Blob Blame History Raw
policy_module(munin, 1.8.10)

########################################
#
# Declarations
#

attribute munin_plugin_domain;
attribute munin_plugin_tmp_content;

type munin_t alias lrrd_t;
type munin_exec_t alias lrrd_exec_t;
init_daemon_domain(munin_t, munin_exec_t)

type munin_etc_t alias lrrd_etc_t;
files_config_file(munin_etc_t)

type munin_initrc_exec_t;
init_script_file(munin_initrc_exec_t)

type munin_log_t alias lrrd_log_t;
logging_log_file(munin_log_t)

type munin_tmp_t alias lrrd_tmp_t;
files_tmp_file(munin_tmp_t)

type munin_var_lib_t alias lrrd_var_lib_t;
files_type(munin_var_lib_t)

type munin_plugin_state_t;
files_type(munin_plugin_state_t)

type munin_var_run_t alias lrrd_var_run_t;
files_pid_file(munin_var_run_t)

munin_plugin_template(disk)
munin_plugin_template(mail)
munin_plugin_template(selinux)
munin_plugin_template(services)
munin_plugin_template(system)
munin_plugin_template(unconfined)

################################
#
# Common munin plugin local policy
#

allow munin_plugin_domain self:process signal_perms;
allow munin_plugin_domain self:fifo_file rw_fifo_file_perms;

allow munin_plugin_domain munin_t:tcp_socket rw_socket_perms;

read_lnk_files_pattern(munin_plugin_domain, munin_etc_t, munin_etc_t)

allow munin_plugin_domain munin_exec_t:file read_file_perms;

allow munin_plugin_domain munin_var_lib_t:dir search_dir_perms;

manage_files_pattern(munin_plugin_domain, munin_plugin_state_t, munin_plugin_state_t)

corenet_tcp_sendrecv_generic_if(munin_plugin_domain)
corenet_tcp_sendrecv_generic_node(munin_plugin_domain)

corecmd_exec_bin(munin_plugin_domain)
corecmd_exec_shell(munin_plugin_domain)

files_search_var_lib(munin_plugin_domain)

fs_getattr_all_fs(munin_plugin_domain)

optional_policy(`
	nscd_use(munin_plugin_domain)
')

########################################
#
# Local policy
#

allow munin_t self:capability { chown dac_override kill setgid setuid sys_rawio };
dontaudit munin_t self:capability sys_tty_config;
allow munin_t self:process { getsched setsched signal_perms };
allow munin_t self:unix_stream_socket { accept connectto listen };
allow munin_t self:unix_dgram_socket sendto;
allow munin_t self:tcp_socket { accept listen };
allow munin_t self:fifo_file manage_fifo_file_perms;

allow munin_t munin_plugin_domain:process signal_perms;

allow munin_t munin_etc_t:dir list_dir_perms;
allow munin_t munin_etc_t:file read_file_perms;
allow munin_t munin_etc_t:lnk_file read_lnk_file_perms;

manage_dirs_pattern(munin_t, munin_log_t, munin_log_t)
append_files_pattern(munin_t, munin_log_t, munin_log_t)
create_files_pattern(munin_t, munin_log_t, munin_log_t)
setattr_files_pattern(munin_t, munin_log_t, munin_log_t)
logging_log_filetrans(munin_t, munin_log_t, { file dir })

manage_dirs_pattern(munin_t, munin_tmp_t, munin_tmp_t)
manage_files_pattern(munin_t, munin_tmp_t, munin_tmp_t)
manage_sock_files_pattern(munin_t, munin_tmp_t, munin_tmp_t)
files_tmp_filetrans(munin_t, munin_tmp_t, { file dir sock_file })

manage_dirs_pattern(munin_t, munin_var_lib_t, munin_var_lib_t)
manage_files_pattern(munin_t, munin_var_lib_t, munin_var_lib_t)
manage_lnk_files_pattern(munin_t, munin_var_lib_t, munin_var_lib_t)

rw_files_pattern(munin_t, munin_plugin_state_t, munin_plugin_state_t)

manage_dirs_pattern(munin_t, munin_var_run_t, munin_var_run_t)
manage_files_pattern(munin_t, munin_var_run_t, munin_var_run_t)
manage_sock_files_pattern(munin_t, munin_var_run_t, munin_var_run_t)
files_pid_filetrans(munin_t, munin_var_run_t, { dir file })

can_exec(munin_t, munin_exec_t)

