From: pjnuzzi@tycho.ncsc.mil (Paul Nuzzi) Date: Mon, 20 Sep 2010 10:39:13 -0400 Subject: [refpolicy] [PATCH] hadoop 5/10 -- hadoop_jobtracker Message-ID: <4C977211.9000808@tycho.ncsc.mil> To: refpolicy@oss.tresys.com List-Id: refpolicy.oss.tresys.com Signed-off-by: Paul Nuzzi --- policy/modules/services/hadoop_jobtracker.fc | 5 + policy/modules/services/hadoop_jobtracker.if | 46 ++++++++++ policy/modules/services/hadoop_jobtracker.te | 119 +++++++++++++++++++++++++++ 3 files changed, 170 insertions(+) diff --git a/policy/modules/services/hadoop_jobtracker.fc b/policy/modules/services/hadoop_jobtracker.fc new file mode 100644 index 0000000..17dcef7 --- /dev/null +++ b/policy/modules/services/hadoop_jobtracker.fc @@ -0,0 +1,5 @@ +/etc/rc\.d/init\.d/hadoop-(.*)?-jobtracker -- gen_context(system_u:object_r:hadoop_jobtracker_initrc_exec_t, s0) + +/var/log/hadoop(.*)?/hadoop-hadoop-jobtracker-(.*)? gen_context(system_u:object_r:hadoop_jobtracker_log_t, s0) + +/var/lib/hadoop(.*)?/cache/hadoop/mapred/local/jobTracker(/.*)? gen_context(system_u:object_r:hadoop_jobtracker_data_t, s0) diff --git a/policy/modules/services/hadoop_jobtracker.if b/policy/modules/services/hadoop_jobtracker.if new file mode 100644 index 0000000..21db56a --- /dev/null +++ b/policy/modules/services/hadoop_jobtracker.if @@ -0,0 +1,46 @@ +## Hadoop JobTracker +######################################## +## +## Give permission to a domain to signull hadoop_jobtracker_t +## +## +## +## Domain needing permission +## +## +# +interface(`hadoop_jobtracker_signull', ` + gen_require(` + type hadoop_jobtracker_t; + ') + + allow $1 hadoop_jobtracker_t:process { signull }; +') + +######################################## +## +## Role access for hadoop_jobtracker +## +## +## +## Role allowed access +## +## +## +## +## User domain for the role +## +## +# +interface(`hadoop_jobtracker_role',` + gen_require(` + type hadoop_jobtracker_initrc_t; + type hadoop_jobtracker_initrc_exec_t; + type hadoop_jobtracker_t; + ') + + role $1 types { hadoop_jobtracker_initrc_t hadoop_jobtracker_t }; + allow $2 hadoop_jobtracker_initrc_exec_t:file { execute execute_no_trans }; + domtrans_pattern($2, hadoop_jobtracker_initrc_exec_t, hadoop_jobtracker_initrc_t) + allow $2 hadoop_jobtracker_t:process signal; +') diff --git a/policy/modules/services/hadoop_jobtracker.te b/policy/modules/services/hadoop_jobtracker.te new file mode 100644 index 0000000..2cdddf7 --- /dev/null +++ b/policy/modules/services/hadoop_jobtracker.te @@ -0,0 +1,119 @@ +policy_module(hadoop_jobtracker,1.0.0) + +attribute hadoop_jobtracker_domain; + +type hadoop_jobtracker_initrc_t; +domain_type(hadoop_jobtracker_initrc_t) +typeattribute hadoop_jobtracker_initrc_t hadoop_jobtracker_domain; + +type hadoop_jobtracker_initrc_exec_t; +files_type(hadoop_jobtracker_initrc_exec_t) + +init_daemon_domain(hadoop_jobtracker_initrc_t, hadoop_jobtracker_initrc_exec_t) +allow hadoop_jobtracker_initrc_t self:capability { setuid setgid sys_tty_config}; +corecmd_exec_all_executables(hadoop_jobtracker_initrc_t) +files_manage_generic_locks(hadoop_jobtracker_initrc_t) +init_read_utmp(hadoop_jobtracker_initrc_t) +init_write_utmp(hadoop_jobtracker_initrc_t) +kernel_read_kernel_sysctls(hadoop_jobtracker_initrc_t) +kernel_read_sysctl(hadoop_jobtracker_initrc_t) +logging_send_syslog_msg(hadoop_jobtracker_initrc_t) +logging_send_audit_msgs(hadoop_jobtracker_initrc_t) +hadoop_manage_run(hadoop_jobtracker_initrc_t) +allow hadoop_jobtracker_initrc_t hadoop_jobtracker_t:process { signull signal }; + +type hadoop_jobtracker_t; +typeattribute hadoop_jobtracker_t hadoop_jobtracker_domain; +hadoop_runas(hadoop_jobtracker_initrc_t, hadoop_jobtracker_t) +role system_r types