## Policy framework for controlling privileges for system-wide services. ######################################## ## ## Send and receive messages from ## policykit over dbus. ## ## ## ## Domain allowed access. ## ## # interface(`policykit_dbus_chat',` gen_require(` type policykit_t; class dbus send_msg; ') allow $1 policykit_t:dbus send_msg; allow policykit_t $1:dbus send_msg; ') ######################################## ## ## Send and receive messages from ## policykit auth over dbus. ## ## ## ## Domain allowed access. ## ## # interface(`policykit_dbus_chat_auth',` gen_require(` type policykit_auth_t; class dbus send_msg; ') allow $1 policykit_auth_t:dbus send_msg; allow policykit_auth_t $1:dbus send_msg; ') ######################################## ## ## Execute a domain transition to run polkit_auth. ## ## ## ## Domain allowed to transition. ## ## # interface(`policykit_domtrans_auth',` gen_require(` type policykit_auth_t, policykit_auth_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, policykit_auth_exec_t, policykit_auth_t) ') ######################################## ## ## Execute a policy_auth in the policy ## auth domain, and allow the specified ## role the policy auth domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## # interface(`policykit_run_auth',` gen_require(` attribute_role policykit_auth_roles; ') policykit_domtrans_auth($1) roleattribute $2 policykit_auth_roles; ') ####################################### ## ## Send generic signals to ## policykit auth. ## ## ## ## Domain allowed access. ## ## # interface(`policykit_signal_auth',` gen_require(` type policykit_auth_t; ') allow $1 policykit_auth_t:process signal; ') ######################################## ## ## Execute a domain transition to run polkit grant. ## ## ## ## Domain allowed to transition. ## ## # interface(`policykit_domtrans_grant',` gen_require(` type policykit_grant_t, policykit_grant_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, policykit_grant_exec_t, policykit_grant_t) ') ######################################## ## ## Execute a policy_grant in the policy ## grant domain, and allow the specified ## role the policy grant domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## ## # interface(`policykit_run_grant',` gen_require(` attribute_role policykit_grant_roles; ') policykit_domtrans_grant($1) roleattribute $2 policykit_grant_roles; ') ######################################## ## ## Read policykit reload files. ## ## ## ## Domain allowed access. ## ## # interface(`policykit_read_reload',` gen_require(` type policykit_reload_t; ') files_search_var_lib($1) read_files_pattern($1, policykit_reload_t, policykit_reload_t) ') ######################################## ## ## Read and write policykit reload files. ## ## ## ## Domain allowed access. ## ## # interface(`policykit_rw_reload',` gen_require(` type policykit_reload_t; ') files_search_var_lib($1) rw_files_pattern($1, policykit_reload_t, policykit_reload_t) ') ######################################## ## ## Execute a domain transition to run polkit resolve. ## ## ## ## Domain allowed to transition. ## ## # interface(`policykit_domtrans_resolve',` gen_require(` type policykit_resolve_t, policykit_resolve_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, policykit_resolve_exec_t, policykit_resolve_t) ') ######################################## ## ## Search policykit lib directories. ## ## ## ## Domain allowed access. ## ## # interface(`policykit_search_lib',` gen_require(` type policykit_var_lib_t; ') files_search_var_lib($1) allow $1 policykit_var_lib_t:dir search_dir_perms; ') ######################################## ## ## Read policykit lib files. ## ## ## ## Domain allowed access. ## ## # interface(`policykit_read_lib',` gen_require(` type policykit_var_lib_t; ') files_search_var_lib($1) read_files_pattern($1, policykit_var_lib_t, policykit_var_lib_t) ')