Oreon-Lime-R2/selinux-policy/selinux-policy-d9f4a2b/selinux-policy-d9f4a2bbeb91fd95d0c35a90936efb9ea99d2455/policy/modules/contrib/glance.if

299 lines
6 KiB
Text

## <summary>OpenStack image registry and delivery service.</summary>
#######################################
## <summary>
## Creates types and rules for a basic
## glance daemon domain.
## </summary>
## <param name="prefix">
## <summary>
## Prefix for the domain.
## </summary>
## </param>
#
template(`glance_basic_types_template',`
gen_require(`
attribute glance_domain;
')
type $1_t, glance_domain;
type $1_exec_t;
type $1_unit_file_t;
systemd_unit_file($1_unit_file_t)
kernel_read_system_state($1_t)
corenet_all_recvfrom_unlabeled($1_t)
corenet_all_recvfrom_netlabel($1_t)
logging_send_syslog_msg($1_t)
auth_use_nsswitch($1_t)
')
########################################
## <summary>
## Execute a domain transition to
## run glance registry.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
#
interface(`glance_domtrans_registry',`
gen_require(`
type glance_registry_t, glance_registry_exec_t;
')
corecmd_search_bin($1)
domtrans_pattern($1, glance_registry_exec_t, glance_registry_t)
')
########################################
## <summary>
## Execute a domain transition to
## run glance api.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
#
interface(`glance_domtrans_api',`
gen_require(`
type glance_api_t, glance_api_exec_t;
')
corecmd_search_bin($1)
domtrans_pattern($1, glance_api_exec_t, glance_api_t)
')
########################################
## <summary>
## Read glance log files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`glance_read_log',`
gen_require(`
type glance_log_t;
')
logging_search_logs($1)
read_files_pattern($1, glance_log_t, glance_log_t)
')
########################################
## <summary>
## Append glance log files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`glance_append_log',`
gen_require(`
type glance_log_t;
')
logging_search_logs($1)
append_files_pattern($1, glance_log_t, glance_log_t)
')
########################################
## <summary>
## Create, read, write, and delete
## glance log files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`glance_manage_log',`
gen_require(`
type glance_log_t;
')
logging_search_logs($1)
manage_dirs_pattern($1, glance_log_t, glance_log_t)
manage_files_pattern($1, glance_log_t, glance_log_t)
manage_lnk_files_pattern($1, glance_log_t, glance_log_t)
')
########################################
## <summary>
## Search glance lib directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`glance_search_lib',`
gen_require(`
type glance_var_lib_t;
')
allow $1 glance_var_lib_t:dir search_dir_perms;
files_search_var_lib($1)
')
########################################
## <summary>
## Read glance lib files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`glance_read_lib_files',`
gen_require(`
type glance_var_lib_t;
')
files_search_var_lib($1)
read_files_pattern($1, glance_var_lib_t, glance_var_lib_t)
')
########################################
## <summary>
## Create, read, write, and delete
## glance lib files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`glance_manage_lib_files',`
gen_require(`
type glance_var_lib_t;
')
files_search_var_lib($1)
manage_files_pattern($1, glance_var_lib_t, glance_var_lib_t)
')
########################################
## <summary>
## Create, read, write, and delete
## glance lib directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`glance_manage_lib_dirs',`
gen_require(`
type glance_var_lib_t;
')
files_search_var_lib($1)
manage_dirs_pattern($1, glance_var_lib_t, glance_var_lib_t)
')
########################################
## <summary>
## Read glance pid files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`glance_read_pid_files',`
gen_require(`
type glance_var_run_t;
')
files_search_pids($1)
read_files_pattern($1, glance_var_run_t, glance_var_run_t)
')
########################################
## <summary>
## Create, read, write, and delete
## glance pid files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`glance_manage_pid_files',`
gen_require(`
type glance_var_run_t;
')
files_search_pids($1)
manage_files_pattern($1, glance_var_run_t, glance_var_run_t)
')
########################################
## <summary>
## All of the rules required to
## administrate an glance environment.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="role">
## <summary>
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`glance_admin',`
gen_require(`
type glance_registry_t, glance_api_t, glance_log_t;
type glance_var_lib_t, glance_var_run_t;
type glance_registry_initrc_exec_t, glance_api_initrc_exec_t;
')
allow $1 glance_registry_t:process signal_perms;
ps_process_pattern($1, glance_registry_t)
tunable_policy(`deny_ptrace',`',`
allow $1 glance_registry_t:process ptrace;
allow $1 glance_api_t:process ptrace;
')
init_labeled_script_domtrans($1, { glance_api_initrc_exec_t glance_registry_initrc_exec_t })
domain_system_change_exemption($1)
role_transition $2 { glance_api_initrc_exec_t glance_registry_initrc_exec_t } system_r;
allow $2 system_r;
logging_search_logs($1)
admin_pattern($1, glance_log_t)
files_search_var_lib($1)
admin_pattern($1, glance_var_lib_t)
files_search_pids($1)
admin_pattern($1, glance_var_run_t)
')