## System administration tool for networks.
#######################################
##
## The template to define a cfengine domain.
##
##
##
## Domain prefix to be used.
##
##
#
template(`cfengine_domain_template',`
gen_require(`
attribute cfengine_domain;
')
########################################
#
# Declarations
#
type cfengine_$1_t, cfengine_domain;
type cfengine_$1_exec_t;
init_daemon_domain(cfengine_$1_t, cfengine_$1_exec_t)
########################################
#
# Policy
#
auth_use_nsswitch(cfengine_$1_t)
')
########################################
##
## Read cfengine lib files.
##
##
##
## Domain allowed access.
##
##
#
interface(`cfengine_read_lib_files',`
gen_require(`
type cfengine_var_lib_t;
')
files_search_var_lib($1)
read_files_pattern($1, cfengine_var_lib_t, cfengine_var_lib_t)
')
####################################
##
## Do not audit attempts to write
## cfengine log files.
##
##
##
## Domain to not audit.
##
##
#
interface(`cfengine_dontaudit_write_log_files',`
gen_require(`
type cfengine_log_t;
')
dontaudit $1 cfengine_log_t:file write_file_perms;
')
########################################
##
## All of the rules required to
## administrate an cfengine environment.
##
##
##
## Domain allowed access.
##
##
##
##
## Role allowed access.
##
##
##
#
interface(`cfengine_admin',`
gen_require(`
attribute cfengine_domain;
type cfengine_initrc_exec_t, cfengine_log_t, cfengine_var_lib_t;
')
allow $1 cfengine_domain:process { ptrace signal_perms };
ps_process_pattern($1, cfengine_domain)
init_startstop_service($1, $2, cfengine_domain, cfengine_initrc_exec_t)
files_search_var_lib($1)
admin_pattern($1, { cfengine_log_t cfengine_var_lib_t })
')