1ec3d1a
## <summary>GNU network object model environment (GNOME)</summary>
1ec3d1a
1ec3d1a
###########################################################
1ec3d1a
## <summary>
1ec3d1a
##  Role access for gnome
1ec3d1a
## </summary>
1ec3d1a
## <param name="role">
1ec3d1a
##  <summary>
1ec3d1a
##  Role allowed access
1ec3d1a
##  </summary>
1ec3d1a
## </param>
1ec3d1a
## <param name="domain">
1ec3d1a
##  <summary>
1ec3d1a
##  User domain for the role
1ec3d1a
##  </summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_role',`
1ec3d1a
    gen_require(`
1ec3d1a
        type gconfd_t, gconfd_exec_t;
1ec3d1a
        type gconf_tmp_t;
1ec3d1a
    ')
1ec3d1a
1ec3d1a
    role $1 types gconfd_t;
1ec3d1a
1ec3d1a
    domain_auto_trans($2, gconfd_exec_t, gconfd_t)
1ec3d1a
    allow gconfd_t $2:fd use;
1ec3d1a
    allow gconfd_t $2:fifo_file write;
1ec3d1a
    allow gconfd_t $2:unix_stream_socket connectto;
1ec3d1a
1ec3d1a
    ps_process_pattern($2, gconfd_t)
1ec3d1a
1ec3d1a
	#gnome_stream_connect_gconf_template($1, $2)
1ec3d1a
	read_files_pattern($2, gconf_tmp_t, gconf_tmp_t)
1ec3d1a
	allow $2 gconfd_t:unix_stream_socket connectto;
1ec3d1a
')
1ec3d1a
1ec3d1a
######################################
1ec3d1a
## <summary>
1ec3d1a
##      The role template for the gnome-keyring-daemon.
1ec3d1a
## </summary>
1ec3d1a
## <param name="user_prefix">
1ec3d1a
##      <summary>
1ec3d1a
##      The user prefix.
1ec3d1a
##      </summary>
1548114
## </param>
1ec3d1a
## <param name="user_role">
1ec3d1a
##      <summary>
1ec3d1a
##      The user role.
1ec3d1a
##      </summary>
1ec3d1a
## </param>
4bdcf6a
## <param name="user_domain">
4bdcf6a
##      <summary>
4bdcf6a
##      The user domain associated with the role.
4bdcf6a
##      </summary>
4bdcf6a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_role_gkeyringd',`
1ec3d1a
        gen_require(`
1ec3d1a
                attribute gkeyringd_domain;
1ec3d1a
                attribute gnomedomain;
1ec3d1a
                type gnome_home_t;
1ec3d1a
                type gkeyringd_exec_t, gkeyringd_tmp_t, gkeyringd_gnome_home_t;
1ec3d1a
		class dbus send_msg;
1ec3d1a
        ')
1ec3d1a
1ec3d1a
	type $1_gkeyringd_t, gnomedomain, gkeyringd_domain;
1ec3d1a
	typealias $1_gkeyringd_t alias gkeyringd_$1_t;
1ec3d1a
	application_domain($1_gkeyringd_t, gkeyringd_exec_t)
1ec3d1a
	ubac_constrained($1_gkeyringd_t)
1ec3d1a
	domain_user_exemption_target($1_gkeyringd_t)
1ec3d1a
1ec3d1a
	userdom_home_manager($1_gkeyringd_t)
1ec3d1a
1ec3d1a
	role $2 types $1_gkeyringd_t;
1ec3d1a
1ec3d1a
	domtrans_pattern($3, gkeyringd_exec_t, $1_gkeyringd_t)
1ec3d1a
1ec3d1a
	allow $3 gkeyringd_gnome_home_t:dir { relabel_dir_perms manage_dir_perms };
1ec3d1a
	allow $3 gkeyringd_gnome_home_t:file { relabel_file_perms manage_file_perms };
1ec3d1a
1ec3d1a
	allow $3 gkeyringd_tmp_t:dir { relabel_dir_perms manage_dir_perms };
1ec3d1a
	allow $3 gkeyringd_tmp_t:sock_file { relabel_sock_file_perms manage_sock_file_perms };
1ec3d1a
1ec3d1a
	corecmd_bin_domtrans($1_gkeyringd_t, $1_t)
1ec3d1a
	corecmd_shell_domtrans($1_gkeyringd_t, $1_t)
1ec3d1a
	allow $1_gkeyringd_t $3:process sigkill;
1ec3d1a
	allow $3 $1_gkeyringd_t:fd use;
1ec3d1a
	allow $3 $1_gkeyringd_t:fifo_file rw_fifo_file_perms;
1ec3d1a
1bafb67
	kernel_read_system_state($1_gkeyringd_t)
1bafb67
1ec3d1a
	ps_process_pattern($1_gkeyringd_t, $3)
1ec3d1a
1ec3d1a
	auth_use_nsswitch($1_gkeyringd_t)
1ec3d1a
05b4f84
	logging_send_syslog_msg($1_gkeyringd_t)
05b4f84
1ec3d1a
	ps_process_pattern($3, $1_gkeyringd_t)
1ec3d1a
	allow $3 $1_gkeyringd_t:process signal_perms;
1ec3d1a
	dontaudit $3 gkeyringd_exec_t:file entrypoint;
1ec3d1a
1ec3d1a
	stream_connect_pattern($3, gkeyringd_tmp_t, gkeyringd_tmp_t, $1_gkeyringd_t)
1ec3d1a
1ec3d1a
