Policy for GNU Privacy Guard and related programs.
false
Determine whether GPG agent can manage generic user home content files. This is required by the --write-env-file option.
false
Determine whether GPG agent can use OpenPGP cards or Yubikeys over USB
false
Grant the gpg domains manage rights on all user content
false
Grant the gpg domains manage rights on generic user content
false
Grant the gpg domains read access to all user content
true
Grant the gpg domains read access to generic user content
filetrans in gpg_agent_tmp_t dirs
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
Type to which the created node will be transitioned. |
class |
Object class(es) (single or set including {}) for which this the transition will occur. |
name |
The name of the object being created. |
unlink gpg_agent_tmp_t sock_file
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute the gpg in the gpg domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed to transition. |
Do not audit attempts to execute the gpg-agent.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search gpg user secrets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Transition to $2_gpg_agent_t from another domain via gpg_agent_exec_t
Parameter: | Description: |
---|---|
domain |
source domain |
domain |
base of target domain |
Make gpg executable files an entrypoint for the specified domain.
Parameter: | Description: |
---|---|
domain |
The domain for which gpg_exec_t is an entrypoint. |
Execute the gpg in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute the gpg-agent in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List gpg user secrets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send messages to and from gpg pinentry over DBUS.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
filetrans in gpg_runtime_t dirs
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
Type to which the created node will be transitioned. |
class |
Object class(es) (single or set including {}) for which this the transition will occur. |
name |
The name of the object being created. |
Read and write gpg agent pipes.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search gpg agent dirs.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
filetrans in gpg_secret_t dirs
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
Type to which the created node will be transitioned. |
class |
Object class(es) (single or set including {}) for which this the transition will occur. |
name |
The name of the object being created. |
Send generic signals to gpg.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute gpg in a specified domain.
Execute gpg in a specified domain.
No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.
Parameter: | Description: |
---|---|
source_domain |
Domain allowed to transition. |
target_domain |
Domain to transition to. |
Connect to gpg agent socket
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Role access for gpg.
Parameter: | Description: |
---|---|
role_prefix |
The prefix of the user role (e.g., user is the prefix for user_r). |
user_domain |
User domain for the role. |
user_exec_domain |
User exec domain for execute and transition access. |
role |
Role allowed access |