|
Chris PeBenito |
9401ae1 |
policy_module(publicfile, 1.1.0)
|
|
Chris PeBenito |
9401ae1 |
|
|
Chris PeBenito |
9401ae1 |
########################################
|
|
Chris PeBenito |
9401ae1 |
#
|
|
Chris PeBenito |
9401ae1 |
# Declarations
|
|
Chris PeBenito |
9401ae1 |
#
|
|
Chris PeBenito |
9401ae1 |
|
|
Chris PeBenito |
9401ae1 |
type publicfile_t;
|
|
Chris PeBenito |
9401ae1 |
type publicfile_exec_t;
|
|
Chris PeBenito |
9401ae1 |
init_daemon_domain(publicfile_t, publicfile_exec_t)
|
|
Chris PeBenito |
9401ae1 |
|
|
Chris PeBenito |
9401ae1 |
type publicfile_content_t;
|
|
Chris PeBenito |
9401ae1 |
files_type(publicfile_content_t)
|
|
Chris PeBenito |
9401ae1 |
|
|
Chris PeBenito |
9401ae1 |
########################################
|
|
Chris PeBenito |
9401ae1 |
#
|
|
Chris PeBenito |
9401ae1 |
# Local policy
|
|
Chris PeBenito |
9401ae1 |
#
|
|
Chris PeBenito |
9401ae1 |
|
|
Chris PeBenito |
9401ae1 |
allow publicfile_t self:capability { dac_override setgid setuid sys_chroot };
|
|
Chris PeBenito |
9401ae1 |
allow publicfile_t publicfile_content_t:dir list_dir_perms;
|
|
Chris PeBenito |
9401ae1 |
allow publicfile_t publicfile_content_t:file read_file_perms;
|
|
Chris PeBenito |
9401ae1 |
|
|
Chris PeBenito |
9401ae1 |
files_search_var(publicfile_t)
|
|
Chris PeBenito |
9401ae1 |
|
|
Chris PeBenito |
9401ae1 |
optional_policy(`
|
|
Chris PeBenito |
9401ae1 |
daemontools_ipc_domain(publicfile_t)
|
|
Chris PeBenito |
9401ae1 |
')
|
|
Chris PeBenito |
9401ae1 |
|
|
Chris PeBenito |
9401ae1 |
optional_policy(`
|
|
Chris PeBenito |
9401ae1 |
ucspitcp_service_domain(publicfile_t, publicfile_exec_t)
|
|
Chris PeBenito |
9401ae1 |
')
|
|
Chris PeBenito |
9401ae1 |
|
|
Chris PeBenito |
9401ae1 |
#allow publicfile_t initrc_t:tcp_socket { read write };
|