1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
|
policy_module(mod_passanger,1.0)
########################################
#
# Declarations
#
## <desc>
## <p>
## Allow httpd to use mod_passenger
## </p>
## </desc>
gen_tunable(httpd_use_passenger, false)
type httpd_passenger_t;
type httpd_passenger_exec_t;
domain_type(httpd_passenger_t)
domain_entry_file(httpd_passenger_t, httpd_passenger_exec_t)
role system_r types httpd_passenger_t;
type httpd_passenger_tmp_t;
files_tmp_file(httpd_passenger_tmp_t)
type httpd_passenger_var_lib_t;
files_type(httpd_passenger_var_lib_t)
type httpd_passenger_rw_content_t;
files_type(httpd_passenger_rw_content_t)
#permissive httpd_passenger_t;
#### apache section ####
require{
type httpd_t;
type httpd_sys_content_t;
type httpd_log_t;
type httpd_tmp_t;
}
manage_sock_files_pattern(httpd_t, httpd_tmp_t, httpd_tmp_t)
manage_fifo_files_pattern(httpd_t, httpd_tmp_t, httpd_tmp_t)
files_tmp_filetrans(httpd_t, httpd_tmp_t, { sock_file fifo_file })
optional_policy(`
tunable_policy(`httpd_use_passenger',`
# needed by /tmp/passenger/
allow httpd_t self:capability { fowner fsetid };
allow httpd_t httpd_passenger_t:process signal;
domtrans_pattern(httpd_t, httpd_passenger_exec_t, httpd_passenger_t)
allow httpd_t httpd_passenger_t:unix_stream_socket { read write shutdown };
manage_dirs_pattern(httpd_passenger_t, httpd_tmp_t, httpd_tmp_t)
manage_files_pattern(httpd_passenger_t, httpd_tmp_t, httpd_tmp_t)
manage_fifo_files_pattern(httpd_passenger_t, httpd_tmp_t, httpd_tmp_t)
manage_sock_files_pattern(httpd_passenger_t, httpd_tmp_t, httpd_tmp_t)
read_files_pattern(httpd_t, httpd_passenger_var_lib_t, httpd_passenger_var_lib_t)
')
')
########################################
#
# Apache mod_passanger local policy
#
# /tmp/passenger/
allow httpd_passenger_t self:capability dac_override;
allow httpd_passenger_t self:process signal;
allow httpd_passenger_t self:fifo_file rw_fifo_file_perms;
allow httpd_passenger_t self:unix_stream_socket { create_stream_socket_perms connectto };
allow httpd_passenger_t httpd_t:unix_stream_socket { read write };
# allow passenger to read and append to apache logfiles
allow httpd_passenger_t httpd_log_t:file { append_file_perms };
read_files_pattern(httpd_passenger_t, httpd_sys_content_t, httpd_sys_content_t)
rw_dirs_pattern(httpd_passenger_t, httpd_passenger_rw_content_t, httpd_passenger_rw_content_t)
rw_files_pattern(httpd_passenger_t, httpd_passenger_rw_content_t, httpd_passenger_rw_content_t)
manage_dirs_pattern(httpd_passenger_t, httpd_passenger_var_lib_t, httpd_passenger_var_lib_t)
manage_files_pattern(httpd_passenger_t, httpd_passenger_var_lib_t, httpd_passenger_var_lib_t)
kernel_read_kernel_sysctls(httpd_passenger_t)
corecmd_exec_bin(httpd_passenger_t)
dev_read_urand(httpd_passenger_t)
files_read_etc_files(httpd_passenger_t)
#auth_use_nsswitch(httpd_passenger_t)
miscfiles_read_localization(httpd_passenger_t)
|