## PostgreSQL relational database ####################################### ## ## The userdomain template for the SE-PostgreSQL. ## ## ## This template creates a delivered types which are used ## for given userdomains. ## ## ## ## The prefix of the user domain (e.g., user ## is the prefix for user_t). ## ## ## ## ## The type of the user domain. ## ## ## ## ## The role associated with the user domain. ## ## # template(`postgresql_userdom_template',` gen_require(` class db_database all_db_database_perms; class db_table all_db_table_perms; class db_procedure all_db_procedure_perms; class db_column all_db_column_perms; class db_tuple all_db_tuple_perms; class db_blob all_db_blob_perms; attribute sepgsql_client_type, sepgsql_database_type; attribute sepgsql_sysobj_table_type; type sepgsql_trusted_proc_t, sepgsql_trusted_domain_t; ') ######################################## # # Declarations # typeattribute $2 sepgsql_client_type; type $1_sepgsql_blob_t; postgresql_blob_object($1_sepgsql_blob_t) type $1_sepgsql_proc_t; postgresql_procedure_object($1_sepgsql_proc_t) type $1_sepgsql_sysobj_t; postgresql_system_table_object($1_sepgsql_sysobj_t) type $1_sepgsql_table_t; postgresql_table_object($1_sepgsql_table_t) role $3 types sepgsql_trusted_domain_t; ############################## # # Client local policy # tunable_policy(`sepgsql_enable_users_ddl',` allow $2 $1_sepgsql_table_t : db_table { create drop }; type_transition $2 sepgsql_database_type:db_table $1_sepgsql_table_t; allow $2 $1_sepgsql_table_t : db_column { create drop }; allow $2 $1_sepgsql_sysobj_t : db_tuple { update insert delete }; type_transition $2 sepgsql_sysobj_table_type:db_tuple $1_sepgsql_sysobj_t; ') allow $2 $1_sepgsql_table_t : db_table { getattr setattr use select update insert delete }; allow $2 $1_sepgsql_table_t : db_column { getattr setattr use select update insert }; allow $2 $1_sepgsql_table_t : db_tuple { use select update insert delete }; allow $2 $1_sepgsql_sysobj_t : db_tuple { use select }; allow $2 $1_sepgsql_proc_t : db_procedure { create drop getattr setattr execute }; type_transition $2 sepgsql_database_type:db_procedure $1_sepgsql_proc_t; allow $2 $1_sepgsql_blob_t : db_blob { create drop getattr setattr read write }; type_transition $2 sepgsql_database_type:db_blob $1_sepgsql_blob_t; allow $2 sepgsql_trusted_domain_t:process transition; type_transition $2 sepgsql_trusted_proc_t:process sepgsql_trusted_domain_t; ') ######################################## ## ## Marks as a SE-PostgreSQL loadable shared library module ## ## ## ## Type marked as a database object type. ## ## # interface(`postgresql_loadable_module',` gen_require(` attribute sepgsql_module_type; ') typeattribute $1 sepgsql_module_type; ') ######################################## ## ## Marks as a SE-PostgreSQL database object type ## ## ## ## Type marked as a database object type. ## ## # interface(`postgresql_database_object',` gen_require(` attribute sepgsql_database_type; ') typeattribute $1 sepgsql_database_type; ') ######################################## ## ## Marks as a SE-PostgreSQL table/column/tuple object type ## ## ## ## Type marked as a table/column/tuple object type. ## ## # interface(`postgresql_table_object',` gen_require(` attribute sepgsql_table_type; ') typeattribute $1 sepgsql_table_type; ') ######################################## ## ## Marks as a SE-PostgreSQL system table/column/tuple object type ## ## ## ## Type marked as a table/column/tuple object type. ## ## # interface(`postgresql_system_table_object',` gen_require(` attribute sepgsql_table_type; attribute sepgsql_sysobj_table_type; ') typeattribute $1 sepgsql_table_type; typeattribute $1 sepgsql_sysobj_table_type; ') ######################################## ## ## Marks as a SE-PostgreSQL procedure object type ## ## ## ## Type marked as a database object