diff options
Diffstat (limited to 'policy/modules/contrib/puppet.if')
-rw-r--r-- | policy/modules/contrib/puppet.if | 235 |
1 files changed, 0 insertions, 235 deletions
diff --git a/policy/modules/contrib/puppet.if b/policy/modules/contrib/puppet.if deleted file mode 100644 index 7cb8b1f9c..000000000 --- a/policy/modules/contrib/puppet.if +++ /dev/null @@ -1,235 +0,0 @@ -## <summary>Configuration management system.</summary> - -######################################## -## <summary> -## Execute puppetca in the puppetca -## domain. -## </summary> -## <param name="domain"> -## <summary> -## Domain allowed to transition. -## </summary> -## </param> -# -interface(`puppet_domtrans_puppetca',` - gen_require(` - type puppetca_t, puppetca_exec_t; - ') - - corecmd_search_bin($1) - domtrans_pattern($1, puppetca_exec_t, puppetca_t) -') - -##################################### -## <summary> -## Execute puppetca in the puppetca -## domain and allow the specified -## role the puppetca domain. -## </summary> -## <param name="domain"> -## <summary> -## Domain allowed to transition. -## </summary> -## </param> -## <param name="role"> -## <summary> -## Role allowed access. -## </summary> -## </param> -## <rolecap/> -# -interface(`puppet_run_puppetca',` - gen_require(` - attribute_role puppetca_roles; - ') - - puppet_domtrans_puppetca($1) - roleattribute $2 puppetca_roles; -') - -#################################### -## <summary> -## Read puppet configuration content. -## </summary> -## <param name="domain"> -## <summary> -## Domain allowed access. -## </summary> -## </param> -# -interface(`puppet_read_config',` - gen_require(` - type puppet_etc_t; - ') - - files_search_etc($1) - allow $1 puppet_etc_t:dir list_dir_perms; - allow $1 puppet_etc_t:file read_file_perms; - allow $1 puppet_etc_t:lnk_file read_lnk_file_perms; -') - -################################################ -## <summary> -## Read Puppet lib files. -## </summary> -## <param name="domain"> -## <summary> -## Domain allowed access. -## </summary> -## </param> -# -interface(`puppet_read_lib_files',` - gen_require(` - type puppet_var_lib_t; - ') - - files_search_var_lib($1) - read_files_pattern($1, puppet_var_lib_t, puppet_var_lib_t) -') - -############################################### -## <summary> -## Create, read, write, and delete -## puppet lib files. -## </summary> -## <param name="domain"> -## <summary> -## Domain allowed access. -## </summary> -## </param> -# -interface(`puppet_manage_lib_files',` - gen_require(` - type puppet_var_lib_t; - ') - - files_search_var_lib($1) - manage_files_pattern($1, puppet_var_lib_t, puppet_var_lib_t) -') - -##################################### -## <summary> -## Append puppet log files. -## </summary> -## <param name="domain"> -## <summary> -## Domain allowed access. -## </summary> -## </param> -# -interface(`puppet_append_log_files',` - gen_require(` - type puppet_log_t; - ') - - logging_search_logs($1) - append_files_pattern($1, puppet_log_t, puppet_log_t) -') - -##################################### -## <summary> -## Create puppet log files. -## </summary> -## <param name="domain"> -## <summary> -## Domain allowed access. -## </summary> -## </param> -# -interface(`puppet_create_log_files',` - gen_require(` - type puppet_log_t; - ') - - logging_search_logs($1) - create_files_pattern($1, puppet_log_t, puppet_log_t) -') - -##################################### -## <summary> -## Read puppet log files. -## </summary> -## <param name="domain"> -## <summary> -## Domain allowed access. -## </summary> -## </param> -# -interface(`puppet_read_log_files',` - gen_require(` - type puppet_log_t; - ') - - logging_search_logs($1) - read_files_pattern($1, puppet_log_t, puppet_log_t) -') - -################################################ -## <summary> -## Read and write to puppet tempoprary files. -## </summary> -## <param name="domain"> -## <summary> -## Domain allowed access. -## </summary> -## </param> -# -interface(`puppet_rw_tmp', ` - gen_require(` - type puppet_tmp_t; - ') - - files_search_tmp($1) - allow $1 puppet_tmp_t:file rw_file_perms; -') - -######################################## -## <summary> -## All of the rules required to -## administrate an puppet environment. -## </summary> -## <param name="domain"> -## <summary> -## Domain allowed access. -## </summary> -## </param> -## <param name="role"> -## <summary> -## Role allowed access. -## </summary> -## </param> -## <rolecap/> -# -interface(`puppet_admin',` - gen_require(` - type puppet_initrc_exec_t, puppetmaster_initrc_exec_t, puppet_log_t; - type puppet_var_lib_t, puppet_tmp_t, puppet_etc_t; - type puppet_var_run_t, puppetmaster_tmp_t; - type puppet_t, puppetca_t, puppetmaster_t; - ') - - allow $1 { puppet_t puppetca_t puppetmaster_t }:process { ptrace signal_perms }; - ps_process_pattern($1, { puppet_t puppetca_t puppetmaster_t }) - - init_labeled_script_domtrans($1, { puppet_initrc_exec_t puppetmaster_initrc_exec_t }) - domain_system_change_exemption($1) - role_transition $2 { puppet_initrc_exec_t puppetmaster_initrc_exec_t } system_r; - allow $2 system_r; - - files_search_etc($1) - admin_pattern($1, puppet_etc_t) - - logging_search_logs($1) - admin_pattern($1, puppet_log_t) - - files_search_var_lib($1) - admin_pattern($1, puppet_var_lib_t) - - files_search_pids($1) - admin_pattern($1, puppet_var_run_t) - - files_search_tmp($1) - admin_pattern($1, { puppet_tmp_t puppetmaster_tmp_t }) - - puppet_run_puppetca($1, $2) -') |