diff options
Diffstat (limited to 'policy/modules/services/munin.te')
-rw-r--r-- | policy/modules/services/munin.te | 426 |
1 files changed, 426 insertions, 0 deletions
diff --git a/policy/modules/services/munin.te b/policy/modules/services/munin.te new file mode 100644 index 000000000..137c82e67 --- /dev/null +++ b/policy/modules/services/munin.te @@ -0,0 +1,426 @@ +policy_module(munin, 1.13.0) + +######################################## +# +# Declarations +# + +attribute munin_plugin_domain; +attribute munin_plugin_tmp_content; + +type munin_t alias lrrd_t; +type munin_exec_t alias lrrd_exec_t; +init_daemon_domain(munin_t, munin_exec_t) + +type munin_etc_t alias lrrd_etc_t; +files_config_file(munin_etc_t) + +type munin_initrc_exec_t; +init_script_file(munin_initrc_exec_t) + +type munin_log_t alias lrrd_log_t; +logging_log_file(munin_log_t) + +type munin_tmp_t alias lrrd_tmp_t; +files_tmp_file(munin_tmp_t) + +type munin_var_lib_t alias lrrd_var_lib_t; +files_type(munin_var_lib_t) + +type munin_plugin_state_t; +files_type(munin_plugin_state_t) + +type munin_var_run_t alias lrrd_var_run_t; +files_pid_file(munin_var_run_t) + +munin_plugin_template(disk) +munin_plugin_template(mail) +munin_plugin_template(selinux) +munin_plugin_template(services) + +type services_munin_plugin_tmpfs_t; +files_tmpfs_file(services_munin_plugin_tmpfs_t) + +munin_plugin_template(system) +munin_plugin_template(unconfined) + +################################ +# +# Common munin plugin local policy +# + +allow munin_plugin_domain self:process signal; +allow munin_plugin_domain self:fifo_file rw_fifo_file_perms; + +allow munin_plugin_domain munin_t:tcp_socket rw_socket_perms; + +read_lnk_files_pattern(munin_plugin_domain, munin_etc_t, munin_etc_t) + +allow munin_plugin_domain munin_exec_t:file read_file_perms; + +allow munin_plugin_domain munin_var_lib_t:dir search_dir_perms; + +manage_files_pattern(munin_plugin_domain, munin_plugin_state_t, munin_plugin_state_t) + +kernel_read_system_state(munin_plugin_domain) + +corenet_all_recvfrom_unlabeled(munin_plugin_domain) +corenet_all_recvfrom_netlabel(munin_plugin_domain) +corenet_tcp_sendrecv_generic_if(munin_plugin_domain) +corenet_tcp_sendrecv_generic_node(munin_plugin_domain) + +corecmd_exec_bin(munin_plugin_domain) +corecmd_exec_shell(munin_plugin_domain) + +files_read_etc_files(munin_plugin_domain) +files_read_usr_files(munin_plugin_domain) +files_search_var_lib(munin_plugin_domain) + +fs_getattr_all_fs(munin_plugin_domain) + +miscfiles_read_localization(munin_plugin_domain) + +optional_policy(` + nscd_use(munin_plugin_domain) +') + +######################################## +# +# Local policy +# + +allow munin_t self:capability { chown dac_override kill setgid setuid sys_rawio }; +dontaudit munin_t self:capability sys_tty_config; +allow munin_t self:process { getsched setsched signal_perms }; +allow munin_t self:unix_stream_socket { accept connectto listen }; +allow munin_t self:unix_dgram_socket sendto; +allow munin_t self:tcp_socket { accept listen }; +allow munin_t self:fifo_file manage_fifo_file_perms; + +allow munin_t munin_plugin_domain:process signal_perms; + +allow munin_t munin_etc_t:dir list_dir_perms; +allow munin_t munin_etc_t:file read_file_perms; +allow munin_t munin_etc_t:lnk_file read_lnk_file_perms; + +manage_dirs_pattern(munin_t, munin_log_t, munin_log_t) +append_files_pattern(munin_t, munin_log_t, munin_log_t) +create_files_pattern(munin_t, munin_log_t, munin_log_t) +setattr_files_pattern(munin_t, munin_log_t, munin_log_t) +logging_log_filetrans(munin_t, munin_log_t, { file dir }) + +manage_dirs_pattern(munin_t, munin_tmp_t, munin_tmp_t) +manage_files_pattern(munin_t, munin_tmp_t, munin_tmp_t) +manage_sock_files_pattern(munin_t, munin_tmp_t, munin_tmp_t) +files_tmp_filetrans(munin_t, munin_tmp_t, { file dir sock_file }) + +manage_dirs_pattern(munin_t, munin_var_lib_t, munin_var_lib_t) +manage_files_pattern(munin_t, munin_var_lib_t, munin_var_lib_t) +manage_lnk_files_pattern(munin_t, munin_var_lib_t, munin_var_lib_t) + +read_files_pattern(munin_t, munin_plugin_state_t, munin_plugin_state_t) + +manage_dirs_pattern(munin_t, munin_var_run_t, munin_var_run_t) +manage_files_pattern(munin_t, munin_var_run_t, munin_var_run_t) +manage_sock_files_pattern(munin_t, munin_var_run_t, munin_var_run_t) +files_pid_filetrans(munin_t, munin_var_run_t, { dir file }) + +can_exec(munin_t, munin_exec_t) + +kernel_read_system_state(munin_t) +kernel_read_network_state(munin_t) +kernel_read_all_sysctls(munin_t) + +corecmd_exec_bin(munin_t) +corecmd_exec_shell(munin_t) + +corenet_all_recvfrom_unlabeled(munin_t) +corenet_all_recvfrom_netlabel(munin_t) +corenet_tcp_sendrecv_generic_if(munin_t) +corenet_tcp_sendrecv_generic_node(munin_t) +corenet_tcp_bind_generic_node(munin_t) + +corenet_sendrecv_munin_server_packets(munin_t) +corenet_tcp_bind_munin_port(munin_t) +corenet_sendrecv_munin_client_packets(munin_t) +corenet_tcp_connect_munin_port(munin_t) +corenet_tcp_sendrecv_munin_port(munin_t) + +corenet_sendrecv_http_client_packets(munin_t) +corenet_tcp_connect_http_port(munin_t) +corenet_tcp_sendrecv_http_port(munin_t) + +dev_read_sysfs(munin_t) +dev_read_urand(munin_t) + +domain_use_interactive_fds(munin_t) +domain_read_all_domains_state(munin_t) + +files_read_etc_runtime_files(munin_t) +files_read_usr_files(munin_t) +files_list_spool(munin_t) + +fs_getattr_all_fs(munin_t) +fs_search_auto_mountpoints(munin_t) + +auth_use_nsswitch(munin_t) + +logging_send_syslog_msg(munin_t) +logging_read_all_logs(munin_t) + +miscfiles_read_fonts(munin_t) +miscfiles_read_localization(munin_t) +miscfiles_setattr_fonts_cache_dirs(munin_t) + +sysnet_exec_ifconfig(munin_t) + +userdom_dontaudit_use_unpriv_user_fds(munin_t) +userdom_dontaudit_search_user_home_dirs(munin_t) + +optional_policy(` + apache_content_template(munin) + + manage_dirs_pattern(munin_t, httpd_munin_content_t, httpd_munin_content_t) + manage_files_pattern(munin_t, httpd_munin_content_t, httpd_munin_content_t) + apache_search_sys_content(munin_t) +') + +optional_policy(` + cron_system_entry(munin_t, munin_exec_t) +') + +optional_policy(` + fstools_domtrans(munin_t) +') + +optional_policy(` + lpd_domtrans_lpr(munin_t) +') + +optional_policy(` + mta_list_queue(munin_t) + mta_read_config(munin_t) + mta_read_queue(munin_t) + mta_send_mail(munin_t) +') + +optional_policy(` + mysql_read_config(munin_t) + mysql_stream_connect(munin_t) +') + +optional_policy(` + netutils_domtrans_ping(munin_t) + netutils_kill_ping(munin_t) + netutils_signal_ping(munin_t) +') + +optional_policy(` + postfix_list_spool(munin_t) + postfix_getattr_all_spool_files(munin_t) +') + +optional_policy(` + rpc_search_nfs_state_data(munin_t) +') + +optional_policy(` + sendmail_read_log(munin_t) +') + +optional_policy(` + seutil_sigchld_newrole(munin_t) +') + +optional_policy(` + udev_read_db(munin_t) +') + +################################### +# +# Disk local policy +# + +allow disk_munin_plugin_t self:capability { sys_admin sys_rawio }; +allow disk_munin_plugin_t self:tcp_socket create_stream_socket_perms; + +rw_files_pattern(disk_munin_plugin_t, munin_var_lib_t, munin_var_lib_t) + +corenet_sendrecv_hddtemp_client_packets(disk_munin_plugin_t) +corenet_tcp_connect_hddtemp_port(disk_munin_plugin_t) +corenet_tcp_sendrecv_hddtemp_port(disk_munin_plugin_t) + +dev_getattr_all_blk_files(disk_munin_plugin_t) +dev_getattr_lvm_control(disk_munin_plugin_t) +dev_read_sysfs(disk_munin_plugin_t) +dev_read_urand(disk_munin_plugin_t) + +files_read_etc_runtime_files(disk_munin_plugin_t) + +fs_getattr_all_fs(disk_munin_plugin_t) +fs_getattr_all_dirs(disk_munin_plugin_t) + +storage_getattr_fixed_disk_dev(disk_munin_plugin_t) + +sysnet_read_config(disk_munin_plugin_t) + +optional_policy(` + hddtemp_exec(disk_munin_plugin_t) +') + +optional_policy(` + fstools_exec(disk_munin_plugin_t) +') + +#################################### +# +# Mail