Blob Blame History Raw
## <summary>GNU network object model environment.</summary>

########################################
## <summary>
##	Role access for gnome.  (Deprecated)
## </summary>
## <param name="role">
##	<summary>
##	Role allowed access.
##	</summary>
## </param>
## <param name="domain">
##	<summary>
##	User domain for the role.
##	</summary>
## </param>
#
interface(`gnome_role',`
	refpolicywarn(`$0($*) has been deprecated, use gnome_role_gconfd() instead.')
	gnome_role_gconfd($1, $2)
')

########################################
## <summary>
##	Role access for gconfd.
## </summary>
## <param name="role">
##	<summary>
##	Role allowed access.
##	</summary>
## </param>
## <param name="domain">
##	<summary>
##	User domain for the role.
##	</summary>
## </param>
#
interface(`gnome_role_gconfd',`
	gen_require(`
		attribute_role gconfd_roles;
		type gconfd_t, gconfd_exec_t, gconf_tmp_t;
		type gconf_home_t;
	')

	########################################
	#
	# Declarations
	#

	roleattribute $1 gconfd_roles;

	########################################
	#
	# Policy
	#

	domtrans_pattern($2, gconfd_exec_t, gconfd_t)

	allow $2 { gconf_home_t gconf_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
	allow $2 { gconf_home_t gconf_tmp_t }:file { manage_file_perms relabel_file_perms };
	userdom_user_home_dir_filetrans($2, gconf_home_t, dir, ".gconf")
	userdom_user_home_dir_filetrans($2, gconf_home_t, dir, ".gconfd")

	allow $2 gconfd_t:process { ptrace signal_perms };
	ps_process_pattern($2, gconfd_t)
')

#######################################
## <summary>
##	The role template for gnome keyringd.
## </summary>
## <param name="role_prefix">
##	<summary>
##	The prefix of the user domain (e.g., user
##	is the prefix for user_t).
##	</summary>
## </param>
## <param name="user_role">
##	<summary>
##	The role associated with the user domain.
##	</summary>
## </param>
## <param name="user_domain">
##	<summary>
##	The type of the user domain.
##	</summary>
## </param>
#
template(`gnome_role_template_gkeyringd',`
	gen_require(`
		attribute gnomedomain, gkeyringd_domain;
		type gkeyringd_exec_t, gnome_keyring_home_t, gnome_keyring_tmp_t;
	')

	########################################
	#
	# Declarations
	#

	type $1_gkeyringd_t, gnomedomain, gkeyringd_domain;
	userdom_user_application_domain($1_gkeyringd_t, gkeyringd_exec_t)
	domain_user_exemption_target($1_gkeyringd_t)

	role $2 types $1_gkeyringd_t;

	########################################
	#
	# Policy
	#

	domtrans_pattern($3, gkeyringd_exec_t, $1_gkeyringd_t)

	allow $3 { gnome_home_t gnome_keyring_home_t gnome_keyring_tmp_t }:dir { relabel_dir_perms manage_dir_perms };
	allow $3 { gnome_home_t gnome_keyring_home_t }:file { relabel_file_perms manage_file_perms };

	userdom_user_home_dir_filetrans($3, gnome_home_t, dir, ".gnome")
	userdom_user_home_dir_filetrans($3, gnome_home_t, dir, ".gnome2")
	userdom_user_home_dir_filetrans($3, gnome_home_t, dir, ".gnome2_private")
	
	gnome_home_filetrans($3, gnome_keyring_home_t, dir, "keyrings")

	allow $3 gnome_keyring_tmp_t:sock_file { relabel_sock_file_perms manage_sock_file_perms };

	ps_process_pattern($3, $1_gkeyringd_t)
	allow $3 $1_gkeyringd_t:process { ptrace signal_perms };

	corecmd_bin_domtrans($1_gkeyringd_t, $3)
	corecmd_shell_domtrans($1_gkeyringd_t, $3)

	gnome_stream_connect_gkeyringd($1, $3)

	optional_policy(`
		dbus_spec_session_domain($1, gkeyringd_exec_t, $1_gkeyringd_t)

		gnome_dbus_chat_gkeyringd($1, $3)
	')
')

########################################
## <summary>
##	Execute gconf in the caller domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_exec_gconf',`
	gen_require(`
		type gconfd_exec_t;
	')

	corecmd_search_bin($1)
	can_exec($1, gconfd_exec_t)
')

########################################
## <summary>
##	Read gconf configuration content.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_read_gconf_config',`
	gen_require(`
		type gconf_etc_t;
	')

	files_search_etc($1)
	allow $1 gconf_etc_t:dir list_dir_perms;
	allow $1 gconf_etc_t:file read_file_perms;
	allow $1 gconf_etc_t:lnk_file read_lnk_file_perms;
')

########################################
## <summary>
##	Do not audit attempts to read
##	inherited gconf configuration files.
## </summary>
## <param name="domain">
##	<summary>
##	Domain to not audit.
##	</summary>
## </param>
#
interface(`gnome_dontaudit_read_inherited_gconf_config_files',`
	gen_require(`
		type gconf_etc_t;
	')

	dontaudit $1 gconf_etc_t:file read;
')

