# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2018-2022 Mikhail Morfikov
# Copyright (C) 2021-2024 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only

abi <abi/4.0>,

include <tunables/global>

@{exec_path} = @{lib}/polkit-[0-9]/polkit-agent-helper-[0-9]
@{exec_path} += @{lib}/polkit-agent-helper-[0-9]
profile polkit-agent-helper /{{,usr/}lib{,exec,32,64}/polkit-[0-9]/polkit-agent-helper-[0-9],{,usr/}lib{,exec,32,64}/polkit-agent-helper-[0-9]} flags=(complain) {
  include <abstractions/base>
  include <abstractions/authentication>
  include <abstractions/bus-system>
  include <abstractions/consoles>
  include <abstractions/nameservice-strict>

  capability audit_write,
  capability dac_override,
  capability net_admin,
  capability setgid,
  capability setuid,
  capability sys_nice,

  network netlink raw,

  signal (receive) set=(term, kill) peer=gnome-shell,
  signal (receive) set=(term, kill) peer=pkexec,
  signal (receive) set=(term, kill) peer=pkttyagent,
  signal (receive) set=(term, kill) peer=polkit-*-authentication-agent,

  dbus send bus=system path=/org/freedesktop/PolicyKit1/Authority
       interface=org.freedesktop.DBus.Properties
       member=GetAll
       peer=(name=:*, label=polkitd),

  dbus send bus=system path=/org/freedesktop/PolicyKit1/Authority
       interface=org.freedesktop.PolicyKit1.Authority
       member=AuthenticationAgentResponse2
       peer=(name=:*, label=polkitd),

  @{exec_path} mr,

  owner @{HOME}/.xsession-errors w,

  @{run}/faillock/[a-zA-z0-9]* rwk,

        @{PROC}/1/cgroup r,
  owner @{PROC}/@{pid}/cgroup r,
  owner @{PROC}/@{pid}/loginuid r,

  owner /dev/tty@{int} rw,

  include if exists <local/polkit-agent-helper>
}