local policy +# + +allow mail_munin_plugin_t self:capability dac_override; + +rw_files_pattern(mail_munin_plugin_t, munin_var_lib_t, munin_var_lib_t) + +dev_read_urand(mail_munin_plugin_t) + +logging_read_generic_logs(mail_munin_plugin_t) + +optional_policy(` + mta_list_queue(mail_munin_plugin_t) + mta_read_config(mail_munin_plugin_t) + mta_read_queue(mail_munin_plugin_t) + mta_send_mail(mail_munin_plugin_t) +') + +optional_policy(` + nscd_use(mail_munin_plugin_t) +') + +optional_policy(` + postfix_getattr_all_spool_files(mail_munin_plugin_t) + postfix_read_config(mail_munin_plugin_t) + postfix_list_spool(mail_munin_plugin_t) +') + +optional_policy(` + sendmail_read_log(mail_munin_plugin_t) +') + +################################## +# +# Selinux local policy +# + +selinux_get_enforce_mode(selinux_munin_plugin_t) + +################################### +# +# Service local policy +# + +allow services_munin_plugin_t self:shm create_sem_perms; +allow services_munin_plugin_t self:sem create_sem_perms; +allow services_munin_plugin_t self:tcp_socket create_stream_socket_perms; +allow services_munin_plugin_t self:udp_socket create_socket_perms; +allow services_munin_plugin_t self:netlink_route_socket r_netlink_socket_perms; + +manage_files_pattern(services_munin_plugin_t, services_munin_plugin_tmpfs_t, services_munin_plugin_tmpfs_t) +manage_dirs_pattern(services_munin_plugin_t, services_munin_plugin_tmpfs_t, services_munin_plugin_tmpfs_t) +fs_tmpfs_filetrans(services_munin_plugin_t, services_munin_plugin_tmpfs_t, { dir file }) + +corenet_sendrecv_all_client_packets(services_munin_plugin_t) +corenet_tcp_connect_all_ports(services_munin_plugin_t) +corenet_tcp_connect_http_port(services_munin_plugin_t) +corenet_tcp_sendrecv_all_ports(services_munin_plugin_t) + +dev_read_urand(services_munin_plugin_t) +dev_read_rand(services_munin_plugin_t) + +sysnet_read_config(services_munin_plugin_t) + +optional_policy(` + bind_read_config(munin_services_plugin_t) +') + +optional_policy(` + cups_read_config(services_munin_plugin_t) + cups_stream_connect(services_munin_plugin_t) +') + +optional_policy(` + lpd_exec_lpr(services_munin_plugin_t) +') + +optional_policy(` + mysql_read_config(services_munin_plugin_t) + mysql_stream_connect(services_munin_plugin_t) +') + +optional_policy(` + netutils_domtrans_ping(services_munin_plugin_t) +') + +optional_policy(` + nscd_use(services_munin_plugin_t) +') + +optional_policy(` + postgresql_stream_connect(services_munin_plugin_t) +') + +optional_policy(` + snmp_read_snmp_var_lib_files(services_munin_plugin_t) +') + +optional_policy(` + sssd_stream_connect(services_munin_plugin_t) +') + +optional_policy(` + varnishd_read_lib_files(services_munin_plugin_t) +') + +################################## +# +# System local policy +# + +allow system_munin_plugin_t self:capability net_admin; +allow system_munin_plugin_t self:udp_socket create_socket_perms; + +rw_files_pattern(system_munin_plugin_t, munin_var_lib_t, munin_var_lib_t) + +read_files_pattern(system_munin_plugin_t, munin_log_t, munin_log_t) + +kernel_read_network_state(system_munin_plugin_t) +kernel_read_all_sysctls(system_munin_plugin_t) + +dev_read_sysfs(system_munin_plugin_t) +dev_read_urand(system_munin_plugin_t) + +domain_read_all_domains_state(system_munin_plugin_t) + +files_read_usr_files(system_munin_plugin_t) + +init_read_utmp(system_munin_plugin_t) + +logging_search_logs(system_munin_plugin_t) + +sysnet_exec_ifconfig(system_munin_plugin_t) + +term_getattr_unallocated_ttys(system_munin_plugin_t) +term_getattr_all_ttys(system_munin_plugin_t) +term_getattr_all_ptys(system_munin_plugin_t) + +optional_policy(` + bind_read_config(system_munin_plugin_t) +') + +####################################### +# +# Unconfined plugin local policy +# + +optional_policy(` + unconfined_domain(unconfined_munin_plugin_t) +') |