# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2017-2022 Mikhail Morfikov
# Copyright (C) 2021-2024 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only

abi <abi/4.0>,

include <tunables/global>

@{exec_path} = @{bin}/gpg-agent
@{att} = ""
profile gpg-agent /{,usr/}bin/gpg-agent flags=(complain) {
  include <abstractions/base-strict>
  include <abstractions/consoles>
  include <abstractions/nameservice-strict>

  signal (receive) peer=pinentry-*,
  signal (receive) peer=scdaemon,

  @{exec_path} mr,

  @{bin}/pinentry{,-*}  rpx,
  @{bin}/scdaemon       rpx,
  @{lib}/{,gnupg/}scdaemon rpx,

  /usr/share/gnupg/* r,

  owner @{HOME}/@{XDG_GPG_DIR}/ rw,
  owner @{HOME}/@{XDG_GPG_DIR}/*.conf r,
  owner @{HOME}/@{XDG_GPG_DIR}/private-keys-v1.d/ rw,
  owner @{HOME}/@{XDG_GPG_DIR}/private-keys-v1.d/@{hex}.key{,.tmp} rw,
  owner @{HOME}/@{XDG_GPG_DIR}/{,d.@{rand}/}S.gpg-agent{,.ssh,.browser,.extra} rw,
  owner @{HOME}/@{XDG_GPG_DIR}/sshcontrol r,

  owner @{MOUNTS}/{,/*}/@{XDG_GPG_DIR}/ rw,
  owner @{MOUNTS}/{,/*}/@{XDG_GPG_DIR}/*.conf r,
  owner @{MOUNTS}/{,/*}/@{XDG_GPG_DIR}/private-keys-v1.d/ rw,
  owner @{MOUNTS}/{,/*}/@{XDG_GPG_DIR}/private-keys-v1.d/@{hex}.key{,.tmp} rw,
  owner @{MOUNTS}/{,/*}/@{XDG_GPG_DIR}/{,d.@{rand}/}S.gpg-agent{,.ssh,.browser,.extra} rw,
  owner @{MOUNTS}/{,/*}/@{XDG_GPG_DIR}/sshcontrol r,

  owner @{user_projects_dirs}/**/{.,}gnupg/ rw,
  owner @{user_projects_dirs}/**/{.,}gnupg/*.conf r,
  owner @{user_projects_dirs}/**/{.,}gnupg/private-keys-v1.d/ rw,
  owner @{user_projects_dirs}/**/{.,}gnupg/private-keys-v1.d/@{hex}.key{,.tmp} rw,
  owner @{user_projects_dirs}/**/{.,}gnupg/{,d.@{rand}/}S.gpg-agent{,.ssh,.browser,.extra} rw,
  owner @{user_projects_dirs}/**/{.,}gnupg/sshcontrol r,

  owner @{run}/user/@{uid}/gnupg/ rw,
  owner @{run}/user/@{uid}/gnupg/*.conf r,
  owner @{run}/user/@{uid}/gnupg/d.@{rand}/ rw,
  owner @{run}/user/@{uid}/gnupg/d.@{rand}/S.gpg-agent{,.ssh,.browser,.extra} rw,
  owner @{run}/user/@{uid}/gnupg/private-keys-v1.d/ rw,
  owner @{run}/user/@{uid}/gnupg/private-keys-v1.d/@{hex}.key{,.tmp} rw,
  owner @{run}/user/@{uid}/gnupg/S.gpg-agent{,.ssh,.browser,.extra} rw,
  owner @{run}/user/@{uid}/gnupg/sshcontrol r,

  owner @{tmp}/**/{.,}gnupg/ rw,
  owner @{tmp}/**/{.,}gnupg/*.conf r,
  owner @{tmp}/**/{.,}gnupg/private-keys-v1.d/ rw,
  owner @{tmp}/**/{.,}gnupg/private-keys-v1.d/@{hex}.key{,.tmp} rw,
  owner @{tmp}/**/{.,}gnupg/{,d.@{rand}/}S.gpg-agent{,.ssh,.browser,.extra} rw,
  owner @{tmp}/**/{.,}gnupg/sshcontrol r,


  owner /etc/pacman.d/gnupg/ rw,
  owner /etc/pacman.d/gnupg/*.conf r,
  owner /etc/pacman.d/gnupg/private-keys-v1.d/ rw,
  owner /etc/pacman.d/gnupg/private-keys-v1.d/@{hex}.key rw,
  owner /etc/pacman.d/gnupg/{,d.@{rand}/}S.gpg-agent{,.ssh,.browser,.extra} rw,
  owner /etc/pacman.d/gnupg/sshcontrol r,

  owner /var/lib/*/.gnupg/ rw,
  owner /var/lib/*/.gnupg/private-keys-v1.d/ rw,
  owner /var/lib/*/.gnupg/private-keys-v1.d/@{hex}.key rw,
  owner /var/lib/*/.gnupg/{,d.@{rand}/}S.gpg-agent{,.ssh,.browser,.extra} rw,
  owner /var/lib/*/.gnupg/sshcontrol r,

  owner /var/lib/*/gnupg/ rw,
  owner /var/lib/*/gnupg/private-keys-v1.d/ rw,
  owner /var/lib/*/gnupg/private-keys-v1.d/@{hex}.key rw,
  owner /var/lib/*/gnupg/{,d.@{rand}/}S.gpg-agent{,.ssh,.browser,.extra} rw,
  owner /var/lib/*/gnupg/sshcontrol r,

  @{PROC}/@{pid}/fd/ r,

  # Silencer
  deny @{bin}/.gnupg/ w,

  # file inherit
  owner /dev/tty@{int} rw,

  include if exists <local/gpg-agent>
}

# vim:syntax=apparmor
