Skip to content

Commit 77f4ae9

Browse files
committed
Add policy for insights-core
The insights_core_t domain is used by the insights client with explicit transition using setexeccon().
1 parent a49d7cf commit 77f4ae9

File tree

2 files changed

+292
-0
lines changed

2 files changed

+292
-0
lines changed

policy/modules/contrib/insights_client.if

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -320,3 +320,25 @@ interface(`insights_client_write_tmp',`
320320
files_search_tmp($1)
321321
write_files_pattern($1, insights_client_tmp_t, insights_client_tmp_t)
322322
')
323+
324+
########################################
325+
## <summary>
326+
## Allow explicit transition to insights_core_t domain.
327+
## </summary>
328+
## <param name="domain">
329+
## <summary>
330+
## Domain allowed to transition.
331+
## </summary>
332+
## </param>
333+
#
334+
interface(`insights_domtrans_core',`
335+
gen_require(`
336+
type insights_core_t;
337+
')
338+
339+
allow $1 insights_core_t: process transition;
340+
allow insights_core_t $1:fd use;
341+
allow insights_core_t $1:fifo_file rw_file_perms;
342+
allow insights_core_t $1:process sigchld;
343+
allow insights_core_t $1:dir search_dir_perms;
344+
')

policy/modules/contrib/insights_client.te

Lines changed: 270 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,13 @@ files_tmpfs_file(insights_client_tmpfs_t)
4343
type insights_client_unit_file_t;
4444
systemd_unit_file(insights_client_unit_file_t)
4545

