Blame refpolicy/policy/modules/services/publicfile.te
|
Chris PeBenito |
44d5d9 |
|
|
Chris PeBenito |
44d5d9 |
policy_module(publicfile,1.0.0)
|
|
Chris PeBenito |
44d5d9 |
|
|
Chris PeBenito |
44d5d9 |
########################################
|
|
Chris PeBenito |
44d5d9 |
#
|
|
Chris PeBenito |
44d5d9 |
# Declarations
|
|
Chris PeBenito |
44d5d9 |
#
|
|
Chris PeBenito |
44d5d9 |
|
|
Chris PeBenito |
44d5d9 |
type publicfile_t;
|
|
Chris PeBenito |
44d5d9 |
type publicfile_exec_t;
|
|
Chris PeBenito |
44d5d9 |
init_system_domain(publicfile_t,publicfile_exec_t)
|
|
Chris PeBenito |
44d5d9 |
role system_r types publicfile_t;
|
|
Chris PeBenito |
44d5d9 |
|
|
Chris PeBenito |
44d5d9 |
type publicfile_content_t;
|
|
Chris PeBenito |
44d5d9 |
files_type(publicfile_content_t)
|
|
Chris PeBenito |
44d5d9 |
|
|
Chris PeBenito |
44d5d9 |
########################################
|
|
Chris PeBenito |
44d5d9 |
#
|
|
Chris PeBenito |
44d5d9 |
# Local policy
|
|
Chris PeBenito |
44d5d9 |
#
|
|
Chris PeBenito |
44d5d9 |
|
|
Chris PeBenito |
44d5d9 |
allow publicfile_t self:capability { dac_override setgid setuid sys_chroot };
|
|
Chris PeBenito |
44d5d9 |
allow publicfile_t publicfile_content_t:dir r_dir_perms;
|
|
Chris PeBenito |
44d5d9 |
allow publicfile_t publicfile_content_t:file r_file_perms;
|
|
Chris PeBenito |
44d5d9 |
|
|
Chris PeBenito |
44d5d9 |
files_search_var(publicfile_t)
|
|
Chris PeBenito |
44d5d9 |
|
|
Chris PeBenito |
44d5d9 |
libs_use_ld_so(publicfile_t)
|
|
Chris PeBenito |
44d5d9 |
libs_use_shared_libs(publicfile_t)
|
|
Chris PeBenito |
44d5d9 |
|
|
Chris PeBenito |
44d5d9 |
optional_policy(`daemontools',`
|
|
Chris PeBenito |
44d5d9 |
daemontools_ipc_domain(publicfile_t)
|
|
Chris PeBenito |
44d5d9 |
')
|
|
Chris PeBenito |
44d5d9 |
|
|
Chris PeBenito |
44d5d9 |
optional_policy(`ucspitcp',`
|
|
Chris PeBenito |
44d5d9 |
ucspitcp_service_domain(publicfile_t, publicfile_exec_t)
|
|
Chris PeBenito |
44d5d9 |
')
|
|
Chris PeBenito |
44d5d9 |
|
|
Chris PeBenito |
44d5d9 |
#allow publicfile_t initrc_t:tcp_socket { read write };
|