	allow $1_gkeyringd_t $3:dbus send_msg;
1ec3d1a
	allow $3 $1_gkeyringd_t:dbus send_msg;
1ec3d1a
	optional_policy(`
1ec3d1a
	       	dbus_session_domain($1, gkeyringd_exec_t, $1_gkeyringd_t)
1ec3d1a
		dbus_session_bus_client($1_gkeyringd_t)
1ec3d1a
		gnome_home_dir_filetrans($1_gkeyringd_t)
1ec3d1a
		gnome_manage_generic_home_dirs($1_gkeyringd_t)
1ec3d1a
		gnome_read_generic_data_home_files($1_gkeyringd_t)
cf3fdbe
		gnome_read_generic_data_home_dirs($1_gkeyringd_t)
1ec3d1a
1ec3d1a
		optional_policy(`
1ec3d1a
			telepathy_mission_control_read_state($1_gkeyringd_t)
1ec3d1a
		')
1ec3d1a
	')
1ec3d1a
')
1ec3d1a
8283216
#######################################
8283216
## <summary>
8283216
##  Allow domain to run gkeyring in the $1_gkeyringd_t domain.
8283216
## </summary>
e423fd7
## <param name="user_prefix">
e423fd7
##      <summary>
e423fd7
##      The user prefix.
e423fd7
##      </summary>
1548114
## </param>
e423fd7
## <param name="user_role">
e423fd7
##      <summary>
e423fd7
##      The user role.
e423fd7
##      </summary>
e423fd7
## </param>
e423fd7
## <param name="user_domain">
e423fd7
##      <summary>
e423fd7
##	Domain allowed access.
e423fd7
##      </summary>
8283216
## </param>
8283216
#
8283216
interface(`gnome_run_gkeyringd',`
8283216
    gen_require(`
8283216
		type $1_gkeyringd_t;
8283216
		type gkeyringd_exec_t;
8283216
	')
8283216
	role $2 types $1_gkeyringd_t;
e423fd7
	domtrans_pattern($3, gkeyringd_exec_t, $1_gkeyringd_t)
8283216
')
8283216
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	gconf connection template.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_stream_connect_gconf',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gconfd_t, gconf_tmp_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	read_files_pattern($1, gconf_tmp_t, gconf_tmp_t)
1ec3d1a
	allow $1 gconfd_t:unix_stream_socket connectto;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Connect to gkeyringd with a unix stream socket. 
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_stream_connect_gkeyringd',`
1ec3d1a
	gen_require(`
1ec3d1a
			attribute gkeyringd_domain;
1ec3d1a
			type gkeyringd_tmp_t;
1ec3d1a
			type gconf_tmp_t;
1ec3d1a
			type cache_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 gconf_tmp_t:dir search_dir_perms;
1ec3d1a
	userdom_search_user_tmp_dirs($1)
1ec3d1a
	stream_connect_pattern($1, gkeyringd_tmp_t, gkeyringd_tmp_t, gkeyringd_domain)
1ec3d1a
	stream_connect_pattern($1, cache_home_t, cache_home_t, gkeyringd_domain)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Run gconfd in gconfd domain.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_domtrans_gconfd',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gconfd_t, gconfd_exec_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	domtrans_pattern($1, gconfd_exec_t, gconfd_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Dontaudit read gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain to not audit.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_dontaudit_read_config',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gnome_home_type;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	dontaudit $1 gnome_home_type:dir read_inherited_file_perms;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Dontaudit search gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain to not audit.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_dontaudit_search_config',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gnome_home_type;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	dontaudit $1 gnome_home_type:dir search_dir_perms;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Dontaudit write gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain to not audit.
