/usr/share/selinux/ubuntu/include/services/munin.if is in selinux-policy-ubuntu-dev 0.2.20091117-0ubuntu2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 | ## <summary>Munin network-wide load graphing (formerly LRRD)</summary>
########################################
## <summary>
## Connect to munin over a unix domain
## stream socket.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`munin_stream_connect',`
gen_require(`
type munin_var_run_t, munin_t;
')
allow $1 munin_t:unix_stream_socket connectto;
allow $1 munin_var_run_t:sock_file { getattr write };
files_search_pids($1)
')
#######################################
## <summary>
## Read munin configuration files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`munin_read_config',`
gen_require(`
type munin_etc_t;
')
allow $1 munin_etc_t:dir list_dir_perms;
allow $1 munin_etc_t:file read_file_perms;
allow $1 munin_etc_t:lnk_file { getattr read };
files_search_etc($1)
')
#######################################
## <summary>
## Append to the munin log.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`munin_append_log',`
gen_require(`
type munin_log_t;
')
logging_search_logs($1)
allow $1 munin_log_t:dir list_dir_perms;
append_files_pattern($1, munin_log_t, munin_log_t)
')
#######################################
## <summary>
## Search munin library directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`munin_search_lib',`
gen_require(`
type munin_var_lib_t;
')
allow $1 munin_var_lib_t:dir search_dir_perms;
files_search_var_lib($1)
')
#######################################
## <summary>
## Do not audit attempts to search
## munin library directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`munin_dontaudit_search_lib',`
gen_require(`
type munin_var_lib_t;
')
dontaudit $1 munin_var_lib_t:dir search_dir_perms;
')
########################################
## <summary>
## All of the rules required to administrate
## an munin environment
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="role">
## <summary>
## The role to be allowed to manage the munin domain.
## </summary>
## </param>
## <rolecap/>
#
interface(`munin_admin',`
gen_require(`
type munin_t, munin_etc_t, munin_tmp_t;
type munin_log_t, munin_var_lib_t, munin_var_run_t;
type httpd_munin_content_t;
type munin_initrc_exec_t;
')
allow $1 munin_t:process { ptrace signal_perms };
ps_process_pattern($1, munin_t)
init_labeled_script_domtrans($1, munin_initrc_exec_t)
domain_system_change_exemption($1)
role_transition $2 munin_initrc_exec_t system_r;
allow $2 system_r;
files_list_tmp($1)
admin_pattern($1, munin_tmp_t)
logging_list_logs($1)
admin_pattern($1, munin_log_t)
files_list_etc($1)
admin_pattern($1, munin_etc_t)
files_list_var_lib($1)
admin_pattern($1, munin_var_lib_t)
files_list_pids($1)
admin_pattern($1, munin_var_run_t)
admin_pattern($1, httpd_munin_content_t)
')
|