|
|
1ec3d1a |
## <summary>GNU network object model environment (GNOME)</summary>
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
###########################################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Role access for gnome
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="role">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Role allowed access
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## User domain for the role
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_role',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconfd_t, gconfd_exec_t;
|
|
|
1ec3d1a |
type gconf_tmp_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
role $1 types gconfd_t;
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
domain_auto_trans($2, gconfd_exec_t, gconfd_t)
|
|
|
1ec3d1a |
allow gconfd_t $2:fd use;
|
|
|
1ec3d1a |
allow gconfd_t $2:fifo_file write;
|
|
|
1ec3d1a |
allow gconfd_t $2:unix_stream_socket connectto;
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
ps_process_pattern($2, gconfd_t)
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
#gnome_stream_connect_gconf_template($1, $2)
|
|
|
1ec3d1a |
read_files_pattern($2, gconf_tmp_t, gconf_tmp_t)
|
|
|
1ec3d1a |
allow $2 gconfd_t:unix_stream_socket connectto;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
######################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## The role template for the gnome-keyring-daemon.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="user_prefix">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## The user prefix.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1548114 |
## </param>
|
|
|
1ec3d1a |
## <param name="user_role">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## The user role.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
4bdcf6a |
## <param name="user_domain">
|
|
|
4bdcf6a |
## <summary>
|
|
|
4bdcf6a |
## The user domain associated with the role.
|
|
|
4bdcf6a |
## </summary>
|
|
|
4bdcf6a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_role_gkeyringd',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gkeyringd_domain;
|
|
|
1ec3d1a |
attribute gnomedomain;
|
|
|
1ec3d1a |
type gnome_home_t;
|
|
|
1ec3d1a |
type gkeyringd_exec_t, gkeyringd_tmp_t, gkeyringd_gnome_home_t;
|
|
|
1ec3d1a |
class dbus send_msg;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
type $1_gkeyringd_t, gnomedomain, gkeyringd_domain;
|
|
|
1ec3d1a |
typealias $1_gkeyringd_t alias gkeyringd_$1_t;
|
|
|
1ec3d1a |
application_domain($1_gkeyringd_t, gkeyringd_exec_t)
|
|
|
1ec3d1a |
ubac_constrained($1_gkeyringd_t)
|
|
|
1ec3d1a |
domain_user_exemption_target($1_gkeyringd_t)
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
userdom_home_manager($1_gkeyringd_t)
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
role $2 types $1_gkeyringd_t;
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
domtrans_pattern($3, gkeyringd_exec_t, $1_gkeyringd_t)
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $3 gkeyringd_gnome_home_t:dir { relabel_dir_perms manage_dir_perms };
|
|
|
1ec3d1a |
allow $3 gkeyringd_gnome_home_t:file { relabel_file_perms manage_file_perms };
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $3 gkeyringd_tmp_t:dir { relabel_dir_perms manage_dir_perms };
|
|
|
1ec3d1a |
allow $3 gkeyringd_tmp_t:sock_file { relabel_sock_file_perms manage_sock_file_perms };
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
corecmd_bin_domtrans($1_gkeyringd_t, $1_t)
|
|
|
1ec3d1a |
corecmd_shell_domtrans($1_gkeyringd_t, $1_t)
|
|
|
1ec3d1a |
allow $1_gkeyringd_t $3:process sigkill;
|
|
|
1ec3d1a |
allow $3 $1_gkeyringd_t:fd use;
|
|
|
1ec3d1a |
allow $3 $1_gkeyringd_t:fifo_file rw_fifo_file_perms;
|
|
|
1ec3d1a |
|
|
|
1bafb67 |
kernel_read_system_state($1_gkeyringd_t)
|
|
|
1bafb67 |
|
|
|
1ec3d1a |
ps_process_pattern($1_gkeyringd_t, $3)
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
auth_use_nsswitch($1_gkeyringd_t)
|
|
|
1ec3d1a |
|
|
|
05b4f84 |
logging_send_syslog_msg($1_gkeyringd_t)
|
|
|
05b4f84 |
|
|
|
1ec3d1a |
ps_process_pattern($3, $1_gkeyringd_t)
|
|
|
1ec3d1a |
allow $3 $1_gkeyringd_t:process signal_perms;
|
|
|
1ec3d1a |
dontaudit $3 gkeyringd_exec_t:file entrypoint;
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
stream_connect_pattern($3, gkeyringd_tmp_t, gkeyringd_tmp_t, $1_gkeyringd_t)
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1_gkeyringd_t $3:dbus send_msg;
|
|
|
1ec3d1a |
allow $3 $1_gkeyringd_t:dbus send_msg;
|
|
|
1ec3d1a |
optional_policy(`
|
|
|
1ec3d1a |
dbus_session_domain($1, gkeyringd_exec_t, $1_gkeyringd_t)
|
|
|
1ec3d1a |
dbus_session_bus_client($1_gkeyringd_t)
|
|
|
1ec3d1a |
gnome_home_dir_filetrans($1_gkeyringd_t)
|
|
|
1ec3d1a |
gnome_manage_generic_home_dirs($1_gkeyringd_t)
|
|
|
1ec3d1a |
gnome_read_generic_data_home_files($1_gkeyringd_t)
|
|
|
cf3fdbe |
gnome_read_generic_data_home_dirs($1_gkeyringd_t)
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
optional_policy(`
|
|
|
1ec3d1a |
telepathy_mission_control_read_state($1_gkeyringd_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
