ff983a6239
Signed-off-by: Chris PeBenito <pebenito@ieee.org>
417 lines
10 KiB
Plaintext
417 lines
10 KiB
Plaintext
policy_module(munin, 1.16.0)
|
|
|
|
########################################
|
|
#
|
|
# Declarations
|
|
#
|
|
|
|
attribute munin_plugin_domain;
|
|
attribute munin_plugin_tmp_content;
|
|
|
|
type munin_t;
|
|
type munin_exec_t alias lrrd_exec_t;
|
|
init_daemon_domain(munin_t, munin_exec_t)
|
|
|
|
type munin_etc_t;
|
|
files_config_file(munin_etc_t)
|
|
|
|
type munin_initrc_exec_t;
|
|
init_script_file(munin_initrc_exec_t)
|
|
|
|
type munin_log_t;
|
|
logging_log_file(munin_log_t)
|
|
|
|
type munin_runtime_t alias munin_var_run_t;
|
|
files_runtime_file(munin_runtime_t)
|
|
|
|
type munin_tmp_t;
|
|
files_tmp_file(munin_tmp_t)
|
|
|
|
type munin_var_lib_t;
|
|
files_type(munin_var_lib_t)
|
|
|
|
type munin_plugin_state_t;
|
|
files_type(munin_plugin_state_t)
|
|
|
|
munin_plugin_template(disk)
|
|
munin_plugin_template(mail)
|
|
munin_plugin_template(selinux)
|
|
munin_plugin_template(services)
|
|
|
|
type services_munin_plugin_tmpfs_t;
|
|
files_tmpfs_file(services_munin_plugin_tmpfs_t)
|
|
|
|
munin_plugin_template(system)
|
|
munin_plugin_template(unconfined)
|
|
|
|
################################
|
|
#
|
|
# Common munin plugin local policy
|
|
#
|
|
|
|
allow munin_plugin_domain self:process signal;
|
|
allow munin_plugin_domain self:fifo_file rw_fifo_file_perms;
|
|
|
|
allow munin_plugin_domain munin_t:tcp_socket rw_socket_perms;
|
|
|
|
read_lnk_files_pattern(munin_plugin_domain, munin_etc_t, munin_etc_t)
|
|
|
|
allow munin_plugin_domain munin_exec_t:file read_file_perms;
|
|
|
|
allow munin_plugin_domain munin_var_lib_t:dir search_dir_perms;
|
|
|
|
manage_files_pattern(munin_plugin_domain, munin_plugin_state_t, munin_plugin_state_t)
|
|
|
|
kernel_read_system_state(munin_plugin_domain)
|
|
|
|
corenet_all_recvfrom_netlabel(munin_plugin_domain)
|
|
corenet_tcp_sendrecv_generic_if(munin_plugin_domain)
|
|
corenet_tcp_sendrecv_generic_node(munin_plugin_domain)
|
|
|
|
corecmd_exec_bin(munin_plugin_domain)
|
|
corecmd_exec_shell(munin_plugin_domain)
|
|
|
|
files_read_etc_files(munin_plugin_domain)
|
|
files_read_usr_files(munin_plugin_domain)
|
|
files_search_var_lib(munin_plugin_domain)
|
|
|
|
fs_getattr_all_fs(munin_plugin_domain)
|
|
|
|
miscfiles_read_localization(munin_plugin_domain)
|
|
|
|
optional_policy(`
|
|
nscd_use(munin_plugin_domain)
|
|
')
|
|
|
|
########################################
|
|
#
|
|
# Local policy
|
|
#
|
|
|
|
allow munin_t self:capability { chown dac_override kill setgid setuid sys_rawio };
|
|
dontaudit munin_t self:capability sys_tty_config;
|
|
allow munin_t self:process { getsched setsched signal_perms };
|
|
allow munin_t self:unix_stream_socket { accept connectto listen };
|
|
allow munin_t self:unix_dgram_socket sendto;
|
|
allow munin_t self:tcp_socket { accept listen };
|
|
allow munin_t self:fifo_file manage_fifo_file_perms;
|
|
|
|
allow munin_t munin_plugin_domain:process signal_perms;
|
|
|
|
allow munin_t munin_etc_t:dir list_dir_perms;
|
|