65b38b3
##	</summary>
65b38b3
## </param>
65b38b3
#
65b38b3
interface(`gnome_dontaudit_append_config_files',`
65b38b3
	gen_require(`
65b38b3
		attribute gnome_home_type;
65b38b3
	')
65b38b3
65b38b3
	dontaudit $1 gnome_home_type:file append;
65b38b3
')
65b38b3
65b38b3
65b38b3
########################################
65b38b3
## <summary>
65b38b3
##	Dontaudit write gnome homedir content (.config)
65b38b3
## </summary>
65b38b3
## <param name="domain">
65b38b3
##	<summary>
65b38b3
##	Domain to not audit.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_dontaudit_write_config_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gnome_home_type;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	dontaudit $1 gnome_home_type:file write;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	manage gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_config',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gnome_home_type;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 gnome_home_type:dir manage_dir_perms;
1ec3d1a
	allow $1 gnome_home_type:file manage_file_perms;
1ec3d1a
	allow $1 gnome_home_type:lnk_file manage_lnk_file_perms;
33ca9aa
	allow $1 gnome_home_type:sock_file manage_sock_file_perms;
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Send general signals to all gconf domains.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_signal_all',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gnomedomain;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 gnomedomain:process signal;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Create objects in a Gnome cache home directory
1ec3d1a
##	with an automatic type transition to
1ec3d1a
##	a specified private type.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
## <param name="private_type">
1ec3d1a
##	<summary>
1ec3d1a
##	The type of the object to create.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
## <param name="object_class">
1ec3d1a
##	<summary>
1ec3d1a
##	The class of the object to be created.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
e96ffe5
## <param name="name" optional="true">
e96ffe5
##	<summary>
e96ffe5
##	The name of the object being created.
e96ffe5
##	</summary>
e96ffe5
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_cache_filetrans',`
1ec3d1a
	gen_require(`
1ec3d1a
		type cache_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	filetrans_pattern($1, cache_home_t, $2, $3, $4)
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Create objects in a Gnome cache home directory
1ec3d1a
##	with an automatic type transition to
1ec3d1a
##	a specified private type.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
## <param name="private_type">
1ec3d1a
##	<summary>
1ec3d1a
##	The type of the object to create.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
## <param name="object_class">
1ec3d1a
##	<summary>
1ec3d1a
##	The class of the object to be created.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
e96ffe5
## <param name="name" optional="true">
e96ffe5
##	<summary>
e96ffe5
##	The name of the object being created.
e96ffe5
##	</summary>
e96ffe5
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_config_filetrans',`
1ec3d1a
	gen_require(`
1ec3d1a
		type config_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	filetrans_pattern($1, config_home_t, $2, $3, $4)
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Read generic cache home files (.cache)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_read_generic_cache_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type cache_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	read_files_pattern($1, cache_home_t, cache_home_t)
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Set attributes of cache home dir (.cache)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_setattr_cache_home_dir',`
1ec3d1a
	gen_require(`
1ec3d1a
		type cache_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	setattr_dirs_pattern($1, cache_home_t, cache_home_t)
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Manage cache home dir (.cache)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_cache_home_dir',`
1ec3d1a
	gen_require(`
1ec3d1a
		type cache_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	manage_dirs_pattern($1, cache_home_t, cache_home_t)
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	append to generic cache home files (.cache)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_append_generic_cache_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type cache_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	append_files_pattern($1, cache_home_t, cache_home_t)
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	write to generic cache home files (.cache)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_write_generic_cache_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type cache_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	write_files_pattern($1, cache_home_t, cache_home_t)
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Manage a sock_file in the generic cache home files (.cache)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_generic_cache_sockets',`
1ec3d1a
	gen_require(`
1ec3d1a
		type cache_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
	manage_sock_files_pattern($1, cache_home_t, cache_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Dontaudit read/write to generic cache home files (.cache)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain to not audit.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_dontaudit_rw_generic_cache_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type cache_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	dontaudit $1 cache_home_t:file rw_inherited_file_perms;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	read gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_read_config',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gnome_home_type;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	list_dirs_pattern($1, gnome_home_type, gnome_home_type)
1ec3d1a
	read_files_pattern($1, gnome_home_type, gnome_home_type)
1ec3d1a
	read_lnk_files_pattern($1, gnome_home_type, gnome_home_type)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Create objects in a Gnome gconf home directory