8283216 |
#######################################
|
|
|
8283216 |
## <summary>
|
|
|
8283216 |
## Allow domain to run gkeyring in the $1_gkeyringd_t domain.
|
|
|
8283216 |
## </summary>
|
|
|
e423fd7 |
## <param name="user_prefix">
|
|
|
e423fd7 |
## <summary>
|
|
|
e423fd7 |
## The user prefix.
|
|
|
e423fd7 |
## </summary>
|
|
|
1548114 |
## </param>
|
|
|
e423fd7 |
## <param name="user_role">
|
|
|
e423fd7 |
## <summary>
|
|
|
e423fd7 |
## The user role.
|
|
|
e423fd7 |
## </summary>
|
|
|
e423fd7 |
## </param>
|
|
|
e423fd7 |
## <param name="user_domain">
|
|
|
e423fd7 |
## <summary>
|
|
|
e423fd7 |
## Domain allowed access.
|
|
|
e423fd7 |
## </summary>
|
|
|
8283216 |
## </param>
|
|
|
8283216 |
#
|
|
|
8283216 |
interface(`gnome_run_gkeyringd',`
|
|
|
8283216 |
gen_require(`
|
|
|
8283216 |
type $1_gkeyringd_t;
|
|
|
8283216 |
type gkeyringd_exec_t;
|
|
|
8283216 |
')
|
|
|
8283216 |
role $2 types $1_gkeyringd_t;
|
|
|
e423fd7 |
domtrans_pattern($3, gkeyringd_exec_t, $1_gkeyringd_t)
|
|
|
8283216 |
')
|
|
|
8283216 |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## gconf connection template.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_stream_connect_gconf',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconfd_t, gconf_tmp_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
read_files_pattern($1, gconf_tmp_t, gconf_tmp_t)
|
|
|
1ec3d1a |
allow $1 gconfd_t:unix_stream_socket connectto;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Connect to gkeyringd with a unix stream socket.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_stream_connect_gkeyringd',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gkeyringd_domain;
|
|
|
1ec3d1a |
type gkeyringd_tmp_t;
|
|
|
1ec3d1a |
type gconf_tmp_t;
|
|
|
1ec3d1a |
type cache_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gconf_tmp_t:dir search_dir_perms;
|
|
|
1ec3d1a |
userdom_search_user_tmp_dirs($1)
|
|
|
1ec3d1a |
stream_connect_pattern($1, gkeyringd_tmp_t, gkeyringd_tmp_t, gkeyringd_domain)
|
|
|
1ec3d1a |
stream_connect_pattern($1, cache_home_t, cache_home_t, gkeyringd_domain)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Run gconfd in gconfd domain.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_domtrans_gconfd',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconfd_t, gconfd_exec_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
domtrans_pattern($1, gconfd_exec_t, gconfd_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Dontaudit read gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain to not audit.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_dontaudit_read_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gnome_home_type;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
dontaudit $1 gnome_home_type:dir read_inherited_file_perms;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Dontaudit search gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain to not audit.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_dontaudit_search_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gnome_home_type;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
dontaudit $1 gnome_home_type:dir search_dir_perms;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Dontaudit write gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain to not audit.
