summaryrefslogtreecommitdiffstats
path: root/src/mountfsd/io.systemd.mount-file-system.policy
blob: 6a151eb437476986cee09b8fcdd41b68f32ee907 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
<?xml version="1.0" encoding="UTF-8"?> <!--*-nxml-*-->
<!DOCTYPE policyconfig PUBLIC "-//freedesktop//DTD PolicyKit Policy Configuration 1.0//EN"
        "https://www.freedesktop.org/standards/PolicyKit/1/policyconfig.dtd">

<!--
  SPDX-License-Identifier: LGPL-2.1-or-later

  This file is part of systemd.

  systemd is free software; you can redistribute it and/or modify it
  under the terms of the GNU Lesser General Public License as published by
  the Free Software Foundation; either version 2.1 of the License, or
  (at your option) any later version.
-->

<policyconfig>

        <vendor>The systemd Project</vendor>
        <vendor_url>https://systemd.io</vendor_url>

        <!-- Allow mounting DDIs into the host user namespace -->
        <action id="io.systemd.mount-file-system.mount-image">
                <!-- This action is generally checked first: we'll first try to mount the image with
                     signature checks on. If that fails, we'll retry with the untrusted action below. -->
                <description gettext-domain="systemd">Allow mounting of file system image</description>
                <message gettext-domain="systemd">Authentication is required for an application to mount a file system image.</message>
                <defaults>
                        <allow_any>auth_admin_keep</allow_any>
                        <allow_inactive>auth_admin_keep</allow_inactive>
                        <allow_active>yes</allow_active>
                </defaults>
        </action>

        <action id="io.systemd.mount-file-system.mount-untrusted-image">
                <!-- If the image cannot be mounted via the regular action because it is not signed by a
                     recognized key, we'll try this action. -->
                <description gettext-domain="systemd">Allow mounting of untrusted file system image</description>
                <message gettext-domain="systemd">Authentication is required for an application to mount a cryptographically unsigned file system image or an image whose cryptographic signature is not recognized.</message>
                <defaults>
                        <allow_any>auth_admin</allow_any>
                        <allow_inactive>auth_admin</allow_inactive>
                        <allow_active>auth_admin</allow_active>
                </defaults>

                <annotate key="org.freedesktop.policykit.imply">io.systemd.mount-file-system.mount-image</annotate>
        </action>

        <!-- Allow mounting DDIs into a private user namespace -->
        <action id="io.systemd.mount-file-system.mount-image-privately">
                <description gettext-domain="systemd">Allow private mounting of trusted file system image</description>
                <message gettext-domain="systemd">Authentication is required for an application to privately mount a file system image or an image whose cryptographic signature is recognized.</message>
                <defaults>
                        <allow_any>yes</allow_any>
                        <allow_inactive>yes</allow_inactive>
                        <allow_active>yes</allow_active>
                </defaults>
        </action>

        <action id="io.systemd.mount-file-system.mount-untrusted-image-privately">
                <description gettext-domain="systemd">Allow private mounting of untrusted file system image</description>
                <message gettext-domain="systemd">Authentication is required for an application to privately mount a cryptographically unsigned file system image or an image whose cryptographic signature is not recognized.</message>
                <defaults>
                        <allow_any>auth_admin</allow_any>
                        <allow_inactive>auth_admin</allow_inactive>
                        <allow_active>auth_admin</allow_active>
                </defaults>

                <annotate key="org.freedesktop.policykit.imply">io.systemd.mount-file-system.mount-image-privately</annotate>
        </action>
</policyconfig>