kernel_read_system_state(munin_t)
kernel_read_network_state(munin_t)
kernel_read_all_sysctls(munin_t)

corecmd_exec_bin(munin_t)
corecmd_exec_shell(munin_t)

corenet_all_recvfrom_netlabel(munin_t)
corenet_tcp_sendrecv_generic_if(munin_t)
corenet_tcp_sendrecv_generic_node(munin_t)
corenet_tcp_bind_generic_node(munin_t)

corenet_sendrecv_munin_server_packets(munin_t)
corenet_tcp_bind_munin_port(munin_t)
corenet_sendrecv_munin_client_packets(munin_t)
corenet_tcp_connect_munin_port(munin_t)
corenet_tcp_sendrecv_munin_port(munin_t)

corenet_sendrecv_http_client_packets(munin_t)
corenet_tcp_connect_http_port(munin_t)
corenet_tcp_sendrecv_http_port(munin_t)

dev_read_sysfs(munin_t)
dev_read_urand(munin_t)

domain_use_interactive_fds(munin_t)
domain_read_all_domains_state(munin_t)

files_read_etc_runtime_files(munin_t)
files_list_spool(munin_t)

fs_getattr_all_fs(munin_t)
fs_search_auto_mountpoints(munin_t)

auth_use_nsswitch(munin_t)

logging_send_syslog_msg(munin_t)
logging_read_all_logs(munin_t)

miscfiles_read_fonts(munin_t)
miscfiles_setattr_fonts_cache_dirs(munin_t)

sysnet_exec_ifconfig(munin_t)

userdom_dontaudit_use_unpriv_user_fds(munin_t)
userdom_dontaudit_search_user_home_dirs(munin_t)

optional_policy(`
	apache_content_template(munin)

	manage_dirs_pattern(munin_t, httpd_munin_content_t, httpd_munin_content_t)
	manage_files_pattern(munin_t, httpd_munin_content_t, httpd_munin_content_t)
	apache_search_sys_content(munin_t)

	read_files_pattern(httpd_munin_script_t, munin_var_lib_t, munin_var_lib_t)
	read_files_pattern(httpd_munin_script_t, munin_etc_t, munin_etc_t)

	files_search_var_lib(httpd_munin_script_t)
')

optional_policy(`
	cron_system_entry(munin_t, munin_exec_t)
')

optional_policy(`
	fstools_domtrans(munin_t)
')

optional_policy(`
	lpd_domtrans_lpr(munin_t)
')

optional_policy(`
	mta_list_queue(munin_t)
	mta_read_config(munin_t)
	mta_read_queue(munin_t)
	mta_send_mail(munin_t)
')

optional_policy(`
	mysql_read_config(munin_t)
	mysql_stream_connect(munin_t)
')

optional_policy(`
	netutils_domtrans_ping(munin_t)
	netutils_kill_ping(munin_t)
	netutils_signal_ping(munin_t)
')

optional_policy(`
	postfix_list_spool(munin_t)
')

optional_policy(`
	rpc_search_nfs_state_data(munin_t)
')

optional_policy(`
	sendmail_read_log(munin_t)
')

optional_policy(`
	seutil_sigchld_newrole(munin_t)
')

optional_policy(`
	udev_read_db(munin_t)
')

###################################
#
# Disk local policy
#

allow disk_munin_plugin_t self:capability { sys_admin sys_rawio };
allow disk_munin_plugin_t self:tcp_socket create_stream_socket_perms;

rw_files_pattern(disk_munin_plugin_t, munin_var_lib_t, munin_var_lib_t)

corenet_sendrecv_hddtemp_client_packets(disk_munin_plugin_t)
corenet_tcp_connect_hddtemp_port(disk_munin_plugin_t)
corenet_tcp_sendrecv_hddtemp_port(disk_munin_plugin_t)

files_read_etc_runtime_files(disk_munin_plugin_t)

dev_getattr_lvm_control(disk_munin_plugin_t)
dev_read_sysfs(disk_munin_plugin_t)
dev_read_urand(disk_munin_plugin_t)
dev_read_all_blk_files(munin_disk_plugin_t)

fs_getattr_all_fs(disk_munin_plugin_t)
fs_getattr_all_dirs(disk_munin_plugin_t)

storage_raw_read_fixed_disk(disk_munin_plugin_t)

sysnet_read_config(disk_munin_plugin_t)

optional_policy(`
	hddtemp_exec(disk_munin_plugin_t)
')

optional_policy(`
	fstools_exec(disk_munin_plugin_t)
')

