## PostgreSQL relational database ####################################### ## ## Role access for SE-PostgreSQL. ## ## ## ## The role associated with the user domain. ## ## ## ## ## The type of the user domain. ## ## # interface(`postgresql_role',` gen_require(` class db_database all_db_database_perms; class db_schema all_db_schema_perms; class db_table all_db_table_perms; class db_sequence all_db_sequence_perms; class db_view all_db_view_perms; class db_procedure all_db_procedure_perms; class db_language all_db_language_perms; class db_column all_db_column_perms; class db_tuple all_db_tuple_perms; class db_blob all_db_blob_perms; attribute sepgsql_client_type, sepgsql_database_type; attribute sepgsql_schema_type, sepgsql_sysobj_table_type; type sepgsql_trusted_proc_exec_t, sepgsql_trusted_proc_t; type sepgsql_ranged_proc_exec_t, sepgsql_ranged_proc_t; type user_sepgsql_blob_t, user_sepgsql_proc_exec_t; type user_sepgsql_schema_t, user_sepgsql_seq_t; type user_sepgsql_sysobj_t, user_sepgsql_table_t; type user_sepgsql_view_t; type sepgsql_temp_object_t; ') ######################################## # # Declarations # typeattribute $2 sepgsql_client_type; role $1 types sepgsql_trusted_proc_t; role $1 types sepgsql_ranged_proc_t; ############################## # # Client local policy # tunable_policy(`sepgsql_enable_users_ddl',` allow $2 user_sepgsql_schema_t:db_schema { create drop setattr }; allow $2 user_sepgsql_table_t:db_table { create drop setattr }; allow $2 user_sepgsql_table_t:db_column { create drop setattr }; allow $2 user_sepgsql_sysobj_t:db_tuple { update insert delete }; allow $2 user_sepgsql_seq_t:db_sequence { create drop setattr set_value }; allow $2 user_sepgsql_view_t:db_view { create drop setattr }; allow $2 user_sepgsql_proc_exec_t:db_procedure { create drop setattr }; ') allow $2 user_sepgsql_schema_t:db_schema { getattr search add_name remove_name }; type_transition $2 sepgsql_database_type:db_schema user_sepgsql_schema_t; type_transition $2 sepgsql_database_type:db_schema sepgsql_temp_object_t "pg_temp"; allow $2 user_sepgsql_table_t:db_table { getattr select update insert delete lock }; allow $2 user_sepgsql_table_t:db_column { getattr select update insert }; allow $2 user_sepgsql_table_t:db_tuple { select update insert delete }; type_transition $2 sepgsql_schema_type:db_table user_sepgsql_table_t; allow $2 user_sepgsql_sysobj_t:db_tuple { use select }; type_transition $2 sepgsql_sysobj_table_type:db_tuple user_sepgsql_sysobj_t; allow $2 user_sepgsql_seq_t:db_sequence { getattr get_value next_value }; type_transition $2 sepgsql_schema_type:db_sequence user_sepgsql_seq_t; allow $2 user_sepgsql_view_t:db_view { getattr expand }; type_transition $2 sepgsql_schema_type:db_view user_sepgsql_view_t; allow $2 user_sepgsql_proc_exec_t:db_procedure { getattr execute }; type_transition $2 sepgsql_schema_type:db_procedure user_sepgsql_proc_exec_t; allow $2 user_sepgsql_blob_t:db_blob { create drop getattr setattr read write import export }; type_transition $2 sepgsql_database_type:db_blob user_sepgsql_blob_t; allow $2 sepgsql_ranged_proc_t:process transition; type_transition $2 sepgsql_ranged_proc_exec_t:process sepgsql_ranged_proc_t; allow sepgsql_ranged_proc_t $2:process dyntransition; allow $2 sepgsql_trusted_proc_t:process transition; type_transition $2 sepgsql_trusted_proc_exec_t:process sepgsql_trusted_proc_t; ') ######################################## ## ## Marks as a SE-PostgreSQL loadable shared library module ## ## ## ## Type marked as a database object type. ## ## # interface(`postgresql_loadable_module',` gen_require(` attribute sepgsql_module_type; ') typeattribute $1 sepgsql_module_type; ') ######################################## ## ## Marks as a SE-PostgreSQL database object type ## ## ## ## Type marked as a database object type. ## ## # interface(`postgresql_database_object',` gen_require(` attribute sepgsql_database_type; ') typeattribute $1 sepgsql_database_type; ') ######################################## ## ## Marks as a SE-PostgreSQL schema object type ## ## ## ## Type marked as a schema object type. ## ## # interface(`postgresql_schema_object',` gen_require(` attribute sepgsql_schema_type; ') typeattribute $1 sepgsql_schema_type; ') ######################################## ## ## Marks as a SE-PostgreSQL table/column/tuple object type ## ## ## ## Type marked as a table/column/tuple object type. ## ## # interface(`postgresql_table_object',` gen_require(` attribute sepgsql_table_type; ') typeattribute $1 sepgsql_table_type; ') ######################################## ## ## Marks as a SE-PostgreSQL system table/column/tuple object type ## ## ## ## Type marked as a table/column/tuple