46+
type insights_core_t;
47+
role system_r types insights_core_t;
48+
domain_type(insights_core_t)
49+
50+
type insights_core_tmp_t;
51+
files_tmp_file(insights_core_tmp_t)
52+
4653
########################################
4754
#
4855
# insights_client local policy
@@ -417,3 +424,266 @@ optional_policy(`
417424
optional_policy(`
418425
virt_stream_connect(insights_client_t)
419426
')
427+
428+
########################################
429+
#
430+
# insights_core local policy
431+
#
432+
433+
# an explicit transition using setexecfilecon()
434+
insights_domtrans_core(insights_client_t)
435+
allow init_t insights_core_t:fifo_file write;
436+
insights_client_filetrans_named_content(insights_core_t)
437+
438+
allow insights_core_t self:capability { dac_read_search setgid sys_admin };
439+
allow insights_core_t self:capability2 { checkpoint_restore syslog };
440+
allow insights_core_t self:cap_userns sys_ptrace;
441+
allow insights_core_t self:process { getattr setpgid };
442+
443+
#allow insights_core_t self:socket_class_set create_socket_perms;
444+
allow insights_core_t self:appletalk_socket create_socket_perms;
445+
allow insights_core_t self:ax25_socket create_socket_perms;
446+
allow insights_core_t self:ipx_socket create_socket_perms;
447+
allow insights_core_t self:netlink_route_socket r_netlink_socket_perms;
448+
allow insights_core_t self:netlink_tcpdiag_socket { create_socket_perms nlmsg_read };
449+
allow insights_core_t self:netrom_socket create_socket_perms;
450+
allow insights_core_t self:rose_socket create_socket_perms;
451+
allow insights_core_t self:socket create_socket_perms;
452+
allow insights_core_t self:tcp_socket create_stream_socket_perms;
453+
allow insights_core_t self:udp_socket create_socket_perms;
454+
allow insights_core_t self:unix_dgram_socket create_socket_perms;
455+
allow insights_core_t self:unix_stream_socket connectto;
456+
allow insights_core_t self:x25_socket create_socket_perms;
457+
458+
manage_dirs_pattern(insights_core_t, insights_core_tmp_t, insights_core_tmp_t)
459+
manage_files_pattern(insights_core_t, insights_core_tmp_t, insights_core_tmp_t)
460+
files_tmp_filetrans(insights_core_t, insights_core_tmp_t, { dir file })
461+
462+
manage_files_pattern(insights_core_t, insights_client_cache_t, insights_client_cache_t)
463+
464+
read_files_pattern(insights_core_t, insights_client_etc_t, insights_client_etc_t)
465+
create_files_pattern(insights_core_t, insights_client_etc_t, insights_client_etc_t)
466+
#allow insights_core_t insights_client_etc_t:file { write };
467+
allow insights_core_t insights_client_etc_rw_t:file { create getattr ioctl open read setattr write };
468+
469+
manage_files_pattern(insights_core_t, insights_client_var_lib_t, insights_client_var_lib_t)
470+
manage_dirs_pattern(insights_core_t, insights_client_var_lib_t, insights_client_var_lib_t)
471+
472+
append_files_pattern(insights_core_t, insights_client_var_log_t, insights_client_var_log_t)
473+
create_files_pattern(insights_core_t, insights_client_var_log_t, insights_client_var_log_t)
474+
475+
allow insights_core_t insights_client_var_run_t:file { getattr read };
476+
477+
allow insights_core_t insights_client_tmp_t:file { open };
478+
479+
kernel_dgram_send(insights_core_t)
480+
kernel_read_all_sysctls(insights_core_t)
481+
kernel_list_all_proc(insights_core_t)
482+
kernel_read_proc_files(insights_core_t)
483+
kernel_list_proc(insights_core_t)
484+
kernel_read_fs_sysctls(insights_core_t)
485+
kernel_read_network_state(insights_core_t)
486+
kernel_read_ring_buffer(insights_core_t)
487+
kernel_read_security_state(insights_core_t)
488+
kernel_read_software_raid_state(insights_core_t)
489+
kernel_read_sysctl(insights_core_t)
490+
491+
corecmd_bin_entry_type(insights_core_t)
492+
corecmd_exec_bin(insights_core_t)
493+
494+
corenet_tcp_bind_generic_node(insights_core_t)
495+
corenet_tcp_connect_http_port(insights_core_t)
496+
497+
dev_getattr_all_blk_files(insights_core_t)
498+
dev_getattr_all_chr_files(insights_core_t)
499+
dev_read_kmsg(insights_core_t)
500+
dev_read_netcontrol(insights_core_t)
501+
dev_read_sysfs(insights_core_t)
502+
503+
domain_getattr_all_sockets(insights_core_t)
504+
domain_connect_all_stream_sockets(insights_core_t)
505+
domain_getattr_all_domains(insights_core_t)
506+
domain_getattr_all_pipes(insights_core_t)
507+
domain_read_all_domains_state(insights_core_t)
508+
domain_read_view_all_domains_keyrings(insights_core_t)
509+
510+
files_getattr_all_files(insights_core_t)
511+
files_getattr_all_blk_files(insights_core_t)