type. ## ## # interface(`postgresql_procedure_object',` gen_require(` attribute sepgsql_procedure_type; ') typeattribute $1 sepgsql_procedure_type; ') ######################################## ## ## Marks as a SE-PostgreSQL binary large object type ## ## ## ## Type marked as a database binary large object type. ## ## # interface(`postgresql_blob_object',` gen_require(` attribute sepgsql_blob_type; ') typeattribute $1 sepgsql_blob_type; ') ######################################## ## ## Allow the specified domain to search postgresql's database directory. ## ## ## ## Domain allowed access. ## ## # interface(`postgresql_search_db',` gen_require(` type postgresql_db_t; ') allow $1 postgresql_db_t:dir search; ') ######################################## ## ## Allow the specified domain to manage postgresql's database. ## ## ## ## Domain allowed access. ## ## interface(`postgresql_manage_db',` gen_require(` type postgresql_db_t; ') allow $1 postgresql_db_t:dir rw_dir_perms; allow $1 postgresql_db_t:file rw_file_perms; allow $1 postgresql_db_t:lnk_file { getattr read }; ') ######################################## ## ## Execute postgresql in the postgresql domain. ## ## ## ## The type of the process performing this action. ## ## # interface(`postgresql_domtrans',` gen_require(` type postgresql_t, postgresql_exec_t; ') domtrans_pattern($1,postgresql_exec_t,postgresql_t) ') ######################################## ## ## Allow the specified domain to read postgresql's etc. ## ## ## ## Domain allowed access. ## ## ## # interface(`postgresql_read_config',` gen_require(` type postgresql_etc_t; ') files_search_etc($1) allow $1 postgresql_etc_t:dir { getattr read search }; allow $1 postgresql_etc_t:file { read getattr }; allow $1 postgresql_etc_t:lnk_file { getattr read }; ') ######################################## ## ## Allow the specified domain to connect to postgresql with a tcp socket. ## ## ## ## Domain allowed access. ## ## # interface(`postgresql_tcp_connect',` gen_require(` type postgresql_t; ') corenet_tcp_recvfrom_labeled($1,postgresql_t) corenet_tcp_sendrecv_postgresql_port($1) corenet_tcp_connect_postgresql_port($1) corenet_sendrecv_postgresql_client_packets($1) ') ######################################## ## ## Allow the specified domain to connect to postgresql with a unix socket. ## ## ## ## Domain allowed access. ## ## ## # interface(`postgresql_stream_connect',` gen_require(` type postgresql_t, postgresql_var_run_t, postgresql_tmp_t; ') files_search_pids($1) allow $1 postgresql_t:unix_stream_socket connectto; allow $1 postgresql_var_run_t:sock_file write; # Some versions of postgresql put the sock file in /tmp allow $1 postgresql_tmp_t:sock_file write; ') ######################################## ## ## Allow the specified domain unprivileged accesses to unifined database objects ## managed by SE-PostgreSQL, ## ## ## ## Domain allowed access. ## ## # interface(`postgresql_unpriv_client',` gen_require(` class db_table all_db_table_perms; class db_procedure all_db_procedure_perms; class db_blob all_db_blob_perms; attribute sepgsql_client_type; type sepgsql_db_t, sepgsql_table_t, sepgsql_proc_t, sepgsql_blob_t; type sepgsql_trusted_proc_t, sepgsql_trusted_domain_t; ') typeattribute $1 sepgsql_client_type; type_transition $1 sepgsql_db_t:db_table sepgsql_table_t; type_transition $1 sepgsql_db_t:db_procedure sepgsql_proc_t; type_transition $1 sepgsql_db_t:db_blob sepgsql_blob_t; type_transition $1 sepgsql_trusted_proc_t:process sepgsql_trusted_domain_t; allow $1 sepgsql_trusted_domain_t:process transition; ') ######################################## ## ## Allow the specified domain unconfined accesses to any database objects ## managed by SE-PostgreSQL, ## ## ## ## Domain allowed access. ## ## # interface(`postgresql_unconfined',` gen_require(` attribute sepgsql_unconfined_type; ') typeattribute $1 sepgsql_unconfined_type; ')