allow munin_t munin_etc_t:file read_file_perms;
|
|
allow munin_t munin_etc_t:lnk_file read_lnk_file_perms;
|
|
|
|
manage_dirs_pattern(munin_t, munin_log_t, munin_log_t)
|
|
append_files_pattern(munin_t, munin_log_t, munin_log_t)
|
|
create_files_pattern(munin_t, munin_log_t, munin_log_t)
|
|
setattr_files_pattern(munin_t, munin_log_t, munin_log_t)
|
|
logging_log_filetrans(munin_t, munin_log_t, { file dir })
|
|
|
|
manage_dirs_pattern(munin_t, munin_tmp_t, munin_tmp_t)
|
|
manage_files_pattern(munin_t, munin_tmp_t, munin_tmp_t)
|
|
manage_sock_files_pattern(munin_t, munin_tmp_t, munin_tmp_t)
|
|
files_tmp_filetrans(munin_t, munin_tmp_t, { file dir sock_file })
|
|
|
|
manage_dirs_pattern(munin_t, munin_var_lib_t, munin_var_lib_t)
|
|
manage_files_pattern(munin_t, munin_var_lib_t, munin_var_lib_t)
|
|
manage_lnk_files_pattern(munin_t, munin_var_lib_t, munin_var_lib_t)
|
|
|
|
read_files_pattern(munin_t, munin_plugin_state_t, munin_plugin_state_t)
|
|
|
|
manage_dirs_pattern(munin_t, munin_runtime_t, munin_runtime_t)
|
|
manage_files_pattern(munin_t, munin_runtime_t, munin_runtime_t)
|
|
manage_sock_files_pattern(munin_t, munin_runtime_t, munin_runtime_t)
|
|
files_runtime_filetrans(munin_t, munin_runtime_t, { dir file })
|
|
|
|
can_exec(munin_t, munin_exec_t)
|
|
|
|
kernel_read_system_state(munin_t)
|
|
kernel_read_network_state(munin_t)
|
|
kernel_read_all_sysctls(munin_t)
|
|
|
|
corecmd_exec_bin(munin_t)
|
|
corecmd_exec_shell(munin_t)
|
|
|
|
corenet_all_recvfrom_netlabel(munin_t)
|
|
corenet_tcp_sendrecv_generic_if(munin_t)
|
|
corenet_tcp_sendrecv_generic_node(munin_t)
|
|
corenet_tcp_bind_generic_node(munin_t)
|
|
|
|
corenet_sendrecv_munin_server_packets(munin_t)
|
|
corenet_tcp_bind_munin_port(munin_t)
|
|
corenet_sendrecv_munin_client_packets(munin_t)
|
|
corenet_tcp_connect_munin_port(munin_t)
|
|
|
|
corenet_sendrecv_http_client_packets(munin_t)
|
|
corenet_tcp_connect_http_port(munin_t)
|
|
|
|
dev_read_sysfs(munin_t)
|
|
dev_read_urand(munin_t)
|
|
|
|
domain_use_interactive_fds(munin_t)
|
|
domain_read_all_domains_state(munin_t)
|
|
|
|
files_read_etc_runtime_files(munin_t)
|
|
files_read_usr_files(munin_t)
|
|
files_list_spool(munin_t)
|
|
|
|
fs_getattr_all_fs(munin_t)
|
|
fs_search_auto_mountpoints(munin_t)
|
|
|
|
auth_use_nsswitch(munin_t)
|
|
|
|
logging_send_syslog_msg(munin_t)
|
|
logging_read_all_logs(munin_t)
|
|
|
|
miscfiles_read_fonts(munin_t)
|
|
miscfiles_read_localization(munin_t)
|
|
miscfiles_setattr_fonts_cache_dirs(munin_t)
|
|
|
|
sysnet_exec_ifconfig(munin_t)
|
|
|
|
userdom_dontaudit_use_unpriv_user_fds(munin_t)
|
|
userdom_dontaudit_search_user_home_dirs(munin_t)
|
|
|
|
optional_policy(`
|
|
apache_content_template(munin)
|
|
|
|
manage_dirs_pattern(munin_t, httpd_munin_content_t, httpd_munin_content_t)
|
|
manage_files_pattern(munin_t, httpd_munin_content_t, httpd_munin_content_t)
|
|
apache_search_sys_content(munin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
cron_system_entry(munin_t, munin_exec_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
