diff options
Diffstat (limited to 'policy/modules/admin/puppet.if')
-rw-r--r-- | policy/modules/admin/puppet.if | 233 |
1 files changed, 233 insertions, 0 deletions
diff --git a/policy/modules/admin/puppet.if b/policy/modules/admin/puppet.if new file mode 100644 index 00000000..135dafb2 --- /dev/null +++ b/policy/modules/admin/puppet.if @@ -0,0 +1,233 @@ +## <summary>Configuration management system.</summary> + +######################################## +## <summary> +## Execute puppetca in the puppetca +## domain. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed to transition. +## </summary> +## </param> +# +interface(`puppet_domtrans_puppetca',` + gen_require(` + type puppetca_t, puppetca_exec_t; + ') + + corecmd_search_bin($1) + domtrans_pattern($1, puppetca_exec_t, puppetca_t) +') + +##################################### +## <summary> +## Execute puppetca in the puppetca +## domain and allow the specified +## role the puppetca domain. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed to transition. +## </summary> +## </param> +## <param name="role"> +## <summary> +## Role allowed access. +## </summary> +## </param> +## <rolecap/> +# +interface(`puppet_run_puppetca',` + gen_require(` + attribute_role puppetca_roles; + ') + + puppet_domtrans_puppetca($1) + roleattribute $2 puppetca_roles; +') + +#################################### +## <summary> +## Read puppet configuration content. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`puppet_read_config',` + gen_require(` + type puppet_etc_t; + ') + + files_search_etc($1) + allow $1 puppet_etc_t:dir list_dir_perms; + allow $1 puppet_etc_t:file read_file_perms; + allow $1 puppet_etc_t:lnk_file read_lnk_file_perms; +') + +################################################ +## <summary> +## Read Puppet lib files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`puppet_read_lib_files',` + gen_require(` + type puppet_var_lib_t; + ') + + files_search_var_lib($1) + read_files_pattern($1, puppet_var_lib_t, puppet_var_lib_t) +') + +############################################### +## <summary> +## Create, read, write, and delete +## puppet lib files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`puppet_manage_lib_files',` + gen_require(` + type puppet_var_lib_t; + ') + + files_search_var_lib($1) + manage_files_pattern($1, puppet_var_lib_t, puppet_var_lib_t) +') + +##################################### +## <summary> +## Append puppet log files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`puppet_append_log_files',` + gen_require(` + type puppet_log_t; + ') + + logging_search_logs($1) + append_files_pattern($1, puppet_log_t, puppet_log_t) +') + +##################################### +## <summary> +## Create puppet log files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`puppet_create_log_files',` + gen_require(` + type puppet_log_t; + ') + + logging_search_logs($1) + create_files_pattern($1, puppet_log_t, puppet_log_t) +') + +##################################### +## <summary> +## Read puppet log files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`puppet_read_log_files',` + gen_require(` + type puppet_log_t; + ') + + logging_search_logs($1) + read_files_pattern($1, puppet_log_t, puppet_log_t) +') + +################################################ +## <summary> +## Read and write to puppet tempoprary files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`puppet_rw_tmp', ` + gen_require(` + type puppet_tmp_t; + ') + + files_search_tmp($1) + allow $1 puppet_tmp_t:file rw_file_perms; +') + +######################################## +## <summary> +## All of the rules required to +## administrate an puppet environment. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <param name="role"> +## <summary> +## Role allowed access. +## </summary> +## </param> +## <rolecap/> +# +interface(`puppet_admin',` + gen_require(` + type puppet_initrc_exec_t, puppetmaster_initrc_exec_t, puppet_log_t; + type puppet_var_lib_t, puppet_tmp_t, puppet_etc_t; + type puppet_var_run_t, puppetmaster_tmp_t; + type puppet_t, puppetca_t, puppetmaster_t; + ') + + allow $1 { puppet_t puppetca_t puppetmaster_t }:process { ptrace signal_perms }; + ps_process_pattern($1, { puppet_t puppetca_t puppetmaster_t }) + + init_startstop_service($1, $2, puppet_t, puppet_initrc_exec_t) + init_startstop_service($1, $2, puppetmaster_t, puppetmaster_initrc_exec_t) + + files_search_etc($1) + admin_pattern($1, puppet_etc_t) + + logging_search_logs($1) + admin_pattern($1, puppet_log_t) + + files_search_var_lib($1) + admin_pattern($1, puppet_var_lib_t) + + files_search_pids($1) + admin_pattern($1, puppet_var_run_t) + + files_search_tmp($1) + admin_pattern($1, { puppet_tmp_t puppetmaster_tmp_t }) + + puppet_run_puppetca($1, $2) +') |