blob: fc0d7e67ed0f0540b212c0d34135e7bdbb01f654 [file] [log] [blame]
Pavel Maltsev3af9b322018-05-07 12:38:10 -07001# Domain to run EmbeddedKitchenSink app (for test-purpose)
2type kitchensink_app, domain;
Pavel Maltsev3af9b322018-05-07 12:38:10 -07003app_domain(kitchensink_app);
4
5# Allow Car Service to be the client of Vehicle HAL
6hal_client_domain(kitchensink_app, hal_vehicle)
7
8# Keep alphabetically sorted.
9allow kitchensink_app {
10 accessibility_service
11 activity_service
Calvin Huang578893d2019-05-16 16:48:50 -070012 activity_task_service
Hayden Gomes71a93ce2019-08-06 11:15:46 -070013 audio_service
14 audioserver_service
Pavel Maltsev3af9b322018-05-07 12:38:10 -070015 autofill_service
Keun young Park3c0b0002019-08-30 09:38:52 -070016 carservice_service
Pavel Maltsev3af9b322018-05-07 12:38:10 -070017 connectivity_service
18 content_service
19 deviceidle_service
20 display_service
21 graphicsstats_service
22 input_method_service
23 input_service
24 location_service
Hayden Gomes71a93ce2019-08-06 11:15:46 -070025 mediaserver_service
Pavel Maltsev3af9b322018-05-07 12:38:10 -070026 network_management_service
27 power_service
28 sensorservice_service
29 surfaceflinger_service
30 uimode_service
Tomasz Wasilczykdf1e6d12020-01-06 14:56:23 -080031 wifi_service
Pavel Maltsev3af9b322018-05-07 12:38:10 -070032}:service_manager find;
33
34# Read and write /data/data subdirectory.
35allow kitchensink_app system_app_data_file:dir { create_dir_perms getattr };
36allow kitchensink_app system_app_data_file:{ file lnk_file } create_file_perms;