fstools_domtrans(munin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
lpd_domtrans_lpr(munin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
mta_list_queue(munin_t)
|
|
mta_read_config(munin_t)
|
|
mta_read_queue(munin_t)
|
|
mta_send_mail(munin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
mysql_read_config(munin_t)
|
|
mysql_stream_connect(munin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
netutils_domtrans_ping(munin_t)
|
|
netutils_kill_ping(munin_t)
|
|
netutils_signal_ping(munin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
postfix_list_spool(munin_t)
|
|
postfix_getattr_all_spool_files(munin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
rpc_search_nfs_state_data(munin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
sendmail_read_log(munin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
seutil_sigchld_newrole(munin_t)
|
|
')
|
|
|
|
###################################
|
|
#
|
|
# Disk local policy
|
|
#
|
|
|
|
allow disk_munin_plugin_t self:capability { sys_admin sys_rawio };
|
|
allow disk_munin_plugin_t self:tcp_socket create_stream_socket_perms;
|
|
|
|
rw_files_pattern(disk_munin_plugin_t, munin_var_lib_t, munin_var_lib_t)
|
|
|
|
corenet_sendrecv_hddtemp_client_packets(disk_munin_plugin_t)
|
|
corenet_tcp_connect_hddtemp_port(disk_munin_plugin_t)
|
|
|
|
dev_getattr_all_blk_files(disk_munin_plugin_t)
|
|
dev_getattr_lvm_control(disk_munin_plugin_t)
|
|
dev_read_sysfs(disk_munin_plugin_t)
|
|
dev_read_urand(disk_munin_plugin_t)
|
|
|
|
files_read_etc_runtime_files(disk_munin_plugin_t)
|
|
|
|
fs_getattr_all_fs(disk_munin_plugin_t)
|
|
fs_getattr_all_dirs(disk_munin_plugin_t)
|
|
|
|
storage_getattr_fixed_disk_dev(disk_munin_plugin_t)
|
|
|
|
sysnet_read_config(disk_munin_plugin_t)
|
|
|
|
optional_policy(`
|
|
hddtemp_exec(disk_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
fstools_exec(disk_munin_plugin_t)
|
|
')
|
|
|
|
####################################
|
|
#
|
|
# Mail local policy
|
|
#
|
|
|
|
allow mail_munin_plugin_t self:capability dac_override;
|
|
|
|
rw_files_pattern(mail_munin_plugin_t, munin_var_lib_t, munin_var_lib_t)
|
|
|
|
dev_read_urand(mail_munin_plugin_t)
|
|
|
|
logging_read_generic_logs(mail_munin_plugin_t)
|
|
|
|
optional_policy(`
|
|
mta_list_queue(mail_munin_plugin_t)
|
|
mta_read_config(mail_munin_plugin_t)
|
|
mta_read_queue(mail_munin_plugin_t)
|
|
mta_send_mail(mail_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
nscd_use(mail_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
postfix_getattr_all_spool_files(mail_munin_plugin_t)
|
|
postfix_read_config(mail_munin_plugin_t)
|
|
postfix_list_spool(mail_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
sendmail_read_log(mail_munin_plugin_t)
|
|
')
|
|
|
|
##################################
|
|
#
|
|
# Selinux local policy
|
|
#
|
|
|
|
selinux_get_enforce_mode(selinux_munin_plugin_t)
|
|
|
|
###################################
|
|
#
|
|
# Service local policy
|
|
#
|
|
|
|
allow services_munin_plugin_t self:shm create_shm_perms;
|
|
allow services_munin_plugin_t self:sem create_sem_perms;
