Blame policy/modules/services/publicfile.te
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
policy_module(publicfile,1.0.0)
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
########################################
|
|
Chris PeBenito |
17de1b |
#
|
|
Chris PeBenito |
17de1b |
# Declarations
|
|
Chris PeBenito |
17de1b |
#
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
type publicfile_t;
|
|
Chris PeBenito |
17de1b |
type publicfile_exec_t;
|
|
Chris PeBenito |
17de1b |
init_system_domain(publicfile_t,publicfile_exec_t)
|
|
Chris PeBenito |
17de1b |
role system_r types publicfile_t;
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
type publicfile_content_t;
|
|
Chris PeBenito |
17de1b |
files_type(publicfile_content_t)
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
########################################
|
|
Chris PeBenito |
17de1b |
#
|
|
Chris PeBenito |
17de1b |
# Local policy
|
|
Chris PeBenito |
17de1b |
#
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
allow publicfile_t self:capability { dac_override setgid setuid sys_chroot };
|
|
Chris PeBenito |
17de1b |
allow publicfile_t publicfile_content_t:dir r_dir_perms;
|
|
Chris PeBenito |
17de1b |
allow publicfile_t publicfile_content_t:file r_file_perms;
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
files_search_var(publicfile_t)
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
libs_use_ld_so(publicfile_t)
|
|
Chris PeBenito |
17de1b |
libs_use_shared_libs(publicfile_t)
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
optional_policy(`
|
|
Chris PeBenito |
17de1b |
daemontools_ipc_domain(publicfile_t)
|
|
Chris PeBenito |
17de1b |
')
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
optional_policy(`
|
|
Chris PeBenito |
17de1b |
ucspitcp_service_domain(publicfile_t, publicfile_exec_t)
|
|
Chris PeBenito |
17de1b |
')
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
#allow publicfile_t initrc_t:tcp_socket { read write };
|