# Declarations
#
+## <desc>
+## <p>
+## Allow colord domain to connect to the network using TCP.
+## </p>
+## </desc>
+gen_tunable(colord_can_network_connect, false)
+
type colord_t;
type colord_exec_t;
dbus_system_domain(colord_t, colord_exec_t)
allow colord_t self:process signal;
allow colord_t self:fifo_file rw_fifo_file_perms;
allow colord_t self:netlink_kobject_uevent_socket create_socket_perms;
+allow colord_t self:tcp_socket create_stream_socket_perms;
allow colord_t self:udp_socket create_socket_perms;
allow colord_t self:unix_dgram_socket create_socket_perms;
userdom_home_reader(colord_t)
+tunable_policy(`colord_can_network_connect',`
+ corenet_tcp_connect_all_ports(colord_t)
+')
+
+tunable_policy(`use_nfs_home_dirs',`
+ fs_getattr_nfs(colord_t)
+ fs_read_nfs_files(colord_t)
+')
+
+tunable_policy(`use_samba_home_dirs',`
+ fs_getattr_cifs(colord_t)
+ fs_read_cifs_files(colord_t)
+')
+>>>>>>> 5034724... Add colord_can_network_connect boolean
+
optional_policy(`
cups_read_config(colord_t)
cups_read_rw_config(colord_t)