|
|
|
65b38b3 |
## </summary>
|
|
|
65b38b3 |
## </param>
|
|
|
65b38b3 |
#
|
|
|
65b38b3 |
interface(`gnome_dontaudit_append_config_files',`
|
|
|
65b38b3 |
gen_require(`
|
|
|
65b38b3 |
attribute gnome_home_type;
|
|
|
65b38b3 |
')
|
|
|
65b38b3 |
|
|
|
65b38b3 |
dontaudit $1 gnome_home_type:file append;
|
|
|
65b38b3 |
')
|
|
|
65b38b3 |
|
|
|
65b38b3 |
|
|
|
65b38b3 |
########################################
|
|
|
65b38b3 |
## <summary>
|
|
|
65b38b3 |
## Dontaudit write gnome homedir content (.config)
|
|
|
65b38b3 |
## </summary>
|
|
|
65b38b3 |
## <param name="domain">
|
|
|
65b38b3 |
## <summary>
|
|
|
65b38b3 |
## Domain to not audit.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_dontaudit_write_config_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gnome_home_type;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
dontaudit $1 gnome_home_type:file write;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## manage gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gnome_home_type;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gnome_home_type:dir manage_dir_perms;
|
|
|
1ec3d1a |
allow $1 gnome_home_type:file manage_file_perms;
|
|
|
1ec3d1a |
allow $1 gnome_home_type:lnk_file manage_lnk_file_perms;
|
|
|
33ca9aa |
allow $1 gnome_home_type:sock_file manage_sock_file_perms;
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Send general signals to all gconf domains.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_signal_all',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gnomedomain;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gnomedomain:process signal;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Create objects in a Gnome cache home directory
|
|
|
1ec3d1a |
## with an automatic type transition to
|
|
|
1ec3d1a |
## a specified private type.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
## <param name="private_type">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## The type of the object to create.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
## <param name="object_class">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## The class of the object to be created.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
e96ffe5 |
## <param name="name" optional="true">
|
|
|
e96ffe5 |
## <summary>
|
|
|
e96ffe5 |
## The name of the object being created.
|
|
|
e96ffe5 |
## </summary>
|
|
|
e96ffe5 |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_cache_filetrans',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type cache_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
filetrans_pattern($1, cache_home_t, $2, $3, $4)
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Create objects in a Gnome cache home directory
|
|
|
1ec3d1a |
## with an automatic type transition to
|
|
|
1ec3d1a |
## a specified private type.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
## <param name="private_type">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## The type of the object to create.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
## <param name="object_class">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## The class of the object to be created.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
e96ffe5 |
## <param name="name" optional="true">
|
|
|
e96ffe5 |
## <summary>
|
|
|
e96ffe5 |
## The name of the object being created.
|
|
|
e96ffe5 |
## </summary>
|
|
|
e96ffe5 |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_config_filetrans',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
filetrans_pattern($1, config_home_t, $2, $3, $4)
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Read generic cache home files (.cache)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_read_generic_cache_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type cache_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
read_files_pattern($1, cache_home_t, cache_home_t)
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Set attributes of cache home dir (.cache)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_setattr_cache_home_dir',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type cache_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
setattr_dirs_pattern($1, cache_home_t, cache_home_t)
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Manage cache home dir (.cache)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_cache_home_dir',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type cache_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
manage_dirs_pattern($1, cache_home_t, cache_home_t)
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## append to generic cache home files (.cache)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_append_generic_cache_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type cache_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
append_files_pattern($1, cache_home_t, cache_home_t)
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## write to generic cache home files (.cache)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_write_generic_cache_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type cache_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
write_files_pattern($1, cache_home_t, cache_home_t)
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Manage a sock_file in the generic cache home files (.cache)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_generic_cache_sockets',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type cache_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
manage_sock_files_pattern($1, cache_home_t, cache_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Dontaudit read/write to generic cache home files (.cache)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain to not audit.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_dontaudit_rw_generic_cache_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type cache_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
dontaudit $1 cache_home_t:file rw_inherited_file_perms;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## read gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_read_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gnome_home_type;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
list_dirs_pattern($1, gnome_home_type, gnome_home_type)
|
|
|
1ec3d1a |
read_files_pattern($1, gnome_home_type, gnome_home_type)
|
|
|
1ec3d1a |
read_lnk_files_pattern($1, gnome_home_type, gnome_home_type)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Create objects in a Gnome gconf home directory
|
|
|
1ec3d1a |
## with an automatic type transition to
|
|
|
1ec3d1a |
## a specified private type.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
## <param name="private_type">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## The type of the object to create.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
## <param name="object_class">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## The class of the object to be created.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