object type. ## ## # interface(`postgresql_system_table_object',` gen_require(` attribute sepgsql_table_type, sepgsql_sysobj_table_type; ') typeattribute $1 sepgsql_table_type; typeattribute $1 sepgsql_sysobj_table_type; ') ######################################## ## ## Marks as a SE-PostgreSQL sequence type ## ## ## ## Type marked as a sequence type. ## ## # interface(`postgresql_sequence_object',` gen_require(` attribute sepgsql_sequence_type; ') typeattribute $1 sepgsql_sequence_type; ') ######################################## ## ## Marks as a SE-PostgreSQL view object type ## ## ## ## Type marked as a view object type. ## ## # interface(`postgresql_view_object',` gen_require(` attribute sepgsql_view_type; ') typeattribute $1 sepgsql_view_type; ') ######################################## ## ## Marks as a SE-PostgreSQL procedure object type ## ## ## ## Type marked as a procedure object type. ## ## # interface(`postgresql_procedure_object',` gen_require(` attribute sepgsql_procedure_type; ') typeattribute $1 sepgsql_procedure_type; ') ######################################## ## ## Marks as a SE-PostgreSQL trusted procedure object type ## ## ## ## Type marked as a trusted procedure object type. ## ## # interface(`postgresql_trusted_procedure_object',` gen_require(` attribute sepgsql_procedure_type; attribute sepgsql_trusted_procedure_type; ') typeattribute $1 sepgsql_procedure_type; typeattribute $1 sepgsql_trusted_procedure_type; ') ######################################## ## ## Marks as a SE-PostgreSQL procedural language object type ## ## ## ## Type marked as a procedural language object type. ## ## # interface(`postgresql_language_object',` gen_require(` attribute sepgsql_language_type; ') typeattribute $1 sepgsql_language_type; ') ######################################## ## ## Marks as a SE-PostgreSQL binary large object type ## ## ## ## Type marked as a database binary large object type. ## ## # interface(`postgresql_blob_object',` gen_require(` attribute sepgsql_blob_type; ') typeattribute $1 sepgsql_blob_type; ') ######################################## ## ## Allow the specified domain to search postgresql's database directory. ## ## ## ## Domain allowed access. ## ## # interface(`postgresql_search_db',` gen_require(` type postgresql_db_t; ') allow $1 postgresql_db_t:dir search; ') ######################################## ## ## Allow the specified domain to manage postgresql's database. ## ## ## ## Domain allowed access. ## ## interface(`postgresql_manage_db',` gen_require(` type postgresql_db_t; ') allow $1 postgresql_db_t:dir rw_dir_perms; allow $1 postgresql_db_t:file rw_file_perms; allow $1 postgresql_db_t:lnk_file { getattr read }; ') ####################################### ## ## Execute postgresql in the calling domain. ## ## ## ## Domain allowed access ## ## # interface(`postgresql_exec',` gen_require(` type postgresql_exec_t; ') can_exec($1, postgresql_exec_t); ') ######################################## ## ## Execute postgresql in the postgresql domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`postgresql_domtrans',` gen_require(` type postgresql_t, postgresql_exec_t; ') domtrans_pattern($1, postgresql_exec_t, postgresql_t) ') ###################################### ## ## Allow domain to signal postgresql ## ## ## ## Domain allowed access. ## ## # interface(`postgresql_signal',` gen_require(` type postgresql_t; ') allow $1 postgresql_t:process signal; ') ######################################## ## ## Allow the specified domain to read postgresql's etc. ## ## ## ## Domain allowed access. ## ## ## # interface(`postgresql_read_config',` gen_require(` type postgresql_etc_t; ') files_search_etc($1) allow $1 postgresql_etc_t:dir list_dir_perms; allow $1 postgresql_etc_t:file read_file_perms; allow $1 postgresql_etc_t:lnk_file read_lnk_file_perms; ') ######################################## ## ## Allow the specified domain to connect to postgresql with a tcp socket. ## ## ## ## Domain allowed access. ## ## # interface(`postgresql_tcp_connect',` gen_require(` type postgresql_t; ') corenet_tcp_recvfrom_labeled($1, postgresql_t) corenet_tcp_sendrecv_postgresql_port($1) corenet_tcp_connect_postgresql_port($1) corenet_sendrecv_postgresql_client_packets($1) ') ######################################## ## ## Allow the specified domain to connect to postgresql with a unix socket. ## ## ## ## Domain allowed access. ## ## ## # interface(`postgresql_stream_connect',` gen_require(` type postgresql_t, postgresql_var_run_t, postgresql_tmp_t; ') stream_connect_pattern($1, { postgresql_var_run_t postgresql_tmp_t }, { postgresql_var_run_t postgresql_tmp_t }, postgresql_t) files_search_pids($1) files_search_tmp($1) ') ######################################## ## ## Allow the specified domain unprivileged accesses to unifined database objects ## managed by SE-PostgreSQL, ## ## ## ## Domain allowed access. ## ## # interface(`postgresql_unpriv_client',` gen_require(` class db_database all_db_database_perms; class db_schema all_db_schema_perms; class db_table all_db_table_perms; class db_sequence all_db_sequence_perms; class db_view all_db_view_perms; class db_procedure all_db_procedure_perms; class db_language all_db_language_perms; class db_column all_db_column_perms; class db_tuple all_db_tuple_perms; class db_blob all_db_blob_perms; attribute sepgsql_client_type; attribute sepgsql_database_type, sepgsql_schema_type; attribute sepgsql_sysobj_table_type; type sepgsql_ranged_proc_t, sepgsql_ranged_proc_exec_t; type sepgsql_temp_object_t; type sepgsql_trusted_proc_t, sepgsql_trusted_proc_exec_t; type unpriv_sepgsql_blob_t, unpriv_sepgsql_proc_exec_t; type unpriv_sepgsql_schema_t, unpriv_sepgsql_seq_t; type unpriv_sepgsql_sysobj_t, unpriv_sepgsql_table_t; type unpriv_sepgsql_view_t; ') ######################################## # # Declarations # typeattribute $1 sepgsql_client_type; ######################################## # # Client local policy # type_transition $1 sepgsql_ranged_proc_exec_t:process sepgsql_ranged_proc_t; allow $1 sepgsql_ranged_proc_t:process transition; allow sepgsql_ranged_proc_t $1:process dyntransition; type_transition $1 sepgsql_trusted_proc_exec_t:process sepgsql_trusted_proc_t; allow $1 sepgsql_trusted_proc_t:process transition; allow $1 unpriv_sepgsql_blob_t:db_blob { create drop getattr setattr read write import export }; type_transition $1 sepgsql_database_type:db_blob unpriv_sepgsql_blob_t; allow $1 unpriv_sepgsql_proc_exec_t:db_procedure { getattr execute }; type_transition $1 sepgsql_schema_type:db_procedure unpriv_sepgsql_proc_exec_t; allow $1 unpriv_sepgsql_schema_t:db_schema { getattr add_name remove_name }; type_transition $1 sepgsql_database_type:db_schema unpriv_sepgsql_schema_t; type_transition $1 sepgsql_database_type:db_schema sepgsql_temp_object_t "pg_temp"; allow $1 unpriv_sepgsql_table_t:db_table { getattr select update insert delete lock }; allow $1 unpriv_sepgsql_table_t:db_column { getattr select update insert }; allow $1 unpriv_sepgsql_table_t:db_tuple { select update insert delete }; type_transition $1 sepgsql_schema_type:db_table unpriv_sepgsql_table_t; allow $1 unpriv_sepgsql_seq_t:db_sequence { getattr get_value next_value set_value }; type_transition $1 sepgsql_schema_type:db_sequence unpriv_sepgsql_seq_t; allow $1 unpriv_sepgsql_sysobj_t:db_tuple { use select }; type_transition $1 sepgsql_sysobj_table_type:db_tuple unpriv_sepgsql_sysobj_t; allow $1 unpriv_sepgsql_view_t:db_view { getattr expand }; type_transition $1 sepgsql_schema_type:db_view unpriv_sepgsql_view_t; tunable_policy(`sepgsql_enable_users_ddl',` allow $1 unpriv_sepgsql_schema_t:db_schema { create drop setattr }; allow $1 unpriv_sepgsql_table_t:db_table { create drop setattr }; allow $1 unpriv_sepgsql_table_t:db_column { create drop setattr }; allow $1 unpriv_sepgsql_sysobj_t:db_tuple { update insert delete }; allow $1 unpriv_sepgsql_seq_t:db_sequence { create drop setattr }; allow $1 unpriv_sepgsql_view_t:db_view { create drop setattr }; allow $1 unpriv_sepgsql_proc_exec_t:db_procedure { create drop setattr }; ') ') ######################################## ## ## Allow the specified domain unconfined accesses to any database objects ## managed by SE-PostgreSQL, ## ## ## ## Domain allowed access. ## ## # interface(`postgresql_unconfined',` gen_require(` attribute sepgsql_unconfined_type; ') typeattribute $1 sepgsql_unconfined_type; ') ######################################## ## ## All of the rules required to administrate an postgresql environment ## ## ## ## Domain allowed access. ## ## ## ## ## The role to be allowed to manage the postgresql domain. ## ## ## # interface(`postgresql_admin',` gen_require(` attribute sepgsql_admin_type; attribute sepgsql_client_type; type postgresql_t, postgresql_var_run_t; type postgresql_tmp_t, postgresql_db_t; type postgresql_etc_t, postgresql_log_t; type postgresql_initrc_exec_t, postgresql_unit_t; ') typeattribute $1 sepgsql_admin_type; allow $1 postgresql_t:process { ptrace signal_perms }; ps_process_pattern($1, postgresql_t) init_startstop_service($1, $2, postgresql_t, postgresql_initrc_exec_t, postgresql_unit_t) admin_pattern($1, postgresql_var_run_t) admin_pattern($1, postgresql_db_t) admin_pattern($1, postgresql_etc_t) admin_pattern($1, postgresql_log_t) admin_pattern($1, postgresql_tmp_t) postgresql_tcp_connect($1) postgresql_stream_connect($1) ')