apparmor: Bump to 2.13 and include custom profiles directly on top of defaults

This commit is contained in:
Olivier Mauras 2018-05-09 04:54:15 +00:00
parent 7785ff628f
commit 5390642a48
6 changed files with 212 additions and 12 deletions

View File

@ -0,0 +1,89 @@
# vim:syntax=apparmor
#include <tunables/global>
profile dhcpcd /{usr/,}bin/dhcpcd {
#include <abstractions/base>
#include <abstractions/nameservice>
capability chown,
capability net_admin,
capability net_raw,
capability sys_admin,
network packet dgram,
network inet raw,
network inet6 raw,
/dev/pts/* rw,
/etc/dhcpcd.{conf,duid,secret} r,
/etc/ld.so.cache r,
/etc/udev/udev.conf r,
/proc/*/net/if_inet6 r,
/proc/sys/net/ipv{4,6}/conf/*/* rw,
/{var/,}run/dhcpcd{-*,}.pid rwk,
/{var/,}run/dhcpcd.sock rw,
/{var/,}run/dhcpcd.unpriv.sock rw,
/{var/,}run/udev/data/* r,
/sys/devices/*/*/{*/,}net/*/uevent r,
/sys/devices/virtual/net/*/uevent r,
/{usr/,}bin/dash ix,
/{usr/,}bin/dash mrix,
/usr/lib/dhcpcd/dev/udev.so m,
/usr/lib/ld-*.so m,
/usr/lib/libc-*.so m,
# Transition to a child profile for hooks
/usr/libexec/dhcpcd-run-hooks Cx -> dhcpcd_run_hooks,
/var/db/dhcpcd-*.lease rw,
/var/db/dhcpcd/** rw,
/{usr/,}bin/dhcpcd mrix,
# Child profile for hooks
profile dhcpcd_run_hooks {
#include <abstractions/base>
#include <abstractions/nameservice>
capability sys_admin,
capability sys_tty_config,
/etc/chrony.conf rw,
/etc/ntpd.conf rw,
/etc/resolv.conf rw,
/etc/wpa_supplicant/wpa_supplicant*.conf r,
/{var/,}run/dhcpcd/ rw,
/{var/,}run/dhcpcd/{ntp,resolv}.conf.** rw,
/{var/,}run/dhcpcd/{ntp,resolv}.conf/ rw,
/{var/,}run/dhcpcd/{ntp,resolv}.conf/*.dhcp rw,
/usr/bin/cat mrix,
/usr/bin/chmod mrix,
/usr/bin/cmp mrix,
/usr/bin/dash mr,
/usr/bin/hostname-coreutils mrix,
/usr/bin/mkdir mrix,
/usr/bin/rm mrix,
/usr/bin/sed mrix,
/usr/bin/util-linux-logger mrix,
/usr/bin/wpa_supplicant CUx,
/usr/bin/wpa_cli CUx,
/usr/bin/resolvconf CUx,
/usr/libexec/dhcpcd-hooks/ r,
/usr/libexec/dhcpcd-hooks/* r,
/usr/libexec/dhcpcd-run-hooks r,
/usr/share/dhcpcd/hooks/* r,
}
# Site-specific additions and overrides. See local/README for details.
#include <local/usr.bin.dhcpcd>
}

View File

@ -0,0 +1,19 @@
# vim:syntax=apparmor
#include <tunables/global>
profile ping /{usr/,}bin/iputils-ping {
#include <abstractions/base>
#include <abstractions/consoles>
#include <abstractions/nameservice>
capability net_raw,
capability setuid,
network inet raw,
network inet6 raw,
/{usr/,}bin/iputils-ping mixr,
/etc/modules.conf r,
# Site-specific additions and overrides. See local/README for details.
#include <local/usr.bin.iputils-ping>
}

View File

@ -0,0 +1,34 @@
# vim:syntax=apparmor
# NOTE: This profile will by default work with pfp-fpm on TCP sockets.
# If you need to make use of php-fpm unix socket, add the following to local/usr.bin.nginx
# /path/to/your/unix/socket rw,
#include <tunables/global>
/usr/bin/nginx {
#include <abstractions/base>
#include <abstractions/nameservice>
#include <abstractions/nis>
#include <abstractions/openssl>
capability setgid,
capability setuid,
# XXX: Maybe switch to "/etc/nginx/** r," ?
/etc/nginx/*.conf r,
/etc/nginx/*_params r,
/etc/nginx/conf.d/* r,
/etc/nginx/mime.types r,
/run/nginx.pid rw,
/usr/bin/nginx mr,
/usr/share/nginx/html/* r,
/var/log/nginx/* w,
# Site-specific additions and overrides. See local/README for details.
#include <local/usr.bin.nginx>
}