e96ffe5 |
## <param name="name" optional="true">
|
|
|
e96ffe5 |
## <summary>
|
|
|
e96ffe5 |
## The name of the object being created.
|
|
|
e96ffe5 |
## </summary>
|
|
|
e96ffe5 |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_data_filetrans',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type data_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
filetrans_pattern($1, data_home_t, $2, $3, $4)
|
|
|
1ec3d1a |
gnome_search_gconf($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
#######################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Read generic data home files.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_read_generic_data_home_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type data_home_t, gconf_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
read_files_pattern($1, { gconf_home_t data_home_t }, data_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
cf3fdbe |
######################################
|
|
|
cf3fdbe |
## <summary>
|
|
|
cf3fdbe |
## Read generic data home dirs.
|
|
|
cf3fdbe |
## </summary>
|
|
|
cf3fdbe |
## <param name="domain">
|
|
|
cf3fdbe |
## <summary>
|
|
|
cf3fdbe |
## Domain allowed access.
|
|
|
cf3fdbe |
## </summary>
|
|
|
cf3fdbe |
## </param>
|
|
|
cf3fdbe |
#
|
|
|
cf3fdbe |
interface(`gnome_read_generic_data_home_dirs',`
|
|
|
cf3fdbe |
gen_require(`
|
|
|
cf3fdbe |
type data_home_t, gconf_home_t;
|
|
|
cf3fdbe |
')
|
|
|
cf3fdbe |
|
|
|
cf3fdbe |
list_dirs_pattern($1, { gconf_home_t data_home_t }, data_home_t)
|
|
|
cf3fdbe |
')
|
|
|
cf3fdbe |
|
|
|
1ec3d1a |
#######################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Manage gconf data home files
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_data',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type data_home_t;
|
|
|
1ec3d1a |
type gconf_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gconf_home_t:dir search_dir_perms;
|
|
|
1ec3d1a |
manage_dirs_pattern($1, data_home_t, data_home_t)
|
|
|
1ec3d1a |
manage_files_pattern($1, data_home_t, data_home_t)
|
|
|
1ec3d1a |
manage_lnk_files_pattern($1, data_home_t, data_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Read icc data home content.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_read_home_icc_data_content',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type icc_data_home_t, gconf_home_t, data_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
allow $1 { gconf_home_t data_home_t }:dir search_dir_perms;
|
|
|
1ec3d1a |
list_dirs_pattern($1, icc_data_home_t, icc_data_home_t)
|
|
|
1ec3d1a |
read_files_pattern($1, icc_data_home_t, icc_data_home_t)
|
|
|
1ec3d1a |
read_lnk_files_pattern($1, icc_data_home_t, icc_data_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Read inherited icc data home files.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_read_inherited_home_icc_data_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type icc_data_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 icc_data_home_t:file read_inherited_file_perms;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Create gconf_home_t objects in the /root directory
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
## <param name="object_class">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## The class of the object to be created.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
e96ffe5 |
## <param name="name" optional="true">
|
|
|
e96ffe5 |
## <summary>
|
|
|
e96ffe5 |
## The name of the object being created.
|
|
|
e96ffe5 |
## </summary>
|
|
|
e96ffe5 |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_admin_home_gconf_filetrans',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconf_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
2881fe8 |
userdom_admin_home_dir_filetrans($1, gconf_home_t, $2, $3)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Do not audit attempts to read
|
|
|
1ec3d1a |
## inherited gconf config files.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain to not audit.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_dontaudit_read_inherited_gconf_config_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconf_etc_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
dontaudit $1 gconf_etc_t:file read_inherited_file_perms;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## read gconf config files
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_read_gconf_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconf_etc_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gconf_etc_t:dir list_dir_perms;
|
|
|
1ec3d1a |
read_files_pattern($1, gconf_etc_t, gconf_etc_t)
|
|
|
1ec3d1a |
files_search_etc($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
#######################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Manage gconf config files
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_gconf_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconf_etc_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gconf_etc_t:dir list_dir_perms;
|
|
|
1ec3d1a |
manage_files_pattern($1, gconf_etc_t, gconf_etc_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Execute gconf programs in
|
|
|
1ec3d1a |
## in the caller domain.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_exec_gconf',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconfd_exec_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
can_exec($1, gconfd_exec_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Execute gnome keyringd in the caller domain.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_exec_keyringd',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gkeyringd_exec_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
can_exec($1, gkeyringd_exec_t)
|
|
|
1ec3d1a |
corecmd_search_bin($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Read gconf home files
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_read_gconf_home_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconf_home_t;
|
|
|
1ec3d1a |
type data_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
allow $1 gconf_home_t:dir list_dir_perms;
|
|
|
1ec3d1a |
allow $1 data_home_t:dir list_dir_perms;
|
|
|
1ec3d1a |
read_files_pattern($1, gconf_home_t, gconf_home_t)
|
|
|
1ec3d1a |
read_files_pattern($1, data_home_t, data_home_t)
|
|
|
1ec3d1a |
read_lnk_files_pattern($1, gconf_home_t, gconf_home_t)
|
|
|
1ec3d1a |
read_lnk_files_pattern($1, data_home_t, data_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Search gkeyringd temporary directories.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_search_gkeyringd_tmp_dirs',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gkeyringd_tmp_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
files_search_tmp($1)
|
|
|
1ec3d1a |
allow $1 gkeyringd_tmp_t:dir search_dir_perms;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## List gkeyringd temporary directories.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_list_gkeyringd_tmp_dirs',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gkeyringd_tmp_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
files_search_tmp($1)
|
|
|
1ec3d1a |
allow $1 gkeyringd_tmp_t:dir list_dir_perms;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