512+
files_getattr_all_chr_files(insights_core_t)
513+
files_getattr_all_file_type_fs(insights_core_t)
514+
files_getattr_all_pipes(insights_core_t)
515+
files_getattr_all_sockets(insights_core_t)
516+
files_read_all_symlinks(insights_core_t)
517+
files_read_non_security_files(insights_core_t)
518+
519+
fs_get_all_fs_quotas(insights_core_t)
520+
fs_getattr_all_fs(insights_core_t)
521+
fs_getattr_nsfs_files(insights_core_t)
522+
fs_read_configfs_dirs(insights_core_t)
523+
524+
optional_policy(`
525+
anaconda_domtrans_install(insights_core_t)
526+
')
527+
528+
optional_policy(`
529+
auth_read_passwd_file(insights_core_t)
530+
')
531+
532+
optional_policy(`
533+
bind_domtrans_ndc(insights_core_t)
534+
#allow insights_core_t named_checkconf_exec_t:file { execute execute_no_trans };
535+
')
536+
537+
optional_policy(`
538+
bootloader_exec(insights_core_t)
539+
')
540+
541+
optional_policy(`
542+
brctl_domtrans(insights_core_t)
543+
')
544+
545+
optional_policy(`
546+
chronyd_domtrans_chronyc(insights_core_t)
547+
')
548+
549+
optional_policy(`
550+
container_runtime_domtrans(insights_core_t)
551+
')
552+
553+
optional_policy(`
554+
dbus_system_bus_client(insights_core_t)
555+
')
556+
557+
optional_policy(`
558+
dmesg_exec(insights_core_t)
559+
')
560+
561+
optional_policy(`
562+
dmidecode_exec(insights_core_t)
563+
')
564+
565+
optional_policy(`
566+
fstools_domtrans(insights_core_t)
567+
')
568+
569+
optional_policy(`
570+
gnome_search_gconf(insights_core_t)
571+
gnome_map_generic_cache_files(insights_core_t)
572+
gnome_write_generic_cache_files(insights_core_t)
573+
')
574+
575+
optional_policy(`
576+
gpg_entry_type(insights_core_t)
577+
gpg_domtrans(insights_core_t)
578+
gpg_domtrans_agent(insights_core_t)
579+
')
580+
581+
optional_policy(`
582+
hostname_exec(insights_core_t)
583+
')
584+
585+
optional_policy(`
586+
init_status(insights_core_t)
587+
init_rw_stream_sockets(insights_core_t)
588+
')
589+
590+
optional_policy(`
591+
iptables_domtrans(insights_core_t)
592+
')
593+
594+
optional_policy(`
595+
iscsid_domtrans(insights_core_t)
596+
')
597+
598+
optional_policy(`
599+
journalctl_domtrans(insights_core_t)
600+
')
601+
602+
603+
optional_policy(`
604+
libs_exec_ldconfig(insights_core_t)
605+
')
606+
607+
optional_policy(`
608+
lpd_domtrans_lpr(insights_core_t)
609+
')
610+
611+
optional_policy(`
612+
logging_domtrans_auditctl(insights_core_t)
613+
logging_read_audit_config(insights_core_t)
614+
logging_read_audit_log(insights_core_t)
615+
logging_send_syslog_msg(insights_core_t)
616+
logging_mmap_generic_logs(insights_core_t)
617+
')
618+
619+
optional_policy(`
620+
lvm_domtrans(insights_core_t)
621+
')
622+
623+
optional_policy(`
624+
miscfiles_read_generic_certs(insights_core_t)
625+
')
626+
627+
optional_policy(`
628+
modutils_domtrans_kmod(insights_core_t)
629+
modutils_read_module_deps_files(insights_core_t)
630+
')
631+
632+
optional_policy(`
633+
mount_domtrans(insights_core_t)
634+
')
635+
636+
optional_policy(`
637+
networkmanager_dbus_chat(insights_core_t)
638+
')
639+
640+
optional_policy(`
641+
netutils_domtrans_traceroute(insights_core_t)
642+
')
643+
644+
optional_policy(`
645+
openvswitch_domtrans(insights_core_t)
646+
')
647+
648+
optional_policy(`
649+
rhsmcertd_domtrans(insights_core_t)
650+
rhsmcertd_read_config_files(insights_core_t)
651+
rhsmcertd_write_config_files(insights_core_t)
652+
#rhsmcertd_create_lib_files(insights_core_t)
653+
#rhsmcertd_write_lib_files(insights_core_t)
654+
rhsmcertd_manage_lib_files(insights_core_t)
655+
rhsmcertd_append_log(insights_core_t)
656+
rhsmcertd_create_log(insights_core_t)
657+
')
658+
659+
optional_policy(`
660+
rpm_domtrans(insights_core_t)
661+
')
662+
663+
optional_policy(`
664+
seutil_domtrans_semanage(insights_core_t)
665+
')
666+
667+
optional_policy(`
668+
ssh_exec(insights_core_t)
669+
ssh_exec_sshd(insights_core_t)
670+
')
671+
672+
optional_policy(`
673+
#?sysnet_read_config(insights_core_t)
674+
#sysnet_exec_ifconfig(insights_core_t)
675+
sysnet_domtrans_ifconfig(insights_core_t)
676+
')
677+
678+
optional_policy(`
679+
systemd_dbus_chat_timedated(insights_core_t)
680+
systemd_dbus_chat_localed(insights_core_t)
681+
systemd_exec_notify(insights_core_t)
682+
systemd_status_all_unit_files(insights_core_t)
683+
systemd_userdbd_stream_connect(insights_core_t)
684+
')
685+
686+
optional_policy(`
687+
userdom_search_user_tmp_dirs(insights_core_t)
688+
userdom_view_all_users_keys(insights_core_t)
689+
')

0 commit comments

Comments
 (0)