1ec3d1a
##	with an automatic type transition to
1ec3d1a
##	a specified private type.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
## <param name="private_type">
1ec3d1a
##	<summary>
1ec3d1a
##	The type of the object to create.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
## <param name="object_class">
1ec3d1a
##	<summary>
1ec3d1a
##	The class of the object to be created.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
e96ffe5
## <param name="name" optional="true">
e96ffe5
##	<summary>
e96ffe5
##	The name of the object being created.
e96ffe5
##	</summary>
e96ffe5
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_data_filetrans',`
1ec3d1a
	gen_require(`
1ec3d1a
		type data_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	filetrans_pattern($1, data_home_t, $2, $3, $4)
1ec3d1a
	gnome_search_gconf($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
#######################################
1ec3d1a
## <summary>
1ec3d1a
##	Read generic data home files.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_read_generic_data_home_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type data_home_t, gconf_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	read_files_pattern($1, { gconf_home_t data_home_t }, data_home_t)
1ec3d1a
')
1ec3d1a
cf3fdbe
######################################
cf3fdbe
## <summary>
cf3fdbe
##  Read generic data home dirs.
cf3fdbe
## </summary>
cf3fdbe
## <param name="domain">
cf3fdbe
##  <summary>
cf3fdbe
##  Domain allowed access.
cf3fdbe
##  </summary>
cf3fdbe
## </param>
cf3fdbe
#
cf3fdbe
interface(`gnome_read_generic_data_home_dirs',`
cf3fdbe
    gen_require(`
cf3fdbe
        type data_home_t, gconf_home_t;
cf3fdbe
    ')
cf3fdbe
cf3fdbe
    list_dirs_pattern($1, { gconf_home_t data_home_t }, data_home_t)
cf3fdbe
')
cf3fdbe
1ec3d1a
#######################################
1ec3d1a
## <summary>
1ec3d1a
##	Manage gconf data home files
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_data',`
1ec3d1a
	gen_require(`
1ec3d1a
		type data_home_t;
1ec3d1a
		type gconf_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
		allow $1 gconf_home_t:dir search_dir_perms;
1ec3d1a
		manage_dirs_pattern($1, data_home_t, data_home_t)
1ec3d1a
		manage_files_pattern($1, data_home_t, data_home_t)
1ec3d1a
		manage_lnk_files_pattern($1, data_home_t, data_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Read icc data home content.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_read_home_icc_data_content',`
1ec3d1a
	gen_require(`
1ec3d1a
		type icc_data_home_t, gconf_home_t, data_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
	allow $1 { gconf_home_t data_home_t }:dir search_dir_perms;
1ec3d1a
	list_dirs_pattern($1, icc_data_home_t, icc_data_home_t)
1ec3d1a
	read_files_pattern($1, icc_data_home_t, icc_data_home_t)
1ec3d1a
	read_lnk_files_pattern($1, icc_data_home_t, icc_data_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Read inherited icc data home files.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_read_inherited_home_icc_data_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type icc_data_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 icc_data_home_t:file read_inherited_file_perms;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Create gconf_home_t objects in the /root directory
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
## <param name="object_class">
1ec3d1a
##	<summary>
1ec3d1a
##	The class of the object to be created.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
e96ffe5
## <param name="name" optional="true">
e96ffe5
##	<summary>
e96ffe5
##	The name of the object being created.
e96ffe5
##	</summary>
e96ffe5
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_admin_home_gconf_filetrans',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gconf_home_t;
1ec3d1a
	')
1ec3d1a
2881fe8
	userdom_admin_home_dir_filetrans($1, gconf_home_t, $2, $3)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Do not audit attempts to read
1ec3d1a
##	inherited gconf config files.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain to not audit.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_dontaudit_read_inherited_gconf_config_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gconf_etc_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	dontaudit $1 gconf_etc_t:file read_inherited_file_perms;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	read gconf config files
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_read_gconf_config',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gconf_etc_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 gconf_etc_t:dir list_dir_perms;
1ec3d1a
	read_files_pattern($1, gconf_etc_t, gconf_etc_t)
1ec3d1a
	files_search_etc($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
#######################################
1ec3d1a
## <summary>
1ec3d1a
##      Manage gconf config files
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##      <summary>
1ec3d1a
##      Domain allowed access.
1ec3d1a
##      </summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_gconf_config',`
1ec3d1a
        gen_require(`
1ec3d1a
                type gconf_etc_t;
1ec3d1a
        ')
1ec3d1a
1ec3d1a
        allow $1 gconf_etc_t:dir list_dir_perms;
1ec3d1a
        manage_files_pattern($1, gconf_etc_t, gconf_etc_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Execute gconf programs in 
1ec3d1a
##	in the caller domain.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_exec_gconf',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gconfd_exec_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	can_exec($1, gconfd_exec_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Execute gnome keyringd in the caller domain.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_exec_keyringd',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gkeyringd_exec_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	can_exec($1, gkeyringd_exec_t)
1ec3d1a
	corecmd_search_bin($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Read gconf home files
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_read_gconf_home_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gconf_home_t;
1ec3d1a
		type data_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
	allow $1 gconf_home_t:dir list_dir_perms;
1ec3d1a
	allow $1 data_home_t:dir list_dir_perms;
1ec3d1a
	read_files_pattern($1, gconf_home_t, gconf_home_t)
1ec3d1a
	read_files_pattern($1, data_home_t, data_home_t)
1ec3d1a
	read_lnk_files_pattern($1, gconf_home_t, gconf_home_t)
1ec3d1a
	read_lnk_files_pattern($1, data_home_t, data_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Search gkeyringd temporary directories.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_search_gkeyringd_tmp_dirs',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gkeyringd_tmp_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	files_search_tmp($1)
1ec3d1a
	allow $1 gkeyringd_tmp_t:dir search_dir_perms;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	List gkeyringd temporary directories.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_list_gkeyringd_tmp_dirs',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gkeyringd_tmp_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	files_search_tmp($1)
1ec3d1a
	allow $1 gkeyringd_tmp_t:dir list_dir_perms;
1ec3d1a
')