c6ae4fa |
#######################################
|
|
|
c6ae4fa |
## <summary>
|
|
|
c6ae4fa |
## Manage gkeyringd temporary directories.
|
|
|
c6ae4fa |
## </summary>
|
|
|
c6ae4fa |
## <param name="domain">
|
|
|
c6ae4fa |
## <summary>
|
|
|
c6ae4fa |
## Domain allowed access.
|
|
|
c6ae4fa |
## </summary>
|
|
|
c6ae4fa |
## </param>
|
|
|
c6ae4fa |
#
|
|
|
c6ae4fa |
interface(`gnome_manage_gkeyringd_tmp_dirs',`
|
|
|
c6ae4fa |
gen_require(`
|
|
|
c6ae4fa |
type gkeyringd_tmp_t;
|
|
|
c6ae4fa |
')
|
|
|
c6ae4fa |
|
|
|
c6ae4fa |
files_search_tmp($1)
|
|
|
c6ae4fa |
manage_dirs_pattern($1, gkeyringd_tmp_t, gkeyringd_tmp_t)
|
|
|
c6ae4fa |
')
|
|
|
c6ae4fa |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## search gconf homedir (.local)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_search_gconf',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconf_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gconf_home_t:dir search_dir_perms;
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Set attributes of Gnome config dirs.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_setattr_config_dirs',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gnome_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
setattr_dirs_pattern($1, gnome_home_t, gnome_home_t)
|
|
|
1ec3d1a |
files_search_home($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Manage generic gnome home files.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_generic_home_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gnome_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
manage_files_pattern($1, gnome_home_t, gnome_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Manage generic gnome home directories.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_generic_home_dirs',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gnome_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
allow $1 gnome_home_t:dir manage_dir_perms;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Append gconf home files
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_append_gconf_home_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconf_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
append_files_pattern($1, gconf_home_t, gconf_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## manage gconf home files
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_gconf_home_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconf_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gconf_home_t:dir list_dir_perms;
|
|
|
1ec3d1a |
manage_files_pattern($1, gconf_home_t, gconf_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Connect to gnome over a unix stream socket.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
## <param name="user_domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## The type of the user domain.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_stream_connect',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gnome_home_type;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
# Connect to pulseaudit server
|
|
|
1ec3d1a |
stream_connect_pattern($1, gnome_home_type, gnome_home_type, $2)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## list gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_list_home_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 config_home_t:dir list_dir_perms;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Set attributes of gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_setattr_home_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
setattr_dirs_pattern($1, config_home_t, config_home_t)
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## read gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_read_home_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
list_dirs_pattern($1, config_home_t, config_home_t)
|
|
|
1ec3d1a |
read_files_pattern($1, config_home_t, config_home_t)
|
|
|
1ec3d1a |
read_lnk_files_pattern($1, config_home_t, config_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
#######################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## delete gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_delete_home_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
delete_files_pattern($1, config_home_t, config_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
#######################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## setattr gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_setattr_home_config_dirs',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
setattr_dirs_pattern($1, config_home_t, config_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## manage gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_home_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
manage_files_pattern($1, config_home_t, config_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
#######################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## delete gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_delete_home_config_dirs',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
delete_dirs_pattern($1, config_home_t, config_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## manage gnome homedir content (.config)
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_home_config_dirs',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
manage_dirs_pattern($1, config_home_t, config_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## manage gstreamer home content files.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_gstreamer_home_files',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gstreamer_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
c425ddc |
manage_dirs_pattern($1, gstreamer_home_t, gstreamer_home_t)
|
|
|
1ec3d1a |
manage_files_pattern($1, gstreamer_home_t, gstreamer_home_t)
|
|
|
1ec3d1a |
gnome_filetrans_gstreamer_home_content($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
