From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 70394138010 for ; Tue, 2 Oct 2012 07:27:58 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id EDF7AE002E; Tue, 2 Oct 2012 07:27:49 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id AEC8DE002E for ; Tue, 2 Oct 2012 07:27:49 +0000 (UTC) Received: from hornbill.gentoo.org (hornbill.gentoo.org [94.100.119.163]) (using TLSv1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 6DFB933D0AF for ; Tue, 2 Oct 2012 07:27:48 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by hornbill.gentoo.org (Postfix) with ESMTP id 08FFCE5436 for ; Tue, 2 Oct 2012 07:27:47 +0000 (UTC) From: "Matt Thode" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Matt Thode" Message-ID: <1349162861.7368fd919b51e248191a70e20d20f0c6d6947fa4.prometheanfire@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/portage.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: prometheanfire X-VCS-Committer-Name: Matt Thode X-VCS-Revision: 7368fd919b51e248191a70e20d20f0c6d6947fa4 X-VCS-Branch: master Date: Tue, 2 Oct 2012 07:27:47 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 99e01b57-03f6-4505-bd1b-a67f6d1801f8 X-Archives-Hash: 319e5889d328c69a9d5404c60b434a0a commit: 7368fd919b51e248191a70e20d20f0c6d6947fa4 Author: Matthew Thode mthode org> AuthorDate: Tue Oct 2 07:27:41 2012 +0000 Commit: Matt Thode gentoo org> CommitDate: Tue Oct 2 07:27:41 2012 +0000 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=7368fd91 adds autofs support to portage, needed for using portage on nfs on autofs --- policy/modules/contrib/portage.te | 47 +++--------------------------------- 1 files changed, 4 insertions(+), 43 deletions(-) diff --git a/policy/modules/contrib/portage.te b/policy/modules/contrib/portage.te index c210f1e..128e7d6 100644 --- a/policy/modules/contrib/portage.te +++ b/policy/modules/contrib/portage.te @@ -12,33 +12,12 @@ policy_module(portage, 1.13.0) ## gen_tunable(portage_use_nfs, false) -## -##

-## (deprecated) support for dontaudit tryouts -##

-##
-gen_tunable(gentoo_try_dontaudit, false) - -## -##

-## (deprecated) support for fixes -##

-##
-gen_tunable(gentoo_wait_requests, false) - - attribute_role portage_roles; -# Assigned to domains that are managed by eselect -attribute portage_eselect_domain; - type gcc_config_t; type gcc_config_exec_t; application_domain(gcc_config_t, gcc_config_exec_t) -type gcc_config_tmp_t; -files_tmp_file(gcc_config_tmp_t) - # constraining type type portage_t; type portage_exec_t; @@ -105,9 +84,6 @@ files_tmpfs_file(portage_tmpfs_t) allow gcc_config_t self:capability { chown fsetid }; allow gcc_config_t self:fifo_file rw_file_perms; -manage_files_pattern(gcc_config_t, gcc_config_tmp_t, gcc_config_tmp_t) -files_tmp_filetrans(gcc_config_t, gcc_config_tmp_t, file) - manage_files_pattern(gcc_config_t, portage_cache_t, portage_cache_t) read_files_pattern(gcc_config_t, portage_conf_t, portage_conf_t) @@ -127,8 +103,7 @@ corecmd_manage_bin_files(gcc_config_t) domain_use_interactive_fds(gcc_config_t) files_manage_etc_files(gcc_config_t) -files_manage_etc_runtime_files(gcc_config_t) -files_manage_etc_runtime_lnk_files(gcc_config_t) +files_rw_etc_runtime_files(gcc_config_t) files_read_usr_files(gcc_config_t) files_search_var_lib(gcc_config_t) files_search_pids(gcc_config_t) @@ -281,8 +256,6 @@ allow portage_fetch_t portage_gpg_t:file manage_file_perms; allow portage_fetch_t portage_tmp_t:dir manage_dir_perms; allow portage_fetch_t portage_tmp_t:file manage_file_perms; -allow portage_fetch_t portage_devpts_t:chr_file { rw_chr_file_perms setattr }; - read_files_pattern(portage_fetch_t, portage_conf_t, portage_conf_t) manage_dirs_pattern(portage_fetch_t, portage_ebuild_t, portage_ebuild_t) @@ -325,6 +298,9 @@ files_read_usr_files(portage_fetch_t) files_search_var_lib(portage_fetch_t) files_dontaudit_search_pids(portage_fetch_t) +fs_search_auto_mountpoints(portage_fetch_t) +dev_rw_autofs(portage_fetch_t) + logging_list_logs(portage_fetch_t) logging_dontaudit_search_logs(portage_fetch_t) @@ -337,8 +313,6 @@ sysnet_dns_name_resolve(portage_fetch_t) userdom_use_user_terminals(portage_fetch_t) userdom_dontaudit_read_user_home_content_files(portage_fetch_t) -userdom_dontaudit_getattr_user_home_dirs(portage_fetch_t) -userdom_dontaudit_search_user_home_dirs(portage_fetch_t) rsync_exec(portage_fetch_t) @@ -370,16 +344,3 @@ ifdef(`hide_broken_symptoms',` dontaudit portage_sandbox_t portage_cache_t:dir { setattr }; dontaudit portage_sandbox_t portage_cache_t:file { setattr write }; ') - -########################################## -# -# Portage eselect module domain -# - -allow portage_eselect_domain self:fifo_file { read write }; - -corecmd_exec_shell(portage_eselect_domain) - -# Support for /etc/env.d changes -files_manage_etc_runtime_files(portage_eselect_domain) -