1ec3d1a
c6ae4fa
#######################################
c6ae4fa
## <summary>
c6ae4fa
##  Manage gkeyringd temporary directories.
c6ae4fa
## </summary>
c6ae4fa
## <param name="domain">
c6ae4fa
##  <summary>
c6ae4fa
##  Domain allowed access.
c6ae4fa
##  </summary>
c6ae4fa
## </param>
c6ae4fa
#
c6ae4fa
interface(`gnome_manage_gkeyringd_tmp_dirs',`
c6ae4fa
    gen_require(`
c6ae4fa
        type gkeyringd_tmp_t;
c6ae4fa
    ')
c6ae4fa
c6ae4fa
    files_search_tmp($1)
c6ae4fa
	manage_dirs_pattern($1, gkeyringd_tmp_t, gkeyringd_tmp_t)
c6ae4fa
')
c6ae4fa
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	search gconf homedir (.local)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_search_gconf',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gconf_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 gconf_home_t:dir search_dir_perms;
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Set attributes of Gnome config dirs.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_setattr_config_dirs',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gnome_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	setattr_dirs_pattern($1, gnome_home_t, gnome_home_t)
1ec3d1a
	files_search_home($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Manage generic gnome home files.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_generic_home_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gnome_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
	manage_files_pattern($1, gnome_home_t, gnome_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Manage generic gnome home directories.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_generic_home_dirs',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gnome_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
	allow $1 gnome_home_t:dir manage_dir_perms;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Append gconf home files
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_append_gconf_home_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gconf_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	append_files_pattern($1, gconf_home_t, gconf_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	manage gconf home files
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_gconf_home_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gconf_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 gconf_home_t:dir list_dir_perms;
1ec3d1a
	manage_files_pattern($1, gconf_home_t, gconf_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Connect to gnome over a unix stream socket.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
## <param name="user_domain">
1ec3d1a
##	<summary>
1ec3d1a
##	The type of the user domain.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_stream_connect',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gnome_home_type;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	# Connect to pulseaudit server
1ec3d1a
	stream_connect_pattern($1, gnome_home_type, gnome_home_type, $2)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	list gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_list_home_config',`
1ec3d1a
	gen_require(`
1ec3d1a
		type config_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 config_home_t:dir list_dir_perms;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Set attributes of gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_setattr_home_config',`
1ec3d1a
	gen_require(`
1ec3d1a
		type config_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	setattr_dirs_pattern($1, config_home_t, config_home_t)
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	read gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_read_home_config',`
1ec3d1a
	gen_require(`
1ec3d1a
		type config_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	list_dirs_pattern($1, config_home_t, config_home_t)
1ec3d1a
	read_files_pattern($1, config_home_t, config_home_t)
1ec3d1a
	read_lnk_files_pattern($1, config_home_t, config_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
#######################################
1ec3d1a
## <summary>
1ec3d1a
##  delete gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##  <summary>
1ec3d1a
##  Domain allowed access.
1ec3d1a
##  </summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_delete_home_config',`
1ec3d1a
    gen_require(`
1ec3d1a
        type config_home_t;
1ec3d1a
    ')
1ec3d1a
1ec3d1a
    delete_files_pattern($1, config_home_t, config_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
#######################################
1ec3d1a
## <summary>
1ec3d1a
##  setattr gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##  <summary>
1ec3d1a
##  Domain allowed access.
1ec3d1a
##  </summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_setattr_home_config_dirs',`
1ec3d1a
    gen_require(`
1ec3d1a
        type config_home_t;
1ec3d1a
    ')
1ec3d1a
1ec3d1a
    setattr_dirs_pattern($1, config_home_t, config_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	manage gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_home_config',`
1ec3d1a
	gen_require(`
1ec3d1a
		type config_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	manage_files_pattern($1, config_home_t, config_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