5de47f2 |
######################################
|
|
|
5de47f2 |
## <summary>
|
|
|
5de47f2 |
## Allow to execute gstreamer home content files.
|
|
|
5de47f2 |
## </summary>
|
|
|
5de47f2 |
## <param name="domain">
|
|
|
5de47f2 |
## <summary>
|
|
|
5de47f2 |
## Domain allowed access.
|
|
|
5de47f2 |
## </summary>
|
|
|
5de47f2 |
## </param>
|
|
|
5de47f2 |
#
|
|
|
5de47f2 |
interface(`gnome_exec_gstreamer_home_files',`
|
|
|
5de47f2 |
gen_require(`
|
|
|
5de47f2 |
type gstreamer_home_t;
|
|
|
5de47f2 |
')
|
|
|
5de47f2 |
|
|
|
5de47f2 |
can_exec($1, gstreamer_home_t)
|
|
|
5de47f2 |
')
|
|
|
5de47f2 |
|
|
|
1ec3d1a |
#######################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## file name transition gstreamer home content files.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_filetrans_gstreamer_home_content',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gstreamer_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gstreamer_home_t, file, ".grl-bookmarks")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gstreamer_home_t, file, ".grl-metadata-store")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gstreamer_home_t, file, ".grl-podcasts")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-0.12")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-0.10")
|
|
|
461b721 |
userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-1.0")
|
|
|
461b721 |
userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-1.2")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-10")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-12")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".orc")
|
|
|
1ec3d1a |
userdom_user_tmp_filetrans($1, gstreamer_home_t, dir, ".orc")
|
|
|
461b721 |
gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-0.12")
|
|
|
461b721 |
gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-0.10")
|
|
|
461b721 |
gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-1.0")
|
|
|
461b721 |
gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-1.2")
|
|
|
461b721 |
gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-10")
|
|
|
461b721 |
gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-12")
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
#######################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## manage gstreamer home content files.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_gstreamer_home_dirs',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gstreamer_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
manage_dirs_pattern($1, gstreamer_home_t, gstreamer_home_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Read/Write all inherited gnome home config
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_rw_inherited_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gnome_home_type;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gnome_home_type:file rw_inherited_file_perms;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
0219a15 |
## Dontaudit Read/Write all inherited gnome home config
|
|
|
0219a15 |
## </summary>
|
|
|
0219a15 |
## <param name="domain">
|
|
|
0219a15 |
## <summary>
|
|
|
0219a15 |
## Domain to not audit.
|
|
|
0219a15 |
## </summary>
|
|
|
0219a15 |
## </param>
|
|
|
0219a15 |
#
|
|
|
0219a15 |
interface(`gnome_dontaudit_rw_inherited_config',`
|
|
|
0219a15 |
gen_require(`
|
|
|
0219a15 |
attribute gnome_home_type;
|
|
|
0219a15 |
')
|
|
|
0219a15 |
|
|
|
0219a15 |
dontaudit $1 gnome_home_type:file rw_inherited_file_perms;
|
|
|
0219a15 |
')
|
|
|
0219a15 |
|
|
|
0219a15 |
########################################
|
|
|
0219a15 |
## <summary>
|
|
|
1ec3d1a |
## Send and receive messages from
|
|
|
1ec3d1a |
## gconf system service over dbus.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_dbus_chat_gconfdefault',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gconfdefaultsm_t;
|
|
|
1ec3d1a |
class dbus send_msg;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gconfdefaultsm_t:dbus send_msg;
|
|
|
1ec3d1a |
allow gconfdefaultsm_t $1:dbus send_msg;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Send and receive messages from
|
|
|
1ec3d1a |
## gkeyringd over dbus.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_dbus_chat_gkeyringd',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gkeyringd_domain;
|
|
|
1ec3d1a |
class dbus send_msg;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gkeyringd_domain:dbus send_msg;
|
|
|
1ec3d1a |
allow gkeyringd_domain $1:dbus send_msg;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Send signull signal to gkeyringd processes.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_signull_gkeyringd',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gkeyringd_domain;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gkeyringd_domain:process signull;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Allow the domain to read gkeyringd state files in /proc.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_read_gkeyringd_state',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gkeyringd_domain;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
