commit: 82dbbae293b2fe9a7a5f85590ea17dc1916ee529 Author: Dave Sugar <dsugar <AT> tresys <DOT> com> AuthorDate: Thu Jan 28 22:13:57 2021 +0000 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> CommitDate: Mon Feb 1 01:21:42 2021 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=82dbbae2
Work with xdg module disabled These two cases I see when building on a system without graphical interface. Move userdom_xdg_user_template into optional block gpg module doesn't require a graphical front end, move xdg_read_data_files into optional block Signed-off-by: Dave Sugar <dsugar <AT> tresys.com> Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org> policy/modules/apps/gpg.te | 6 ++++-- policy/modules/system/userdomain.if | 8 +++++--- 2 files changed, 9 insertions(+), 5 deletions(-) diff --git a/policy/modules/apps/gpg.te b/policy/modules/apps/gpg.te index cfdb685a..376e1a9f 100644 --- a/policy/modules/apps/gpg.te +++ b/policy/modules/apps/gpg.te @@ -359,8 +359,6 @@ miscfiles_read_localization(gpg_pinentry_t) userdom_use_user_terminals(gpg_pinentry_t) -xdg_read_data_files(gpg_pinentry_t) - tunable_policy(`use_nfs_home_dirs',` fs_read_nfs_files(gpg_pinentry_t) ') @@ -382,6 +380,10 @@ optional_policy(` pulseaudio_run(gpg_pinentry_t, gpg_pinentry_roles) ') +optional_policy(` + xdg_read_data_files(gpg_pinentry_t) +') + optional_policy(` xserver_user_x_domain_template(gpg_pinentry, gpg_pinentry_t, gpg_pinentry_tmpfs_t) ') diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if index 01135696..e14bdc01 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -1194,9 +1194,6 @@ template(`userdom_unpriv_user_template', ` fs_exec_noxattr($1_t) ') - # Allow users to manage xdg content in their home directories - userdom_xdg_user_template($1) - # Allow users to run TCP servers (bind to ports and accept connection from # the same domain and outside users) disabling this forces FTP passive mode # and may change other protocols @@ -1239,6 +1236,11 @@ template(`userdom_unpriv_user_template', ` systemd_write_inherited_logind_inhibit_pipes($1_t) ') + # Allow users to manage xdg content in their home directories + optional_policy(` + userdom_xdg_user_template($1) + ') + # Allow controlling usbguard optional_policy(` tunable_policy(`usbguard_user_modify_rule_files',`