hadoop_jobtracker_t; +domain_type(hadoop_jobtracker_t) +optional_policy(` + unconfined_run_to(hadoop_jobtracker_initrc_t, hadoop_jobtracker_initrc_exec_t) + unconfined_roletrans(hadoop_jobtracker_t) +') + +libs_use_ld_so(hadoop_jobtracker_domain) +libs_use_shared_libs(hadoop_jobtracker_domain) +miscfiles_read_localization(hadoop_jobtracker_domain) +dev_read_urand(hadoop_jobtracker_domain) +kernel_read_network_state(hadoop_jobtracker_domain) +files_read_etc_files(hadoop_jobtracker_domain) +files_read_usr_files(hadoop_jobtracker_domain) +kernel_read_system_state(hadoop_jobtracker_domain) +nscd_socket_use(hadoop_jobtracker_domain) +java_exec(hadoop_jobtracker_domain) +hadoop_rx_etc(hadoop_jobtracker_domain) +hadoop_manage_log_dir(hadoop_jobtracker_domain) +files_manage_generic_tmp_files(hadoop_jobtracker_domain) +files_manage_generic_tmp_dirs(hadoop_jobtracker_domain) +fs_getattr_xattr_fs(hadoop_jobtracker_domain) +allow hadoop_jobtracker_domain self:process { execmem getsched setsched signal setrlimit }; +allow hadoop_jobtracker_domain self:fifo_file { read write getattr ioctl }; +allow hadoop_jobtracker_domain self:capability sys_resource; +allow hadoop_jobtracker_domain self:key write; +nis_use_ypbind(hadoop_jobtracker_domain) +corenet_tcp_connect_portmap_port(hadoop_jobtracker_domain) +userdom_dontaudit_search_user_home_dirs(hadoop_jobtracker_domain) +files_dontaudit_search_spool(hadoop_jobtracker_domain) + + +type hadoop_jobtracker_pid_t; +files_pid_file(hadoop_jobtracker_pid_t) +allow hadoop_jobtracker_domain hadoop_jobtracker_pid_t:file manage_file_perms; +allow hadoop_jobtracker_domain hadoop_jobtracker_pid_t:dir rw_dir_perms; +files_pid_filetrans(hadoop_jobtracker_domain,hadoop_jobtracker_pid_t,file) +hadoop_transition_run_file(hadoop_jobtracker_initrc_t, hadoop_jobtracker_pid_t) + +type hadoop_jobtracker_log_t; +logging_log_file(hadoop_jobtracker_log_t) +allow hadoop_jobtracker_domain hadoop_jobtracker_log_t:file manage_file_perms; +allow hadoop_jobtracker_domain hadoop_jobtracker_log_t:dir { setattr rw_dir_perms }; +logging_log_filetrans(hadoop_jobtracker_domain,hadoop_jobtracker_log_t,{file dir}) +hadoop_transition_log_file(hadoop_jobtracker_t, hadoop_jobtracker_log_t) +hadoop_transition_log_file(hadoop_jobtracker_initrc_t, hadoop_jobtracker_log_t) + +type hadoop_jobtracker_data_t; +files_type(hadoop_jobtracker_data_t) +allow hadoop_jobtracker_t hadoop_jobtracker_data_t:file manage_file_perms; +allow hadoop_jobtracker_t hadoop_jobtracker_data_t:dir manage_dir_perms; +hadoop_transition_data_file(hadoop_jobtracker_t, hadoop_jobtracker_data_t) + +type hadoop_jobtracker_tmp_t; +files_tmp_file(hadoop_jobtracker_tmp_t) +allow hadoop_jobtracker_t hadoop_jobtracker_tmp_t:file manage_file_perms; +files_tmp_filetrans(hadoop_jobtracker_t, hadoop_jobtracker_tmp_t, file) + +corecmd_exec_bin(hadoop_jobtracker_t) +corecmd_exec_shell(hadoop_jobtracker_t) +dev_read_rand(hadoop_jobtracker_t) +dev_read_sysfs(hadoop_jobtracker_t) +files_read_var_lib_files(hadoop_jobtracker_t) +hadoop_manage_data_dir(hadoop_jobtracker_t) +hadoop_getattr_run_dir(hadoop_jobtracker_t) +dontaudit hadoop_jobtracker_t self:netlink_route_socket { create ioctl read getattr write setattr append bind connect getopt setopt shutdown nlmsg_read nlmsg_write }; + +allow hadoop_jobtracker_t self:tcp_socket create_stream_socket_perms; +corenet_tcp_sendrecv_generic_if(hadoop_jobtracker_t) +corenet_tcp_sendrecv_all_nodes(hadoop_jobtracker_t) +corenet_all_recvfrom_unlabeled(hadoop_jobtracker_t) +corenet_tcp_bind_all_nodes(hadoop_jobtracker_t) +sysnet_read_config(hadoop_jobtracker_t) +corenet_tcp_sendrecv_all_ports(hadoop_jobtracker_t) +corenet_tcp_bind_all_ports(hadoop_jobtracker_t) +corenet_tcp_connect_generic_port(hadoop_jobtracker_t) + +allow hadoop_jobtracker_t self:udp_socket create_socket_perms; +corenet_udp_sendrecv_generic_if(hadoop_jobtracker_t) +corenet_udp_sendrecv_all_nodes(hadoop_jobtracker_t) +corenet_udp_bind_all_nodes(hadoop_jobtracker_t) +corenet_udp_bind_all_ports(hadoop_jobtracker_t) + +nscd_dontaudit_search_pid(hadoop_jobtracker_t) +corenet_tcp_bind_zope_port(hadoop_jobtracker_t) +corenet_tcp_connect_hadoop_namenode_port(hadoop_jobtracker_t) + +hadoop_datanode_signull(hadoop_jobtracker_t) +hadoop_namenode_signull(hadoop_jobtracker_t) +hadoop_secondarynamenode_signull(hadoop_jobtracker_t) +hadoop_tasktracker_signull(hadoop_jobtracker_t) +