ps_process_pattern($1, gkeyringd_domain)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Create directories in user home directories
|
|
|
1ec3d1a |
## with the gnome home file type.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_home_dir_filetrans',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type gnome_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gnome_home_t, dir)
|
|
|
1ec3d1a |
userdom_search_user_home_dirs($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
######################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Allow read kde config content
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_read_usr_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_usr_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
files_search_usr($1)
|
|
|
1ec3d1a |
list_dirs_pattern($1, config_usr_t, config_usr_t)
|
|
|
1ec3d1a |
read_files_pattern($1, config_usr_t, config_usr_t)
|
|
|
1ec3d1a |
read_lnk_files_pattern($1, config_usr_t, config_usr_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
#######################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Allow manage kde config content
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_manage_usr_config',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_usr_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
files_search_usr($1)
|
|
|
1ec3d1a |
manage_dirs_pattern($1, config_usr_t, config_usr_t)
|
|
|
1ec3d1a |
manage_files_pattern($1, config_usr_t, config_usr_t)
|
|
|
1ec3d1a |
manage_lnk_files_pattern($1, config_usr_t, config_usr_t)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Execute gnome-keyring in the user gkeyring domain
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_transition_gkeyringd',`
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
attribute gkeyringd_domain;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
allow $1 gkeyringd_domain:process transition;
|
|
|
1ec3d1a |
dontaudit $1 gkeyringd_domain:process { noatsecure siginh rlimitinh };
|
|
|
1ec3d1a |
allow gkeyringd_domain $1:process { sigchld signull };
|
|
|
1ec3d1a |
allow gkeyringd_domain $1:fifo_file rw_inherited_fifo_file_perms;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Create gnome content in the user home directory
|
|
|
1ec3d1a |
## with an correct label.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_filetrans_home_content',`
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_home_t;
|
|
|
1ec3d1a |
type cache_home_t;
|
|
|
4a82594 |
type dbus_home_t;
|
|
|
1ec3d1a |
type gconf_home_t;
|
|
|
1ec3d1a |
type gnome_home_t;
|
|
|
1ec3d1a |
type data_home_t, icc_data_home_t;
|
|
|
1ec3d1a |
type gkeyringd_gnome_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, config_home_t, dir, ".config")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, config_home_t, file, ".Xdefaults")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, config_home_t, dir, ".xine")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, cache_home_t, dir, ".cache")
|
|
|
4a82594 |
userdom_user_home_dir_filetrans($1, dbus_home_t, dir, ".dbus")
|
|
|
afcfca2 |
userdom_user_home_dir_filetrans($1, cache_home_t, dir, ".nv")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, config_home_t, dir, ".kde")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gconf_home_t, dir, ".gconf")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gconf_home_t, dir, ".gconfd")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gconf_home_t, dir, ".local")
|
|
|
1ec3d1a |
userdom_user_home_dir_filetrans($1, gnome_home_t, dir, ".gnome2")
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
# ~/.color/icc: legacy
|
|
|
1ec3d1a |
userdom_user_home_content_filetrans($1, icc_data_home_t, dir, "icc")
|
|
|
1ec3d1a |
filetrans_pattern($1, gnome_home_t, gkeyringd_gnome_home_t, dir, "keyrings")
|
|
|
7645f50 |
filetrans_pattern($1, data_home_t, gkeyringd_gnome_home_t, dir, "keyrings")
|
|
|
1ec3d1a |
filetrans_pattern($1, gconf_home_t, data_home_t, dir, "share")
|
|
|
1ec3d1a |
filetrans_pattern($1, data_home_t, icc_data_home_t, dir, "icc")
|
|
|
b163f88 |
filetrans_pattern($1, cache_home_t, cache_home_t, dir, "fontconfig")
|
|
|
1ec3d1a |
userdom_user_tmp_filetrans($1, config_home_t, dir, "dconf")
|
|
|
0834301 |
gnome_filetrans_gstreamer_home_content($1)
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
########################################
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Create gnome directory in the /root directory
