From 0915b3ef56dfac3113cce55a59a5765dc94976be Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 28 Apr 2024 14:34:54 +0200 Subject: Adding upstream version 2.13.6. Signed-off-by: Daniel Baumann --- tools/selinux/icinga2.if | 453 +++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 453 insertions(+) create mode 100644 tools/selinux/icinga2.if (limited to 'tools/selinux/icinga2.if') diff --git a/tools/selinux/icinga2.if b/tools/selinux/icinga2.if new file mode 100644 index 0000000..15fb034 --- /dev/null +++ b/tools/selinux/icinga2.if @@ -0,0 +1,453 @@ + +## policy for icinga2 + +######################################## +## +## Execute TEMPLATE in the icinga2 domin. +## +## +## +## Domain allowed to transition. +## +## +# +interface(`icinga2_domtrans',` + gen_require(` + type icinga2_t, icinga2_exec_t; + ') + + corecmd_search_bin($1) + domtrans_pattern($1, icinga2_exec_t, icinga2_t) +') + +######################################## +## +## Execute icinga2 server in the icinga2 domain. +## +## +## +## Domain allowed access. +## +## +# +interface(`icinga2_initrc_domtrans',` + gen_require(` + type icinga2_initrc_exec_t; + ') + + init_labeled_script_domtrans($1, icinga2_initrc_exec_t) +') + +######################################## +## +## Execute icinga2 daemon in the icinga2 domain. +## +## +## +## Domain allowed to transition. +## +## +# +interface(`icinga2_systemctl',` + gen_require(` + type icinga2_t; + type icinga2_unit_file_t; + ') + + systemd_exec_systemctl($1) + allow $1 icinga2_unit_file_t:file read_file_perms; + allow $1 icinga2_unit_file_t:service manage_service_perms; + + ps_process_pattern($1, icinga2_t) + init_dbus_chat($1) +') + +######################################## +## +## Allow the specified domain to read +## icinga2 configuration files. +## +## +## +## Domain allowed access. +## +## +## +# +interface(`icinga2_read_config',` + gen_require(` + type icinga2_etc_t; + ') + + files_search_etc($1) + list_dirs_pattern($1, icinga2_etc_t, icinga2_etc_t) + read_files_pattern($1, icinga2_etc_t, icinga2_etc_t) +') + +######################################## +## +## Allow the specified domain to read +## and write icinga2 configuration files. +## +## +## +## Domain allowed access. +## +## +## +# +interface(`icinga2_manage_config',` + gen_require(` + type icinga2_etc_t; + ') + + files_search_etc($1) + manage_dirs_pattern($1, icinga2_etc_t, icinga2_etc_t) + manage_files_pattern($1, icinga2_etc_t, icinga2_etc_t) +') + +######################################## +## +## Read icinga2's log files. +## +## +## +## Domain allowed access. +## +## +## +# +interface(`icinga2_read_log',` + gen_require(` + type icinga2_log_t; + ') + + logging_search_logs($1) + read_files_pattern($1, icinga2_log_t, icinga2_log_t) +') + +######################################## +## +## Append to icinga2 log files. +## +## +## +## Domain allowed access. +## +## +# +interface(`icinga2_append_log',` + gen_require(` + type icinga2_log_t; + ') + + logging_search_logs($1) + append_files_pattern($1, icinga2_log_t, icinga2_log_t) +') + +######################################## +## +## Manage icinga2 log files +## +## +## +## Domain allowed access. +## +## +# +interface(`icinga2_manage_log',` + gen_require(` + type icinga2_log_t; + ') + + logging_search_logs($1) + manage_dirs_pattern($1, icinga2_log_t, icinga2_log_t) + manage_files_pattern($1, icinga2_log_t, icinga2_log_t) + manage_lnk_files_pattern($1, icinga2_log_t, icinga2_log_t) +') + +######################################## +## +## Search icinga2 lib directories. +## +## +## +## Domain allowed access. +## +## +# +interface(`icinga2_search_lib',` + gen_require(` + type icinga2_var_lib_t; + ') + + allow $1 icinga2_var_lib_t:dir search_dir_perms; + files_search_var_lib($1) +') + +######################################## +## +## Read icinga2 lib files. +## +## +## +## Domain allowed access. +## +## +# +interface(`icinga2_read_lib_files',` + gen_require(` + type icinga2_var_lib_t; + ') + + files_search_var_lib($1) + read_files_pattern($1, icinga2_var_lib_t, icinga2_var_lib_t) +') + +######################################## +## +## Manage icinga2 lib files. +## +## +## +## Domain allowed access. +## +## +# +interface(`icinga2_manage_lib_files',` + gen_require(` + type