commit: 545b803c06726d7b5f28a244b7ae4f9a92a353ef
Author: Jason Zaman <perfinion <AT> gentoo <DOT> org>
AuthorDate: Mon Jan 31 19:25:33 2022 +0000
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Mon Jan 31 19:25:33 2022 +0000
URL:
https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=545b803c
puppet: Update gentoo-specific tunable to fix selint error
Can use files_relabel_all_non_security_file_types instead of the
gen_require hack
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
policy/modules/admin/puppet.te | 24 ++----------------------
1 file changed, 2 insertions(+), 22 deletions(-)
diff --git a/policy/modules/admin/puppet.te b/policy/modules/admin/puppet.te
index 8e7c20c3..3d5a832b 100644
--- a/policy/modules/admin/puppet.te
+++ b/policy/modules/admin/puppet.te
@@ -370,28 +370,8 @@ ifdef(`distro_gentoo',`
usermanage_domtrans_passwd(puppet_t)
tunable_policy(`puppet_manage_all_files',`
- # We should use files_relabel_all_files here, but it calls
- # seutil_relabelto_bin_policy which sets a "typeattribute type
attr",
- # which is not allowed within a tunable_policy.
- # So, we duplicate the content of files_relabel_all_files
except for
- # the policy configuration stuff and hope users do that through
Portage
-
- gen_require(` #selint-disable:S-001
- attribute file_type;
- attribute security_file_type;
- type policy_config_t;
- ')
-
- allow puppet_t { file_type -policy_config_t -security_file_type
}:dir list_dir_perms;
- relabel_dirs_pattern(puppet_t, { file_type -policy_config_t
-security_file_type }, { file_type -policy_config_t -security_file_type })
- relabel_files_pattern(puppet_t, { file_type -policy_config_t
-security_file_type }, { file_type -policy_config_t -security_file_type })
- relabel_lnk_files_pattern(puppet_t, { file_type
-policy_config_t -security_file_type }, { file_type -policy_config_t
-security_file_type })
- relabel_fifo_files_pattern(puppet_t, { file_type
-policy_config_t -security_file_type }, { file_type -policy_config_t
-security_file_type })
- relabel_sock_files_pattern(puppet_t, { file_type
-policy_config_t -security_file_type }, { file_type -policy_config_t
-security_file_type })
- # this is only relabelfrom since there should be no
- # device nodes with file types.
- relabelfrom_blk_files_pattern(puppet_t, { file_type
-policy_config_t -security_file_type }, { file_type -policy_config_t
-security_file_type })
- relabelfrom_chr_files_pattern(puppet_t, { file_type
-policy_config_t -security_file_type }, { file_type -policy_config_t
-security_file_type })
+ # Also allows relabelfrom blk and chr_files which are not in
files_manage_non_auth_files
+ files_relabel_all_non_security_file_types(puppet_t)
')
optional_policy(`