policy_module(ajaxterm,1.0.0) ######################################## # # Declarations # type ajaxterm_t; type ajaxterm_exec_t; init_daemon_domain(ajaxterm_t, ajaxterm_exec_t) type ajaxterm_initrc_exec_t; init_script_file(ajaxterm_initrc_exec_t) type ajaxterm_var_run_t; files_pid_file(ajaxterm_var_run_t) type ajaxterm_devpts_t; term_login_pty(ajaxterm_devpts_t) permissive ajaxterm_t; ######################################## # # ajaxterm local policy # allow ajaxterm_t self:capability setuid; allow ajaxterm_t self:process setpgid; allow ajaxterm_t self:fifo_file rw_fifo_file_perms; allow ajaxterm_t self:unix_stream_socket create_stream_socket_perms; allow ajaxterm_t self:tcp_socket create_stream_socket_perms; allow ajaxterm_t ajaxterm_devpts_t:chr_file { rw_chr_file_perms setattr getattr relabelfrom; term_create_pty(ajaxterm_t, ajaxterm_devpts_t) manage_dirs_pattern(ajaxterm_t, ajaxterm_var_run_t, ajaxterm_var_run_t) manage_files_pattern(ajaxterm_t, ajaxterm_var_run_t, ajaxterm_var_run_t) files_pid_filetrans(ajaxterm_t, ajaxterm_var_run_t, { file dir }) kernel_read_system_state(ajaxterm_t) corecmd_exec_bin(ajaxterm_t) corenet_tcp_bind_generic_node(ajaxterm_t) dev_read_urand(ajaxterm_t) domain_use_interactive_fds(ajaxterm_t) files_read_etc_files(ajaxterm_t) files_read_usr_files(ajaxterm_t) miscfiles_read_localization(ajaxterm_t) sysnet_dns_name_resolve(ajaxterm_t)