View File

@ -0,0 +1,44 @@
# vim:syntax=apparmor
# NOTE: This profile uses TCP sockets by default
# If you wish for php-fpm to listen to unix socket,
# add the following permission to local/usr.bin.php-fpm
# /path/to/your/unix/socket w,
#include <tunables/global>
# This is PHP open_basedir where script can only be executed from.
# /home, /tmp have been removed to not open permissions too widely
# /usr/share/pear have been removed to have its own permission
@{PHP_BASEDIRS} = /srv/www/ /var/www/ /usr/share/webapps/
/usr/bin/php-fpm {
#include <abstractions/base>
#include <abstractions/nameservice>
#include <abstractions/openssl>
#include <abstractions/php>
capability setgid,
capability setuid,
capability kill,
/etc/php/php-fpm.conf r,
/etc/php/php-fpm.d/* r,
# This is set to make php-fpm work by default, but if you don't use these paths
# add "deny @{PHP_BASEDIRS}/** r," to local.usr.bin.php-fpm and add read rights
# to where your PHP app is located
@{PHP_BASEDIRS}/** r,
/usr/bin/php-fpm mr,
/usr/share/pear/** r,
/usr/share/php/fpm/status.html r,
/var/log/php-fpm.log w,
# Site-specific additions and overrides. See local/README for details.
#include <local/usr.bin.php-fpm>
}

View File

@ -0,0 +1,17 @@
# vim:syntax=apparmor
#include <tunables/global>
/usr/bin/uuidd {
#include <abstractions/base>
#include <abstractions/consoles>
network inet dgram,
/usr/bin/uuidd mr,
/run/uuidd/request rw,
# Site-specific additions and overrides. See local/README for details.
#include <local/usr.bin.uuidd>
}

View File

@ -1,10 +1,9 @@
# Template file for 'apparmor' # Template file for 'apparmor'
pkgname=apparmor pkgname=apparmor
version=2.12.0 version=2.13.0
revision=1 revision=1
_short_ver=${version%\.*} _short_ver=${version%\.*}
_profilesversion=0.6 wrksrc="${pkgname}-v${_short_ver}"
wrksrc="${pkgname}-${_short_ver}"
configure_args="--prefix=/usr --with-perl --with-python" configure_args="--prefix=/usr --with-perl --with-python"
patch_args="-Np1" patch_args="-Np1"
hostmakedepends="bison flex autoconf automake libtool" hostmakedepends="bison flex autoconf automake libtool"
@ -14,19 +13,17 @@ only_for_archs="x86_64 i686"
short_desc="Mandatory access control to restrict programs" short_desc="Mandatory access control to restrict programs"
maintainer="Olivier Mauras <olivier@mauras.ch>" maintainer="Olivier Mauras <olivier@mauras.ch>"
license="GPL-3" license="GPL-3"
homepage="https://launchpad.net/apparmor/" homepage="https://gitlab.com/apparmor/apparmor"
distfiles=" distfiles="https://gitlab.com/apparmor/apparmor/-/archive/v${_short_ver}/apparmor-v${_short_ver}.tar.gz"
https://launchpad.net/apparmor/${_short_ver}/${version}/+download/${pkgname}-${_short_ver}.tar.gz checksum="fdafa0b71cbf574cce76a1ea1542b4540fa1c1040f80d0f0866fc0056ec37747"
https://github.com/coredumb/void-apparmor-profiles/archive/v${_profilesversion}.tar.gz"
checksum="
8a2b0cd083faa4d0640f579024be3a629faa7db3b99540798a1a050e2eaba056
00d1e005561e72376604fb1fe69a42062773759646b4fb5e998eaeaf172807e7"
pre_build() { pre_build() {
# Replace release profiles by our owns # Replace release profiles by our owns
cd ${wrksrc} cd ${wrksrc}
rm -rf profiles/
cp -r ../void-apparmor-profiles-${_profilesversion}/profiles/ ./ # Put in place our own profiles
cp ${FILESDIR}/profiles/* profiles/apparmor.d/
mv profiles/apparmor.d/bin.ping profiles/apparmor/profiles/extras/
} }
do_build() { do_build() {