|
|
|
1ec3d1a |
## with an correct label.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## <param name="domain">
|
|
|
1ec3d1a |
## <summary>
|
|
|
1ec3d1a |
## Domain allowed access.
|
|
|
1ec3d1a |
## </summary>
|
|
|
1ec3d1a |
## </param>
|
|
|
1ec3d1a |
#
|
|
|
1ec3d1a |
interface(`gnome_filetrans_admin_home_content',`
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
gen_require(`
|
|
|
1ec3d1a |
type config_home_t;
|
|
|
1ec3d1a |
type cache_home_t;
|
|
|
4a82594 |
type dbus_home_t;
|
|
|
1ec3d1a |
type gstreamer_home_t;
|
|
|
1ec3d1a |
type gconf_home_t;
|
|
|
1ec3d1a |
type gnome_home_t;
|
|
|
1ec3d1a |
type icc_data_home_t;
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
1ec3d1a |
userdom_admin_home_dir_filetrans($1, config_home_t, dir, ".config")
|
|
|
1ec3d1a |
userdom_admin_home_dir_filetrans($1, config_home_t, file, ".Xdefaults")
|
|
|
1ec3d1a |
userdom_admin_home_dir_filetrans($1, config_home_t, dir, ".xine")
|
|
|
1ec3d1a |
userdom_admin_home_dir_filetrans($1, cache_home_t, dir, ".cache")
|
|
|
4a82594 |
userdom_admin_home_dir_filetrans($1, dbus_home_t, dir, ".dbus")
|
|
|
1ec3d1a |
userdom_admin_home_dir_filetrans($1, config_home_t, dir, ".kde")
|
|
|
1ec3d1a |
userdom_admin_home_dir_filetrans($1, gconf_home_t, dir, ".gconf")
|
|
|
1ec3d1a |
userdom_admin_home_dir_filetrans($1, gconf_home_t, dir, ".gconfd")
|
|
|
1ec3d1a |
userdom_admin_home_dir_filetrans($1, gconf_home_t, dir, ".local")
|
|
|
1ec3d1a |
userdom_admin_home_dir_filetrans($1, gnome_home_t, dir, ".gnome2")
|
|
|
1ec3d1a |
gnome_filetrans_gstreamer_home_content($1)
|
|
|
1ec3d1a |
# /root/.color/icc: legacy
|
|
|
1ec3d1a |
userdom_admin_home_dir_filetrans($1, icc_data_home_t, dir, "icc")
|
|
|
1ec3d1a |
')
|
|
|
1ec3d1a |
|
|
|
4ca6e2c |
#####################################
|
|
|
4ca6e2c |
## <summary>
|
|
|
4ca6e2c |
## Execute gnome-keyring executable
|
|
|
4ca6e2c |
## in the specified domain.
|
|
|
4ca6e2c |
## </summary>
|
|
|
4ca6e2c |
## <desc>
|
|
|
4ca6e2c |
##
|
|
|
4ca6e2c |
## Execute a telepathy executable
|
|
|
4ca6e2c |
## in the specified domain. This allows
|
|
|
4ca6e2c |
## the specified domain to execute any file
|
|
|
4ca6e2c |
## on these filesystems in the specified
|
|
|
4ca6e2c |
## domain.
|
|
|
4ca6e2c |
##
|
|
|
4ca6e2c |
##
|
|
|
4ca6e2c |
## No interprocess communication (signals, pipes,
|
|
|
4ca6e2c |
## etc.) is provided by this interface since
|
|
|
4ca6e2c |
## the domains are not owned by this module.
|
|
|
4ca6e2c |
##
|
|
|
4ca6e2c |
##
|
|
|
4ca6e2c |
## This interface was added to handle
|
|
|
4ca6e2c |
## the ssh-agent policy.
|
|
|
4ca6e2c |
##
|
|
|
4ca6e2c |
## </desc>
|
|
|
4ca6e2c |
## <param name="domain">
|
|
|
4ca6e2c |
## <summary>
|
|
|
4ca6e2c |
## Domain allowed to transition.
|
|
|
4ca6e2c |
## </summary>
|
|
|
4ca6e2c |
## </param>
|
|
|
4ca6e2c |
## <param name="target_domain">
|
|
|
4ca6e2c |
## <summary>
|
|
|
4ca6e2c |
## The type of the new process.
|
|
|
4ca6e2c |
## </summary>
|
|
|
4ca6e2c |
## </param>
|
|
|
4ca6e2c |
#
|
|
|
4ca6e2c |
interface(`gnome_command_domtrans_gkeyringd', `
|
|
|
4ca6e2c |
gen_require(`
|
|
|
4ca6e2c |
type gkeyringd_exec_t;
|
|
|
4ca6e2c |
')
|
|
|
4ca6e2c |
|
|
|
4ca6e2c |
allow $2 gkeyringd_exec_t:file entrypoint;
|
|
|
4ca6e2c |
domain_transition_pattern($1, gkeyringd_exec_t, $2)
|
|
|
4ca6e2c |
type_transition $1 gkeyringd_exec_t:process $2;
|
|
|
4ca6e2c |
')
|