auth_read_login_records($1_usertype)
auth_run_pam($1_t,$1_r)
auth_run_utempter($1_t,$1_r)
+ auth_filetrans_admin_home_content($1_t)
+ auth_filetrans_home_content($1_t)
init_read_utmp($1_usertype)
canna_stream_connect($1_usertype)
')
- optional_policy(`
- chrome_role($1_r, $1_usertype)
- ')
-
optional_policy(`
colord_read_lib_files($1_usertype)
')
devicekit_dbus_chat_disk($1_usertype)
')
- optional_policy(`
- evolution_dbus_chat($1_usertype)
- evolution_alarm_dbus_chat($1_usertype)
- ')
-
optional_policy(`
gnome_dbus_chat_gconfdefault($1_usertype)
')
mta_filetrans_home_content($1_usertype)
')
- optional_policy(`
- nsplugin_role($1_r, $1_usertype)
- ')
-
optional_policy(`
tunable_policy(`allow_user_mysql_connect',`
mysql_stream_connect($1_t)
optional_policy(`
slrnpull_search_spool($1_usertype)
')
-
- optional_policy(`
- thumb_role($1_r, $1_usertype)
- ')
')
#######################################
optional_policy(`
gnome_read_usr_config($1_usertype)
gnome_role_gkeyringd($1, $1_r, $1_usertype)
- # cjp: telepathy F15 bugs
- telepathy_role($1_r, $1_t, $1)
')
optional_policy(`
cron_role($1_r, $1_t)
')
- optional_policy(`
- games_rw_data($1_usertype)
- ')
-
optional_policy(`
gpg_role($1_r, $1_usertype)
')
ubac_constrained($2)
')
+#######################################
+## <summary>
+## Define this type as a Allow apps to set rlimits on userdomain
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <param name="userdomain_prefix">
+## <summary>
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+## </summary>
+## </param>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+template(`userdom_unpriv_type',`
+ gen_require(`
+ attribute unpriv_userdomain, userdomain;
+ ')
+ typeattribute $2 unpriv_userdomain;
+ typeattribute $2 userdomain;
+
+ auth_use_nsswitch($2)
+ ubac_constrained($2)
+')
+
########################################
## <summary>
## Connect to users over an unix stream socket.
read_files_pattern($1, admin_home_t, admin_home_t)
')
+########################################
+## <summary>
+## Delete admin home files.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <rolecap/>
+#
+interface(`userdom_delete_admin_home_files',`
+ gen_require(`
+ type admin_home_t;
+ ')
+
+ allow $1 admin_home_t:file delete_file_perms;
+')
+
########################################
## <summary>
## Execute admin home files.
typeattribute $1 userdom_home_manager_type;
')
-