Dominick Grift 9654689
## <summary>Network traffic graphing.</summary>
Chris PeBenito 9401ae1
Chris PeBenito 9401ae1
########################################
Chris PeBenito 9401ae1
## <summary>
Dominick Grift 9654689
##	Create and append mrtg log files.
Chris PeBenito 9401ae1
## </summary>
Chris PeBenito 9401ae1
## <param name="domain">
Chris PeBenito 9401ae1
##	<summary>
Chris PeBenito 9401ae1
##	Domain allowed access.
Chris PeBenito 9401ae1
##	</summary>
Chris PeBenito 9401ae1
## </param>
Chris PeBenito 9401ae1
#
Chris PeBenito 9401ae1
interface(`mrtg_append_create_logs',`
Chris PeBenito 9401ae1
	gen_require(`
Chris PeBenito 9401ae1
		type mrtg_log_t;
Chris PeBenito 9401ae1
	')
Chris PeBenito 9401ae1
Dominick Grift 9654689
	logging_search_logs($1)
Chris PeBenito 9401ae1
	append_files_pattern($1, mrtg_log_t, mrtg_log_t)
Chris PeBenito 9401ae1
	create_files_pattern($1, mrtg_log_t, mrtg_log_t)
Chris PeBenito 9401ae1
')
Dominick Grift 9654689
Dominick Grift 9654689
########################################
Dominick Grift 9654689
## <summary>
Dominick Grift 9654689
##	All of the rules required to
Dominick Grift 9654689
##	administrate an mrtg environment.
Dominick Grift 9654689
## </summary>
Dominick Grift 9654689
## <param name="domain">
Dominick Grift 9654689
##	<summary>
Dominick Grift 9654689
##	Domain allowed access.
Dominick Grift 9654689
##	</summary>
Dominick Grift 9654689
## </param>
Dominick Grift 9654689
## <param name="role">
Dominick Grift 9654689
##	<summary>
Dominick Grift 9654689
##	Role allowed access.
Dominick Grift 9654689
##	</summary>
Dominick Grift 9654689
## </param>
Dominick Grift 9654689
## <rolecap/>
Dominick Grift 9654689
#
Dominick Grift 9654689
interface(`mrtg_admin',`
Dominick Grift 9654689
	gen_require(`
Dominick Grift 9654689
		type mrtg_t, mrtg_var_run_t, mrtg_initrc_exec_t;
Dominick Grift 9654689
		type mrtg_var_lib_t, mrtg_lock_t, mrtg_log_t;
Dominick Grift 9654689
		type mrtg_etc_t;
Dominick Grift 9654689
	')
Dominick Grift 9654689
Dominick Grift 9654689
	allow $1 mrtg_t:process { ptrace signal_perms };
Dominick Grift 9654689
	ps_process_pattern($1, mrtg_t)
Dominick Grift 9654689
Dominick Grift 9654689
	init_labeled_script_domtrans($1, mrtg_initrc_exec_t)
Dominick Grift 9654689
	domain_system_change_exemption($1)
Dominick Grift 9654689
	role_transition $2 mrtg_initrc_exec_t system_r;
Dominick Grift 9654689
	allow $2 system_r;
Dominick Grift 9654689
Dominick Grift 9654689
	files_search_etc($1)
Dominick Grift 9654689
	admin_pattern($1, mrtg_etc_t)
Dominick Grift 9654689
Dominick Grift 9654689
	files_search_locks($1)
Dominick Grift 9654689
	admin_pattern($1, mrtg_lock_t)
Dominick Grift 9654689
Dominick Grift 9654689
	logging_search_logs($1)
Dominick Grift 9654689
	admin_pattern($1, mrtg_log_t)
Dominick Grift 9654689
Dominick Grift 9654689
	files_search_pids($1)
Dominick Grift 9654689
	admin_pattern($1, mrtg_var_run_t)
Dominick Grift 9654689
Dominick Grift 9654689
	files_search_var_lib($1)
Dominick Grift 9654689
	admin_pattern($1, mrtg_var_lib_t)
Dominick Grift 9654689
')