#######################################
1ec3d1a
## <summary>
1ec3d1a
##  delete gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##  <summary>
1ec3d1a
##  Domain allowed access.
1ec3d1a
##  </summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_delete_home_config_dirs',`
1ec3d1a
    gen_require(`
1ec3d1a
        type config_home_t;
1ec3d1a
    ')
1ec3d1a
1ec3d1a
    delete_dirs_pattern($1, config_home_t, config_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	manage gnome homedir content (.config)
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_home_config_dirs',`
1ec3d1a
	gen_require(`
1ec3d1a
		type config_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	manage_dirs_pattern($1, config_home_t, config_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	manage gstreamer home content files.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_gstreamer_home_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gstreamer_home_t;
1ec3d1a
	')
1ec3d1a
c425ddc
	manage_dirs_pattern($1, gstreamer_home_t, gstreamer_home_t)
1ec3d1a
	manage_files_pattern($1, gstreamer_home_t, gstreamer_home_t)
1ec3d1a
	gnome_filetrans_gstreamer_home_content($1)
1ec3d1a
')
1ec3d1a
5de47f2
######################################
5de47f2
## <summary>
5de47f2
##      Allow to execute gstreamer home content files.
5de47f2
## </summary>
5de47f2
## <param name="domain">
5de47f2
##      <summary>
5de47f2
##      Domain allowed access.
5de47f2
##      </summary>
5de47f2
## </param>
5de47f2
#
5de47f2
interface(`gnome_exec_gstreamer_home_files',`
5de47f2
        gen_require(`
5de47f2
                type gstreamer_home_t;
5de47f2
        ')
5de47f2
5de47f2
        can_exec($1, gstreamer_home_t)
5de47f2
')
5de47f2
1ec3d1a
#######################################
1ec3d1a
## <summary>
1ec3d1a
##  file name transition gstreamer home content files.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##  <summary>
1ec3d1a
##  Domain allowed access.
1ec3d1a
##  </summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_filetrans_gstreamer_home_content',`
1ec3d1a
    gen_require(`
1ec3d1a
        type gstreamer_home_t;
1ec3d1a
    ')
1ec3d1a
1ec3d1a
    userdom_user_home_dir_filetrans($1, gstreamer_home_t, file, ".grl-bookmarks")
1ec3d1a
    userdom_user_home_dir_filetrans($1, gstreamer_home_t, file, ".grl-metadata-store")
1ec3d1a
    userdom_user_home_dir_filetrans($1, gstreamer_home_t, file, ".grl-podcasts")
1ec3d1a
    userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-0.12")
1ec3d1a
    userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-0.10")
461b721
    userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-1.0")
461b721
    userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-1.2")
1ec3d1a
    userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-10")
1ec3d1a
    userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-12")
1ec3d1a
    userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".orc")
1ec3d1a
    userdom_user_tmp_filetrans($1, gstreamer_home_t, dir, ".orc")
461b721
    gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-0.12")
461b721
    gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-0.10")
461b721
    gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-1.0")
461b721
    gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-1.2")
461b721
    gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-10")
461b721
    gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-12")
1ec3d1a
')
1ec3d1a
1ec3d1a
#######################################
1ec3d1a
## <summary>
1ec3d1a
##  manage gstreamer home content files.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##  <summary>
1ec3d1a
##  Domain allowed access.
1ec3d1a
##  </summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_gstreamer_home_dirs',`
1ec3d1a
    gen_require(`
1ec3d1a
        type gstreamer_home_t;
1ec3d1a
    ')
1ec3d1a
1ec3d1a
    manage_dirs_pattern($1, gstreamer_home_t, gstreamer_home_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Read/Write all inherited gnome home config 
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_rw_inherited_config',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gnome_home_type;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 gnome_home_type:file rw_inherited_file_perms;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
