Blame policy/modules/services/publicfile.te
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
0bfccd |
policy_module(publicfile, 1.1.0)
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
########################################
|
|
Chris PeBenito |
17de1b |
#
|
|
Chris PeBenito |
17de1b |
# Declarations
|
|
Chris PeBenito |
17de1b |
#
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
type publicfile_t;
|
|
Chris PeBenito |
17de1b |
type publicfile_exec_t;
|
|
Chris PeBenito |
0bfccd |
init_daemon_domain(publicfile_t, publicfile_exec_t)
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
type publicfile_content_t;
|
|
Chris PeBenito |
17de1b |
files_type(publicfile_content_t)
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
########################################
|
|
Chris PeBenito |
17de1b |
#
|
|
Chris PeBenito |
17de1b |
# Local policy
|
|
Chris PeBenito |
17de1b |
#
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
allow publicfile_t self:capability { dac_override setgid setuid sys_chroot };
|
|
Chris PeBenito |
c0868a |
allow publicfile_t publicfile_content_t:dir list_dir_perms;
|
|
Chris PeBenito |
c0868a |
allow publicfile_t publicfile_content_t:file read_file_perms;
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
files_search_var(publicfile_t)
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
optional_policy(`
|
|
Chris PeBenito |
17de1b |
daemontools_ipc_domain(publicfile_t)
|
|
Chris PeBenito |
17de1b |
')
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
optional_policy(`
|
|
Chris PeBenito |
17de1b |
ucspitcp_service_domain(publicfile_t, publicfile_exec_t)
|
|
Chris PeBenito |
17de1b |
')
|
|
Chris PeBenito |
17de1b |
|
|
Chris PeBenito |
17de1b |
#allow publicfile_t initrc_t:tcp_socket { read write };
|