Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 611400 Details for
Bug 848339
SELinux is preventing /usr/bin/perl from 'read' accesses on the file /var/lightsquid/20120801/.features.
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
[patch]
lightsquid patch v1
Initial-lightsquid-policy-module.patch (text/plain), 3.74 KB, created by
Dominick Grift
on 2012-09-10 11:06:23 UTC
(
hide
)
Description:
lightsquid patch v1
Filename:
MIME Type:
Creator:
Dominick Grift
Created:
2012-09-10 11:06:23 UTC
Size:
3.74 KB
patch
obsolete
>From 8d4335ee28ba6fd799b3f40890bb18ff9060386e Mon, 10 Sep 2012 13:05:46 +0200 >From: Dominick Grift <dominick.grift@gmail.com> >Date: Mon, 10 Sep 2012 12:55:32 +0200 >Subject: [PATCH] Initial lightsquid policy module > > >Light and fast log analyzer for squid proxy > >This is a rewrite of Fedoras' "squid_cron_t" > >Signed-off-by: Dominick Grift <dominick.grift@gmail.com> >diff --git a/lightsquid.fc b/lightsquid.fc >new file mode 100644 >index 0000000..044390c >--- /dev/null >+++ b/lightsquid.fc >@@ -0,0 +1,11 @@ >+/etc/cron\.daily/lightsquid -- gen_context(system_u:object_r:lightsquid_exec_t,s0) >+ >+/usr/lib/cgi-bin/lightsquid/.*\.cfg -- gen_context(system_u:object_r:httpd_lightsquid_content_t,s0) >+/usr/lib/cgi-bin/lightsquid/.*\.cgi -- gen_context(system_u:object_r:httpd_lightsquid_script_exec_t,s0) >+ >+/usr/share/lightsquid/cgi/.*\.cgi -- gen_context(system_u:object_r:httpd_lightsquid_script_exec_t,s0) >+ >+/var/lightsquid(/.*)? gen_context(system_u:object_r:lightsquid_rw_content_t,s0) >+ >+/var/www/html/lightsquid(/.*)? gen_context(system_u:object_r:httpd_lightsquid_content_t,s0) >+/var/www/html/lightsquid/report(/.*)? gen_context(system_u:object_r:lightsquid_rw_content_t,s0) >diff --git a/lightsquid.if b/lightsquid.if >new file mode 100644 >index 0000000..c9155f6 >--- /dev/null >+++ b/lightsquid.if >@@ -0,0 +1,47 @@ >+## <summary>Log analyzer for squid proxy.</summary> >+ >+######################################## >+## <summary> >+## Execute the lightsquid program in >+## the lightsquid domain. >+## </summary> >+## <param name="domain"> >+## <summary> >+## Domain allowed to transition. >+## </summary> >+## </param> >+# >+interface(`lightsquid_domtrans',` >+ gen_require(` >+ type lightsquid_t, lightsquid_exec_t; >+ ') >+ >+ corecmd_search_bin($1) >+ domtrans_pattern($1, lightsquid_exec_t, lightsquid_t) >+') >+ >+######################################## >+## <summary> >+## Execute lightsquid in the >+## lightsquid domain, and allow the >+## specified role the lightsquid domain. >+## </summary> >+## <param name="domain"> >+## <summary> >+## Domain allowed to transition. >+## </summary> >+## </param> >+## <param name="role"> >+## <summary> >+## Role allowed access. >+## </summary> >+## </param> >+# >+interface(`lightsquid_run',` >+ gen_require(` >+ type lightsquid_t; >+ ') >+ >+ lightsquid_domtrans($1) >+ role $2 types lightsquid_t; >+') >diff --git a/lightsquid.te b/lightsquid.te >new file mode 100644 >index 0000000..8c9f1b3 >--- /dev/null >+++ b/lightsquid.te >@@ -0,0 +1,48 @@ >+policy_module(lightsquid, 1.0.0) >+ >+######################################## >+# >+# Declarations >+# >+ >+type lightsquid_t; >+type lightsquid_exec_t; >+application_domain(lightsquid_t, lightsquid_exec_t) >+ >+type lightsquid_rw_content_t; >+files_type(lightsquid_rw_content_t) >+ >+######################################## >+# >+# Local policy >+# >+ >+manage_dirs_pattern(lightsquid_t, lightsquid_rw_content_t, lightsquid_rw_content_t) >+manage_files_pattern(lightsquid_t, lightsquid_rw_content_t, lightsquid_rw_content_t) >+manage_lnk_files_pattern(lightsquid_t, lightsquid_rw_content_t, lightsquid_rw_content_t) >+files_var_filetrans(lightsquid_t, lightsquid_rw_content_t, dir) >+ >+corecmd_exec_bin(lightsquid_t) >+corecmd_exec_shell(lightsquid_t) >+ >+dev_read_urand(lightsquid_t) >+ >+files_read_etc_files(lightsquid_t) >+files_read_usr_files(lightsquid_t) >+ >+miscfiles_read_localization(lightsquid_t) >+ >+squid_read_config(lightsquid_t) >+squid_read_log(lightsquid_t) >+ >+optional_policy(` >+ apache_content_template(lightsquid) >+ >+ list_dirs_pattern(httpd_lightsquid_script_t, lightsquid_rw_content_t, lightsquid_rw_content_t) >+ read_files_pattern(httpd_lightsquid_script_t, lightsquid_rw_content_t, lightsquid_rw_content_t) >+ read_lnk_files_pattern(httpd_lightsquid_script_t, lightsquid_rw_content_t, lightsquid_rw_content_t) >+') >+ >+optional_policy(` >+ cron_system_entry(lightsquid_t, lightsquid_exec_t) >+')
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 848339
:
604566
|
611395
|
611396
| 611400