0219a15
##	Dontaudit Read/Write all inherited gnome home config 
0219a15
## </summary>
0219a15
## <param name="domain">
0219a15
##	<summary>
0219a15
##	Domain to not audit.
0219a15
##	</summary>
0219a15
## </param>
0219a15
#
0219a15
interface(`gnome_dontaudit_rw_inherited_config',`
0219a15
	gen_require(`
0219a15
		attribute gnome_home_type;
0219a15
	')
0219a15
0219a15
	dontaudit $1 gnome_home_type:file rw_inherited_file_perms;
0219a15
')
0219a15
0219a15
########################################
0219a15
## <summary>
1ec3d1a
##	Send and receive messages from
1ec3d1a
##	gconf system service over dbus.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_dbus_chat_gconfdefault',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gconfdefaultsm_t;
1ec3d1a
		class dbus send_msg;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 gconfdefaultsm_t:dbus send_msg;
1ec3d1a
	allow gconfdefaultsm_t $1:dbus send_msg;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Send and receive messages from
1ec3d1a
##	gkeyringd over dbus.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_dbus_chat_gkeyringd',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gkeyringd_domain;
1ec3d1a
		class dbus send_msg;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 gkeyringd_domain:dbus send_msg;
1ec3d1a
	allow gkeyringd_domain $1:dbus send_msg;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Send signull signal to gkeyringd processes.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_signull_gkeyringd',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gkeyringd_domain;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 gkeyringd_domain:process signull;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Allow the domain to read gkeyringd state files in /proc.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_read_gkeyringd_state',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gkeyringd_domain;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	ps_process_pattern($1, gkeyringd_domain)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Create directories in user home directories
1ec3d1a
##	with the gnome home file type.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_home_dir_filetrans',`
1ec3d1a
	gen_require(`
1ec3d1a
		type gnome_home_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	userdom_user_home_dir_filetrans($1, gnome_home_t, dir)
1ec3d1a
	userdom_search_user_home_dirs($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
######################################
1ec3d1a
## <summary>
1ec3d1a
##      Allow read kde config content
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##      <summary>
1ec3d1a
##      Domain allowed access.
1ec3d1a
##      </summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_read_usr_config',`
1ec3d1a
        gen_require(`
1ec3d1a
                type config_usr_t;
1ec3d1a
        ')
1ec3d1a
1ec3d1a
        files_search_usr($1)
1ec3d1a
		list_dirs_pattern($1, config_usr_t, config_usr_t)
1ec3d1a
		read_files_pattern($1, config_usr_t, config_usr_t)
1ec3d1a
		read_lnk_files_pattern($1, config_usr_t, config_usr_t)	
1ec3d1a
')
1ec3d1a
1ec3d1a
#######################################
1ec3d1a
## <summary>
1ec3d1a
##      Allow manage kde config content
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##      <summary>
1ec3d1a
##      Domain allowed access.
1ec3d1a
##      </summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_manage_usr_config',`
1ec3d1a
        gen_require(`
1ec3d1a
                type config_usr_t;
1ec3d1a
        ')
1ec3d1a
1ec3d1a
        files_search_usr($1)
1ec3d1a
		manage_dirs_pattern($1, config_usr_t, config_usr_t)
1ec3d1a
		manage_files_pattern($1, config_usr_t, config_usr_t)
1ec3d1a
		manage_lnk_files_pattern($1, config_usr_t, config_usr_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Execute gnome-keyring in the user gkeyring domain
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_transition_gkeyringd',`
1ec3d1a
	gen_require(`
1ec3d1a
		attribute gkeyringd_domain;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 gkeyringd_domain:process transition;
1ec3d1a
	dontaudit $1 gkeyringd_domain:process { noatsecure siginh rlimitinh };
1ec3d1a
	allow gkeyringd_domain $1:process { sigchld signull };
1ec3d1a
	allow gkeyringd_domain $1:fifo_file rw_inherited_fifo_file_perms;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Create gnome content in the user home directory
1ec3d1a
##	with an correct label.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_filetrans_home_content',`
1ec3d1a