#######################################
## <summary>
##	Create, read, write, and delete
##	gconf configuration content.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_manage_gconf_config',`
	gen_require(`
		type gconf_etc_t;
	')

	files_search_etc($1)
	allow $1 gconf_etc_t:dir manage_dir_perms;
	allow $1 gconf_etc_t:file manage_file_perms;
	allow $1 gconf_etc_t:lnk_file manage_lnk_file_perms;
')

########################################
## <summary>
##	Connect to gconf using a unix
##	domain stream socket.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_stream_connect_gconf',`
	gen_require(`
		type gconfd_t, gconf_tmp_t;
	')

	files_search_tmp($1)
	stream_connect_pattern($1, gconf_tmp_t, gconf_tmp_t, gconfd_t)
')

########################################
## <summary>
##	Run gconfd in gconfd domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed to transition.
##	</summary>
## </param>
#
interface(`gnome_domtrans_gconfd',`
	gen_require(`
		type gconfd_t, gconfd_exec_t;
	')

	corecmd_search_bin($1)
	domtrans_pattern($1, gconfd_exec_t, gconfd_t)
')

########################################
## <summary>
##	Create generic gnome home directories.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_create_generic_home_dirs',`
	gen_require(`
		type gnome_home_t;
	')

	allow $1 gnome_home_t:dir create_dir_perms;
')

########################################
## <summary>
##	Set attributes of generic gnome
##	user home directories.  (Deprecated)
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_setattr_config_dirs',`
	refpolicywarn(`$0($*) has been deprecated, use gnome_setattr_generic_home_dirs() instead.')
	gnome_setattr_generic_home_dirs($1)
')

########################################
## <summary>
##	Set attributes of generic gnome
##	user home directories.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_setattr_generic_home_dirs',`
	gen_require(`
		type gnome_home_t;
	')

	userdom_search_user_home_dirs($1)
	setattr_dirs_pattern($1, gnome_home_t, gnome_home_t)
')

########################################
## <summary>
##	Read generic gnome user home content.  (Deprecated)
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_read_config',`
	refpolicywarn(`$0($*) has been deprecated, use gnome_read_generic_home_content() instead.')
	gnome_read_generic_home_content($1)
')

########################################
## <summary>
##	Read generic gnome home content.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_read_generic_home_content',`
	gen_require(`
		type gnome_home_t;
	')

	userdom_search_user_home_dirs($1)
	allow $1 gnome_home_t:dir list_dir_perms;
	allow $1 gnome_home_t:file read_file_perms;
	allow $1 gnome_home_t:fifo_file read_fifo_file_perms;
	allow $1 gnome_home_t:lnk_file read_lnk_file_perms;
	allow $1 gnome_home_t:sock_file read_sock_file_perms;
')

########################################
## <summary>
##	Create, read, write, and delete
##	generic gnome user home content.  (Deprecated)
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_manage_config',`
	refpolicywarn(`$0($*) has been deprecated, use gnome_manage_generic_home_content() instead.')
	gnome_manage_generic_home_content($1)
')

########################################
## <summary>
##	Create, read, write, and delete
##	generic gnome home content.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_manage_generic_home_content',`
	gen_require(`
		type gnome_home_t;
	')

	userdom_search_user_home_dirs($1)
	allow $1 gnome_home_t:dir manage_dir_perms;
	allow $1 gnome_home_t:file manage_file_perms;
	allow $1 gnome_home_t:fifo_file manage_fifo_file_perms;
	allow $1 gnome_home_t:lnk_file manage_lnk_file_perms;
	allow $1 gnome_home_t:sock_file manage_sock_file_perms;
')

########################################
## <summary>
##	Search generic gnome home directories.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_search_generic_home',`
	gen_require(`
		type gnome_home_t;
	')

	userdom_search_user_home_dirs($1)
	allow $1 gnome_home_t:dir search_dir_perms;
')

########################################
## <summary>
##	Create objects in gnome user home
##	directories with a private type.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
## <param name="private_type">
##	<summary>
##	Private file type.
##	</summary>
## </param>
## <param name="object_class">
##	<summary>
##	Class of the object being created.
##	</summary>
## </param>
## <param name="name" optional="true">
##	<summary>
##	The name of the object being created.
##	</summary>
## </param>
#
interface(`gnome_home_filetrans',`
	gen_require(`
		type gnome_home_t;
	')

	userdom_search_user_home_dirs($1)
	filetrans_pattern($1, gnome_home_t, $2, $3, $4)
')

########################################
## <summary>
##	Create generic gconf home directories.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_create_generic_gconf_home_dirs',`
	gen_require(`
		type gconf_home_t;
	')

	allow $1 gconf_home_t:dir create_dir_perms;
')