|
|
allow services_munin_plugin_t self:tcp_socket create_stream_socket_perms;
|
|
allow services_munin_plugin_t self:udp_socket create_socket_perms;
|
|
allow services_munin_plugin_t self:netlink_route_socket r_netlink_socket_perms;
|
|
|
|
manage_files_pattern(services_munin_plugin_t, services_munin_plugin_tmpfs_t, services_munin_plugin_tmpfs_t)
|
|
manage_dirs_pattern(services_munin_plugin_t, services_munin_plugin_tmpfs_t, services_munin_plugin_tmpfs_t)
|
|
fs_tmpfs_filetrans(services_munin_plugin_t, services_munin_plugin_tmpfs_t, { dir file })
|
|
|
|
corenet_sendrecv_all_client_packets(services_munin_plugin_t)
|
|
corenet_tcp_connect_all_ports(services_munin_plugin_t)
|
|
corenet_tcp_connect_http_port(services_munin_plugin_t)
|
|
|
|
dev_read_urand(services_munin_plugin_t)
|
|
dev_read_rand(services_munin_plugin_t)
|
|
|
|
sysnet_read_config(services_munin_plugin_t)
|
|
|
|
optional_policy(`
|
|
bind_read_config(services_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
cups_read_config(services_munin_plugin_t)
|
|
cups_stream_connect(services_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
lpd_exec_lpr(services_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
mysql_read_config(services_munin_plugin_t)
|
|
mysql_stream_connect(services_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
netutils_domtrans_ping(services_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
nscd_use(services_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
postgresql_stream_connect(services_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
snmp_read_snmp_var_lib_files(services_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
sssd_stream_connect(services_munin_plugin_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
varnishd_read_lib_files(services_munin_plugin_t)
|
|
')
|
|
|
|
##################################
|
|
#
|
|
# System local policy
|
|
#
|
|
|
|
allow system_munin_plugin_t self:capability net_admin;
|
|
allow system_munin_plugin_t self:udp_socket create_socket_perms;
|
|
|
|
rw_files_pattern(system_munin_plugin_t, munin_var_lib_t, munin_var_lib_t)
|
|
|
|
read_files_pattern(system_munin_plugin_t, munin_log_t, munin_log_t)
|
|
|
|
kernel_read_network_state(system_munin_plugin_t)
|
|
kernel_read_all_sysctls(system_munin_plugin_t)
|
|
|
|
dev_read_sysfs(system_munin_plugin_t)
|
|
dev_read_urand(system_munin_plugin_t)
|
|
|
|
domain_read_all_domains_state(system_munin_plugin_t)
|
|
|
|
files_read_usr_files(system_munin_plugin_t)
|
|
|
|
init_read_utmp(system_munin_plugin_t)
|
|
|
|
logging_search_logs(system_munin_plugin_t)
|
|
|
|
sysnet_exec_ifconfig(system_munin_plugin_t)
|
|
|
|
term_getattr_unallocated_ttys(system_munin_plugin_t)
|
|
term_getattr_all_ttys(system_munin_plugin_t)
|
|
term_getattr_all_ptys(system_munin_plugin_t)
|
|
|
|
optional_policy(`
|
|
bind_read_config(system_munin_plugin_t)
|
|
')
|
|
|
|
#######################################
|
|
#
|
|
# Unconfined plugin local policy
|
|
#
|
|
|
|
optional_policy(`
|
|
unconfined_domain(unconfined_munin_plugin_t)
|
|
')
|