1ec3d1a
gen_require(`
1ec3d1a
	type config_home_t;
1ec3d1a
	type cache_home_t;
4a82594
	type dbus_home_t;
1ec3d1a
	type gconf_home_t;
1ec3d1a
	type gnome_home_t;
1ec3d1a
	type data_home_t, icc_data_home_t;
1ec3d1a
	type gkeyringd_gnome_home_t;
1ec3d1a
')
1ec3d1a
1ec3d1a
	userdom_user_home_dir_filetrans($1, config_home_t, dir, ".config")
1ec3d1a
	userdom_user_home_dir_filetrans($1, config_home_t, file, ".Xdefaults")
1ec3d1a
	userdom_user_home_dir_filetrans($1, config_home_t, dir, ".xine")
1ec3d1a
	userdom_user_home_dir_filetrans($1, cache_home_t, dir, ".cache")
4a82594
	userdom_user_home_dir_filetrans($1, dbus_home_t, dir, ".dbus")
afcfca2
	userdom_user_home_dir_filetrans($1, cache_home_t, dir, ".nv")
1ec3d1a
	userdom_user_home_dir_filetrans($1, config_home_t, dir, ".kde")
1ec3d1a
	userdom_user_home_dir_filetrans($1, gconf_home_t, dir, ".gconf")
1ec3d1a
	userdom_user_home_dir_filetrans($1, gconf_home_t, dir, ".gconfd")
1ec3d1a
	userdom_user_home_dir_filetrans($1, gconf_home_t, dir, ".local")
1ec3d1a
	userdom_user_home_dir_filetrans($1, gnome_home_t, dir, ".gnome2")
1ec3d1a
1ec3d1a
	# ~/.color/icc: legacy
1ec3d1a
	userdom_user_home_content_filetrans($1, icc_data_home_t, dir, "icc")
1ec3d1a
	filetrans_pattern($1, gnome_home_t, gkeyringd_gnome_home_t, dir, "keyrings")
7645f50
	filetrans_pattern($1, data_home_t,  gkeyringd_gnome_home_t, dir, "keyrings")
1ec3d1a
	filetrans_pattern($1, gconf_home_t, data_home_t, dir, "share")
1ec3d1a
	filetrans_pattern($1, data_home_t, icc_data_home_t, dir, "icc")
b163f88
	filetrans_pattern($1, cache_home_t, cache_home_t, dir, "fontconfig")
1ec3d1a
	userdom_user_tmp_filetrans($1, config_home_t, dir, "dconf")
0834301
	gnome_filetrans_gstreamer_home_content($1)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Create gnome directory in the /root directory
1ec3d1a
##	with an correct label.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`gnome_filetrans_admin_home_content',`
1ec3d1a
1ec3d1a
gen_require(`
1ec3d1a
	type config_home_t;
1ec3d1a
	type cache_home_t;
4a82594
	type dbus_home_t;
1ec3d1a
	type gstreamer_home_t;
1ec3d1a
	type gconf_home_t;
1ec3d1a
	type gnome_home_t;
1ec3d1a
	type icc_data_home_t;
1ec3d1a
')
1ec3d1a
1ec3d1a
	userdom_admin_home_dir_filetrans($1, config_home_t, dir, ".config")
1ec3d1a
	userdom_admin_home_dir_filetrans($1, config_home_t, file, ".Xdefaults")
1ec3d1a
	userdom_admin_home_dir_filetrans($1, config_home_t, dir, ".xine")
1ec3d1a
	userdom_admin_home_dir_filetrans($1, cache_home_t, dir, ".cache")
4a82594
	userdom_admin_home_dir_filetrans($1, dbus_home_t, dir, ".dbus")
1ec3d1a
	userdom_admin_home_dir_filetrans($1, config_home_t, dir, ".kde")
1ec3d1a
	userdom_admin_home_dir_filetrans($1, gconf_home_t, dir, ".gconf")
1ec3d1a
	userdom_admin_home_dir_filetrans($1, gconf_home_t, dir, ".gconfd")
1ec3d1a
	userdom_admin_home_dir_filetrans($1, gconf_home_t, dir, ".local")
1ec3d1a
	userdom_admin_home_dir_filetrans($1, gnome_home_t, dir, ".gnome2")
1ec3d1a
	gnome_filetrans_gstreamer_home_content($1)
1ec3d1a
	# /root/.color/icc: legacy
1ec3d1a
	userdom_admin_home_dir_filetrans($1, icc_data_home_t, dir, "icc")
1ec3d1a
')
1ec3d1a
4ca6e2c
#####################################
4ca6e2c
## <summary>
4ca6e2c
##  Execute gnome-keyring executable
4ca6e2c
##  in the specified domain.
4ca6e2c
## </summary>
4ca6e2c
## <desc>
4ca6e2c
##  

4ca6e2c
##  Execute a telepathy executable
4ca6e2c
##  in the specified domain.  This allows
4ca6e2c
##  the specified domain to execute any file
4ca6e2c
##  on these filesystems in the specified
4ca6e2c
##  domain. 
4ca6e2c
##  

4ca6e2c
##  

4ca6e2c
##  No interprocess communication (signals, pipes,
4ca6e2c
##  etc.) is provided by this interface since
4ca6e2c
##  the domains are not owned by this module.
4ca6e2c
##  

4ca6e2c
##  

4ca6e2c
##  This interface was added to handle
4ca6e2c
##  the ssh-agent policy.
4ca6e2c
##  

4ca6e2c
## </desc>
4ca6e2c
## <param name="domain">
4ca6e2c
##  <summary>
4ca6e2c
##  Domain allowed to transition.
4ca6e2c
##  </summary>
4ca6e2c
## </param>
4ca6e2c
## <param name="target_domain">
4ca6e2c
##  <summary>
4ca6e2c
##  The type of the new process.
4ca6e2c
##  </summary>
4ca6e2c
## </param>
4ca6e2c
#
4ca6e2c
interface(`gnome_command_domtrans_gkeyringd', `
4ca6e2c
    gen_require(`
4ca6e2c
        type gkeyringd_exec_t;
4ca6e2c
    ')
4ca6e2c
4ca6e2c
    allow $2 gkeyringd_exec_t:file entrypoint;
4ca6e2c
    domain_transition_pattern($1, gkeyringd_exec_t, $2)
4ca6e2c
    type_transition $1 gkeyringd_exec_t:process $2;
4ca6e2c
')