2aae593
policy_module(rhnsd, 1.0.0)
2aae593
2aae593
########################################
2aae593
#
2aae593
# Declarations
2aae593
#
2aae593
2aae593
type rhnsd_t;
2aae593
type rhnsd_exec_t;
2aae593
init_daemon_domain(rhnsd_t, rhnsd_exec_t)
2aae593
2aae593
type rhnsd_var_run_t;
2aae593
files_pid_file(rhnsd_var_run_t)
2aae593
2aae593
type rhnsd_initrc_exec_t;
2aae593
init_script_file(rhnsd_initrc_exec_t)
2aae593
2aae593
########################################
2aae593
#
2aae593
# rhnsd local policy
2aae593
#
2aae593
2aae593
allow rhnsd_t self:capability { kill };
2aae593
allow rhnsd_t self:process { fork signal };
2aae593
allow rhnsd_t self:fifo_file rw_fifo_file_perms;
2aae593
allow rhnsd_t self:unix_stream_socket create_stream_socket_perms;
2aae593
2aae593
manage_dirs_pattern(rhnsd_t, rhnsd_var_run_t, rhnsd_var_run_t)
2aae593
manage_files_pattern(rhnsd_t, rhnsd_var_run_t, rhnsd_var_run_t)
2aae593
files_pid_filetrans(rhnsd_t, rhnsd_var_run_t, { dir file })
2aae593
2aae593
files_read_etc_files(rhnsd_t)
2aae593
2aae593
logging_send_syslog_msg(rhnsd_t)
2aae593
2aae593
optional_policy(`
2aae593
	# execute rhn_check
2aae593
	rpm_domtrans(rhnsd_t)
2aae593
')