## Common UNIX printing system ######################################## ## ## Execute cups in the cups domain. ## ## ## ## The type of the process performing this action. ## ## # interface(`cups_domtrans',` gen_require(` type cupsd_t, cupsd_exec_t; ') domain_auto_trans($1,cupsd_exec_t,cupsd_t) allow $1 cupsd_t:fd use; allow cupsd_t $1:fd use; allow cupsd_t $1:fifo_file rw_file_perms; allow cupsd_t $1:process sigchld; ') ######################################## ## ## Connect to cupsd over an unix domain stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`cups_stream_connect',` gen_require(` type cupsd_t, cupsd_var_run_t; ') files_search_pids($1) allow $1 cupsd_var_run_t:dir search; allow $1 cupsd_var_run_t:sock_file { getattr write }; allow $1 cupsd_t:unix_stream_socket connectto; ') ######################################## ## ## Connect to cups over TCP. (Deprecated) ## ## ## ## Domain allowed access. ## ## # interface(`cups_tcp_connect',` refpolicywarn(`$0($*) has been deprecated.') ') ######################################## ## ## Send and receive messages from ## cups over dbus. ## ## ## ## Domain allowed access. ## ## # interface(`cups_dbus_chat',` gen_require(` type cupsd_t; class dbus send_msg; ') allow $1 cupsd_t:dbus send_msg; allow cupsd_t $1:dbus send_msg; ') ######################################## ## ## Read cups PID files. ## ## ## ## Domain allowed access. ## ## # interface(`cups_read_pid_files',` gen_require(` type cupsd_var_run_t; ') files_search_pids($1) allow $1 cupsd_var_run_t:file r_file_perms; ') ######################################## ## ## Execute cups_config in the cups_config domain. ## ## ## ## The type of the process performing this action. ## ## # interface(`cups_domtrans_config',` gen_require(` type cupsd_config_t, cupsd_config_exec_t; ') domain_auto_trans($1,cupsd_config_exec_t,cupsd_config_t) allow $1 cupsd_config_t:fd use; allow cupsd_config_t $1:fd use; allow cupsd_config_t $1:fifo_file rw_file_perms; allow cupsd_config_t $1:process sigchld; ') ######################################## ## ## Send generic signals to the cups ## configuration daemon. ## ## ## ## Domain allowed access. ## ## # interface(`cups_signal_config',` gen_require(` type cupsd_config_t; ') allow $1 cupsd_config_t:process signal; ') ######################################## ## ## Send and receive messages from ## cupsd_config over dbus. ## ## ## ## Domain allowed access. ## ## # interface(`cups_dbus_chat_config',` gen_require(` type cupsd_config_t; class dbus send_msg; ') allow $1 cupsd_config_t:dbus send_msg; allow cupsd_config_t $1:dbus send_msg; ') ######################################## ## ## Read cups configuration files. ## ## ## ## Domain allowed access. ## ## ## # interface(`cups_read_config',` gen_require(` type cupsd_etc_t, cupsd_rw_etc_t; ') files_search_etc($1) allow $1 cupsd_etc_t:dir search_dir_perms; allow $1 cupsd_etc_t:file { getattr read }; allow $1 cupsd_rw_etc_t:file { getattr read }; ') ######################################## ## ## Read cups-writable configuration files. ## ## ## ## Domain allowed access. ## ## ## # interface(`cups_read_rw_config',` gen_require(` type cupsd_etc_t, cupsd_rw_etc_t; ') files_search_etc($1) allow $1 cupsd_etc_t:dir search_dir_perms; allow $1 cupsd_rw_etc_t:file { getattr read }; ') ######################################## ## ## Read cups log files. ## ## ## ## Domain allowed access. ## ## ## # interface(`cups_read_log',` gen_require(` type cupsd_log_t; ') logging_search_logs($1) allow $1 cupsd_log_t:file { getattr read }; ') ######################################## ## ## Write cups log files. ## ## ## ## Domain allowed access. ## ## # interface(`cups_write_log',` gen_require(` type cupsd_log_t; ') logging_search_logs($1) allow $1 cupsd_log_t:file write; ') ######################################## ## ## Connect to ptal over an unix domain stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`cups_stream_connect_ptal',` gen_require(` type ptal_t, ptal_var_run_t; ') files_search_pids($1) allow $1 ptal_var_run_t:dir search; allow $1 ptal_var_run_t:sock_file write; allow $1 ptal_t:unix_stream_socket connectto; ')