From 19096d0b1c6ffe9ed5021698d13e133c238acfb8 Mon Sep 17 00:00:00 2001 From: Kenton Groombridge Date: Fri, 6 Oct 2023 11:52:34 -0400 Subject: [PATCH] Update generated policy and doc files Signed-off-by: Kenton Groombridge --- doc/policy.xml | 4320 ++++++++++++++++++++++++------------------ policy/booleans.conf | 103 +- policy/modules.conf | 49 + 3 files changed, 2651 insertions(+), 1821 deletions(-) diff --git a/doc/policy.xml b/doc/policy.xml index ec78d3383..e96f1ea28 100644 --- a/doc/policy.xml +++ b/doc/policy.xml @@ -5634,7 +5634,28 @@ The domain for which gpg_exec_t is an entrypoint. - + + +Execute the gpg_agent in the caller domain. + + + +Domain allowed access. + + + + + +Make gpg_agent executable files an +entrypoint for the specified domain. + + + +The domain for which gpg_agent_exec_t is an entrypoint. + + + + Send generic signals to gpg. @@ -5644,7 +5665,7 @@ Domain allowed access. - + Read and write gpg agent pipes. @@ -5654,7 +5675,7 @@ Domain allowed access. - + Connect to gpg agent socket @@ -5664,7 +5685,7 @@ Domain allowed access. - + Search gpg agent dirs. @@ -5674,7 +5695,7 @@ Domain allowed access. - + filetrans in gpg_agent_tmp_t dirs @@ -5700,7 +5721,7 @@ The name of the object being created. - + filetrans in gpg_runtime_t dirs @@ -5726,7 +5747,17 @@ The name of the object being created. - + + +Do not audit attempt to getattr gpg runtime dirs. + + + +Domain to not audit. + + + + filetrans in gpg_secret_t dirs @@ -5752,7 +5783,7 @@ The name of the object being created. - + Send messages to and from gpg pinentry over DBUS. @@ -5763,7 +5794,7 @@ Domain allowed access. - + Do not audit attempts to search gpg user secrets. @@ -5774,7 +5805,7 @@ Domain to not audit. - + List gpg user secrets. @@ -5784,6 +5815,16 @@ Domain allowed access. + + +Do not audit attempt to search gpg user secrets dirs. + + + +Domain to not audit. + + +

@@ -7384,6 +7425,14 @@ writable memory

+ + +

+Determine whether pulseaudio +can use the network. +

+
+
QEMU machine emulator and virtualizer. @@ -8618,7 +8667,7 @@ Role allowed access - + Execute wm in the caller domain. @@ -8628,7 +8677,7 @@ Domain allowed access. -