tmp_t) manage_dirs_pattern(httpd_dirsrvadmin_script_t, dirsrvadmin_tmp_t, dirsrvadmin_tmp_t) files_tmp_filetrans(httpd_dirsrvadmin_script_t, dirsrvadmin_tmp_t, { file dir }) # The CGI scripts must be able to manage dirsrv-admin dirsrvadmin_run_exec(httpd_dirsrvadmin_script_t) dirsrvadmin_manage_config(httpd_dirsrvadmin_script_t) dirsrv_domtrans(httpd_dirsrvadmin_script_t) dirsrv_signal(httpd_dirsrvadmin_script_t) dirsrv_signull(httpd_dirsrvadmin_script_t) dirsrv_manage_log(httpd_dirsrvadmin_script_t) dirsrv_manage_var_lib(httpd_dirsrvadmin_script_t) dirsrv_pid_filetrans(httpd_dirsrvadmin_script_t) dirsrv_manage_var_run(httpd_dirsrvadmin_script_t) dirsrv_manage_config(httpd_dirsrvadmin_script_t) dirsrv_read_share(httpd_dirsrvadmin_script_t) ') ####################################### # # Local policy for the admin CGIs # # manage_files_pattern(dirsrvadmin_unconfined_script_t, dirsrvadmin_tmp_t, dirsrvadmin_tmp_t) manage_dirs_pattern(dirsrvadmin_unconfined_script_t, dirsrvadmin_tmp_t, dirsrvadmin_tmp_t) files_tmp_filetrans(dirsrvadmin_unconfined_script_t, dirsrvadmin_tmp_t, { file dir }) # needed because of filetrans rules dirsrvadmin_run_exec(dirsrvadmin_unconfined_script_t) dirsrvadmin_manage_config(dirsrvadmin_unconfined_script_t) dirsrv_domtrans(dirsrvadmin_unconfined_script_t) dirsrv_signal(dirsrvadmin_unconfined_script_t) dirsrv_signull(dirsrvadmin_unconfined_script_t) dirsrv_manage_log(dirsrvadmin_unconfined_script_t) dirsrv_manage_var_lib(dirsrvadmin_unconfined_script_t) dirsrv_pid_filetrans(dirsrvadmin_unconfined_script_t) dirsrv_manage_var_run(dirsrvadmin_unconfined_script_t) dirsrv_manage_config(dirsrvadmin_unconfined_script_t) dirsrv_read_share(dirsrvadmin_unconfined_script_t) optional_policy(` unconfined_domain(dirsrvadmin_unconfined_script_t) ')