Chris PeBenito 9401ae1
policy_module(publicfile, 1.1.0)
Chris PeBenito 9401ae1
Chris PeBenito 9401ae1
########################################
Chris PeBenito 9401ae1
#
Chris PeBenito 9401ae1
# Declarations
Chris PeBenito 9401ae1
#
Chris PeBenito 9401ae1
Chris PeBenito 9401ae1
type publicfile_t;
Chris PeBenito 9401ae1
type publicfile_exec_t;
Chris PeBenito 9401ae1
init_daemon_domain(publicfile_t, publicfile_exec_t)
Chris PeBenito 9401ae1
Chris PeBenito 9401ae1
type publicfile_content_t;
Chris PeBenito 9401ae1
files_type(publicfile_content_t)
Chris PeBenito 9401ae1
Chris PeBenito 9401ae1
########################################
Chris PeBenito 9401ae1
#
Chris PeBenito 9401ae1
# Local policy
Chris PeBenito 9401ae1
#
Chris PeBenito 9401ae1
Chris PeBenito 9401ae1
allow publicfile_t self:capability { dac_override setgid setuid sys_chroot };
Chris PeBenito 9401ae1
allow publicfile_t publicfile_content_t:dir list_dir_perms;
Chris PeBenito 9401ae1
allow publicfile_t publicfile_content_t:file read_file_perms;
Chris PeBenito 9401ae1
Chris PeBenito 9401ae1
files_search_var(publicfile_t)
Chris PeBenito 9401ae1
Chris PeBenito 9401ae1
optional_policy(`
Chris PeBenito 9401ae1
	daemontools_ipc_domain(publicfile_t)
Chris PeBenito 9401ae1
')
Chris PeBenito 9401ae1
Chris PeBenito 9401ae1
optional_policy(`
Chris PeBenito 9401ae1
	ucspitcp_service_domain(publicfile_t, publicfile_exec_t)
Chris PeBenito 9401ae1
')
Chris PeBenito 9401ae1
Chris PeBenito 9401ae1
#allow publicfile_t initrc_t:tcp_socket { read write };