67effb0
483be01
c6c63f6
b0d8d59
5b082e4
b8097d6
689d954
5afc3d3
f3c5e77
a59e50c
cf87233
17759c7
dc1db54
e9bf16d
4f95198
bf40792
622c63b
c20842c
dc7cc4d
792d448
62 lines
1.5 KiB
Plaintext
62 lines
1.5 KiB
Plaintext
policy_module(icecast, 1.0.1)
|
|
|
|
########################################
|
|
#
|
|
# Declarations
|
|
#
|
|
|
|
type icecast_t;
|
|
type icecast_exec_t;
|
|
init_daemon_domain(icecast_t, icecast_exec_t)
|
|
|
|
type icecast_initrc_exec_t;
|
|
init_script_file(icecast_initrc_exec_t)
|
|
|
|
type icecast_var_run_t;
|
|
files_pid_file(icecast_var_run_t)
|
|
|
|
type icecast_log_t;
|
|
logging_log_file(icecast_log_t)
|
|
|
|
########################################
|
|
#
|
|
# icecast local policy
|
|
#
|
|
|
|
allow icecast_t self:capability { dac_override setgid setuid sys_nice };
|
|
allow icecast_t self:process { getsched fork setsched signal };
|
|
allow icecast_t self:fifo_file rw_fifo_file_perms;
|
|
allow icecast_t self:unix_stream_socket create_stream_socket_perms;
|
|
allow icecast_t self:tcp_socket create_stream_socket_perms;
|
|
|
|
manage_dirs_pattern(icecast_t, icecast_log_t, icecast_log_t)
|
|
manage_files_pattern(icecast_t, icecast_log_t, icecast_log_t)
|
|
logging_log_filetrans(icecast_t, icecast_log_t, { file dir } )
|
|
|
|
manage_dirs_pattern(icecast_t, icecast_var_run_t, icecast_var_run_t)
|
|
manage_files_pattern(icecast_t, icecast_var_run_t, icecast_var_run_t)
|
|
files_pid_filetrans(icecast_t, icecast_var_run_t, { file dir })
|
|
|
|
kernel_read_system_state(icecast_t)
|
|
|
|
corenet_tcp_bind_soundd_port(icecast_t)
|
|
|
|
# Init script handling
|
|
domain_use_interactive_fds(icecast_t)
|
|
|
|
files_read_etc_files(icecast_t)
|
|
|
|
auth_use_nsswitch(icecast_t)
|
|
|
|
miscfiles_read_localization(icecast_t)
|
|
|
|
sysnet_dns_name_resolve(icecast_t)
|
|
|
|
optional_policy(`
|
|
apache_read_sys_content(icecast_t)
|
|
')
|
|
|
|
optional_policy(`
|
|
rtkit_scheduled(icecast_t)
|
|
')
|