icinga2_var_lib_t; + ') + + files_search_var_lib($1) + manage_files_pattern($1, icinga2_var_lib_t, icinga2_var_lib_t) +') + +######################################## +## +## Manage icinga2 lib directories. +## +## +## +## Domain allowed access. +## +## +# +interface(`icinga2_manage_lib_dirs',` + gen_require(` + type icinga2_var_lib_t; + ') + + files_search_var_lib($1) + manage_dirs_pattern($1, icinga2_var_lib_t, icinga2_var_lib_t) +') + +######################################## +## +## Manage icinga2 spool files. +## +## +## +## Domain allowed access. +## +## +# +interface(`icinga2_manage_spool_files',` + gen_require(` + type icinga2_spool_t; + ') + + files_search_var_lib($1) + manage_files_pattern($1, icinga2_spool_t, icinga2_spool_t) +') + +######################################## +## +## All of the rules required to administrate +## an icinga2 environment +## +## +## +## Domain allowed access. +## +## +## +## +## Role allowed access. +## +## +## +# +interface(`icinga2_admin',` + gen_require(` + type icinga2_t; + type icinga2_initrc_exec_t; + type icinga2_log_t; + type icinga2_var_lib_t; + ') + + allow $1 icinga2_t:process { signal_perms }; + ps_process_pattern($1, icinga2_t) + + tunable_policy(`deny_ptrace',`',` + allow $1 icinga2_t:process ptrace; + ') + + icinga2_initrc_domtrans($1) + domain_system_change_exemption($1) + role_transition $2 icinga2_initrc_exec_t system_r; + allow $2 system_r; + + files_list_etc($1) + admin_pattern($1, icinga2_etc_t) + + logging_search_logs($1) + admin_pattern($1, icinga2_log_t) + + files_search_var_lib($1) + admin_pattern($1, icinga2_var_lib_t) + + admin_pattern($1, icinga2_var_run_t) + admin_pattern($1, icinga2_command_t) + admin_pattern($1, icinga2_spool_t) + admin_pattern($1, icinga2_cache_t) + + icinga2_systemctl($1) + admin_pattern($1, icinga2_unit_file_t) + allow $1 icinga2_unit_file_t:service all_service_perms; + + optional_policy(` + systemd_passwd_agent_exec($1) + systemd_read_fifo_file_passwd_run($1) + ') +') + +######################################## +### +### Send icinga2 commands through pipe +### +### +### +### Domain allowed to send commands. +### +### +# +interface(`icinga2_send_commands',` + gen_require(` + type icinga2_var_run_t; + ') + + files_search_pids($1) + read_files_pattern($1, icinga2_var_run_t, icinga2_var_run_t) + read_files_pattern($1, icinga2_command_t, icinga2_command_t) + write_fifo_files_pattern($1, icinga2_command_t, icinga2_command_t) +') + +######################################## +## +## For domains icinga2 should transition to (e.g. Plugins). +## +## +## +## Context of the executable. +## +## +## +## +## Domain icinga should transition to. +## +## +# +interface(`icinga2_execstrans',` + gen_require(` + type icinga2_t; + ') + + domtrans_pattern(icinga2_t, $1, $2) + allow icinga2_t $2:process sigkill; +') + +###################################### +## +## Dontaudit read and write an leaked file descriptors +## +## +## +## Domain to not audit. +## +## +# +interface(`icinga2_dontaudit_leaks_fifo',` + gen_require(` + type icinga2_t; + ') + + dontaudit $1 icinga2_t:fifo_file write; +') + +## Icinga2 administrator role. + +######################################## +## +## Change to the Icinga2 administrator role. +## +## +## +## Role allowed access. +## +## +## +# +interface(`icinga2adm_role_change',` + gen_require(` + role icinga2adm_r; + ') + + allow $1 icinga2adm_r; +') + +######################################## +## +## For domains icinga2adm should transition to (e.g. Plugins). +## +## +## +## Context of the executable. +## +## +## +## +## Domain icinga should transition to. +## +## +# +interface(`icinga2adm_execstrans',` + gen_require(` + type icinga2adm_t; + ') + + role icinga2adm_r types $2; + allow icinga2adm_r system_r; + type_transition icinga2adm_t $1:process $2; + allow icinga2adm_t $2:process transition; + allow $2 icinga2adm_t:process sigchld; + role_transition icinga2adm_r $1 system_r; +') + +######################################## +## +## Make a TCP connection to the icinga2 port. +## +## +## +## Domain allowed access. +## +## +# +interface(`corenet_tcp_connect_icinga2_port',` + gen_require(` + type icinga2_port_t; + ') + + allow $1 icinga2_port_t:tcp_socket name_connect; +') -- cgit v1.2.3