########################################
## <summary>
##	Read generic gconf home content.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_read_generic_gconf_home_content',`
	gen_require(`
		type gconf_home_t;
	')

	userdom_search_user_home_dirs($1)
	allow $1 gconf_home_t:dir list_dir_perms;
	allow $1 gconf_home_t:file read_file_perms;
	allow $1 gconf_home_t:fifo_file read_fifo_file_perms;
	allow $1 gconf_home_t:lnk_file read_lnk_file_perms;
	allow $1 gconf_home_t:sock_file read_sock_file_perms;
')

########################################
## <summary>
##	Create, read, write, and delete
##	generic gconf home content.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_manage_generic_gconf_home_content',`
	gen_require(`
		type gconf_home_t;
	')

	userdom_search_user_home_dirs($1)
	allow $1 gconf_home_t:dir manage_dir_perms;
	allow $1 gconf_home_t:file manage_file_perms;
	allow $1 gconf_home_t:fifo_file manage_fifo_file_perms;
	allow $1 gconf_home_t:lnk_file manage_lnk_file_perms;
	allow $1 gconf_home_t:sock_file manage_sock_file_perms;
')

########################################
## <summary>
##	Search generic gconf home directories.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_search_generic_gconf_home',`
	gen_require(`
		type gconf_home_t;
	')

	userdom_search_user_home_dirs($1)
	allow $1 gconf_home_t:dir search_dir_perms;
')

########################################
## <summary>
##	Create objects in user home
##	directories with the generic gconf
##	home type.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
## <param name="object_class">
##	<summary>
##	Class of the object being created.
##	</summary>
## </param>
## <param name="name" optional="true">
##	<summary>
##	The name of the object being created.
##	</summary>
## </param>
#
interface(`gnome_home_filetrans_gconf_home',`
	gen_require(`
		type gconf_home_t;
	')

	userdom_user_home_dir_filetrans($1, gconf_home_t, $2, $3)
')

########################################
## <summary>
##	Create objects in user home
##	directories with the generic gnome
##	home type.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
## <param name="object_class">
##	<summary>
##	Class of the object being created.
##	</summary>
## </param>
## <param name="name" optional="true">
##	<summary>
##	The name of the object being created.
##	</summary>
## </param>
#
interface(`gnome_home_filetrans_gnome_home',`
	gen_require(`
		type gnome_home_t;
	')

	userdom_user_home_dir_filetrans($1, gnome_home_t, $2, $3)
')

########################################
## <summary>
##	Create objects in gnome gconf home
##	directories with a private type.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
## <param name="private_type">
##	<summary>
##	Private file type.
##	</summary>
## </param>
## <param name="object_class">
##	<summary>
##	Class of the object being created.
##	</summary>
## </param>
## <param name="name" optional="true">
##	<summary>
##	The name of the object being created.
##	</summary>
## </param>
#
interface(`gnome_gconf_home_filetrans',`
	gen_require(`
		type gconf_home_t;
	')

	userdom_search_user_home_dirs($1)
	filetrans_pattern($1, gconf_home_t, $2, $3, $4)
')

########################################
## <summary>
##	Read generic gnome keyring home files.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_read_keyring_home_files',`
	gen_require(`
		type gnome_home_t, gnome_keyring_home_t;
	')

	userdom_search_user_home_dirs($1)
	read_files_pattern($1, { gnome_home_t gnome_keyring_home_t }, gnome_keyring_home_t)
')

########################################
## <summary>
##	Send and receive messages from
##	gnome keyring daemon over dbus.
## </summary>
## <param name="role_prefix">
##	<summary>
##	The prefix of the user domain (e.g., user
##	is the prefix for user_t).
##	</summary>
## </param>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_dbus_chat_gkeyringd',`
	gen_require(`
		type $1_gkeyringd_t;
		class dbus send_msg;
	')

	allow $2 $1_gkeyringd_t:dbus send_msg;
	allow $1_gkeyringd_t $2:dbus send_msg;
')

########################################
## <summary>
##	Send and receive messages from all
##	gnome keyring daemon over dbus.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_dbus_chat_all_gkeyringd',`
	gen_require(`
		attribute gkeyringd_domain;
		class dbus send_msg;
	')

	allow $1 gkeyringd_domain:dbus send_msg;
	allow gkeyringd_domain $1:dbus send_msg;
')

########################################
## <summary>
##	Connect to gnome keyring daemon
##	with a unix stream socket.
## </summary>
## <param name="role_prefix">
##	<summary>
##	The prefix of the user domain (e.g., user
##	is the prefix for user_t).
##	</summary>
## </param>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_stream_connect_gkeyringd',`
	gen_require(`
		type $1_gkeyringd_t, gnome_keyring_tmp_t;
	')

	files_search_tmp($2)
	stream_connect_pattern($2, gnome_keyring_tmp_t, gnome_keyring_tmp_t, $1_gkeyringd_t)
')

########################################
## <summary>
##	Connect to all gnome keyring daemon
##	with a unix stream socket.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`gnome_stream_connect_all_gkeyringd',`
	gen_require(`
		attribute gkeyringd_domain;
		type gnome_keyring_tmp_t;
	')

	files_search_tmp($1)
	stream_connect_pattern($1, gnome_keyring_tmp_t, gnome_keyring_tmp_t, gkeyringd_domain)
')