####################################
#
# Mail local policy
#

allow mail_munin_plugin_t self:capability dac_override;

allow mail_munin_plugin_t self:tcp_socket create_stream_socket_perms;
allow mail_munin_plugin_t self:netlink_route_socket r_netlink_socket_perms;

rw_files_pattern(mail_munin_plugin_t, munin_var_lib_t, munin_var_lib_t)

dev_read_urand(mail_munin_plugin_t)

logging_read_generic_logs(mail_munin_plugin_t)

sysnet_read_config(mail_munin_plugin_t)

optional_policy(`
	exim_read_log(mail_munin_plugin_t)
')

optional_policy(`
	mta_read_config(mail_munin_plugin_t)
	mta_send_mail(mail_munin_plugin_t)
	mta_list_queue(mail_munin_plugin_t)
	mta_read_queue(mail_munin_plugin_t)
')

optional_policy(`
	nscd_socket_use(mail_munin_plugin_t)
')

optional_policy(`
	postfix_read_config(mail_munin_plugin_t)
	postfix_list_spool(mail_munin_plugin_t)
	postfix_getattr_spool_files(mail_munin_plugin_t)
')

optional_policy(`
	sendmail_read_log(mail_munin_plugin_t)
')

##################################
#
# Selinux local policy
#

selinux_get_enforce_mode(selinux_munin_plugin_t)

###################################
#
# Service local policy
#

allow services_munin_plugin_t self:shm create_sem_perms;
allow services_munin_plugin_t self:sem create_sem_perms;
allow services_munin_plugin_t self:tcp_socket create_stream_socket_perms;
allow services_munin_plugin_t self:udp_socket create_socket_perms;
allow services_munin_plugin_t self:netlink_route_socket r_netlink_socket_perms;

corenet_sendrecv_all_client_packets(services_munin_plugin_t)
corenet_tcp_connect_all_ports(services_munin_plugin_t)
corenet_tcp_connect_http_port(services_munin_plugin_t)
corenet_tcp_sendrecv_all_ports(services_munin_plugin_t)

dev_read_urand(services_munin_plugin_t)
dev_read_rand(services_munin_plugin_t)

sysnet_read_config(services_munin_plugin_t)

optional_policy(`
	bind_read_config(munin_services_plugin_t)
')

optional_policy(`
	cups_read_config(services_munin_plugin_t)
	cups_stream_connect(services_munin_plugin_t)
')

optional_policy(`
	lpd_exec_lpr(services_munin_plugin_t)
')

optional_policy(`
	mysql_read_config(services_munin_plugin_t)
	mysql_stream_connect(services_munin_plugin_t)
')

optional_policy(`
	netutils_domtrans_ping(services_munin_plugin_t)
')

optional_policy(`
	nscd_socket_use(services_munin_plugin_t)
')

optional_policy(`
	ntp_exec(services_munin_plugin_t)
')

optional_policy(`
	postgresql_stream_connect(services_munin_plugin_t)
')

optional_policy(`
	snmp_read_snmp_var_lib_files(services_munin_plugin_t)
')

optional_policy(`
	sssd_stream_connect(services_munin_plugin_t)
')

optional_policy(`
	varnishd_read_lib_files(services_munin_plugin_t)
')

##################################
#
# System local policy
#

allow system_munin_plugin_t self:udp_socket create_socket_perms;

rw_files_pattern(system_munin_plugin_t, munin_var_lib_t, munin_var_lib_t)

read_files_pattern(system_munin_plugin_t, munin_log_t, munin_log_t)

kernel_read_network_state(system_munin_plugin_t)
kernel_read_all_sysctls(system_munin_plugin_t)

dev_read_sysfs(system_munin_plugin_t)
dev_read_urand(system_munin_plugin_t)

domain_read_all_domains_state(system_munin_plugin_t)

init_read_utmp(system_munin_plugin_t)

logging_search_logs(system_munin_plugin_t)

sysnet_exec_ifconfig(system_munin_plugin_t)

term_getattr_unallocated_ttys(system_munin_plugin_t)
term_getattr_all_ttys(system_munin_plugin_t)
term_getattr_all_ptys(system_munin_plugin_t)

optional_policy(`
	bind_read_config(system_munin_plugin_t)
')

#######################################
#
# Unconfined plugin local policy
#

optional_policy(`
	unconfined_domain(unconfined_munin_plugin_t)
')