mirror of
https://gitlab.com/apparmor/apparmor
synced 2025-09-05 08:45:22 +00:00
Compare commits
78 Commits
v4.0.0-alp
...
v4.0.0-alp
Author | SHA1 | Date | |
---|---|---|---|
|
15337db4af | ||
|
ce3c97df0f | ||
|
789cda2f08 | ||
|
6add80d83f | ||
|
3e28d0a254 | ||
|
e63c1e3a76 | ||
|
b03abbd75f | ||
|
6e81104bbf | ||
|
6cc3a3642d | ||
|
166ebdb3bc | ||
|
253eace573 | ||
|
c2487f017f | ||
|
dc73f0fc0b | ||
|
3578b07aeb | ||
|
28e67c7ba8 | ||
|
c8a2dc34d9 | ||
|
350f9cf3dd | ||
|
f889f9f434 | ||
|
5ca2ea3621 | ||
|
2c5bc5a09b | ||
|
dc821ef762 | ||
|
31c9cf6845 | ||
|
66484687e8 | ||
|
dfb6f90aee | ||
|
fcd46063fd | ||
|
f10e106a08 | ||
|
d778fbef57 | ||
|
70809fc716 | ||
|
15d8e21945 | ||
|
3ee47af402 | ||
|
eb6fa02251 | ||
|
923cbcf3be | ||
|
78a2c9f5f3 | ||
|
81bc26c934 | ||
|
71e28e9357 | ||
|
7c684f9d22 | ||
|
6c01b90c13 | ||
|
832bb8f417 | ||
|
e0bc90f5cf | ||
|
6a96067938 | ||
|
dcad01ccc3 | ||
|
2594d936ad | ||
|
9bba464d93 | ||
|
96b1aa549b | ||
|
dcc719c69c | ||
|
6304d372bf | ||
|
54915dabc4 | ||
|
d55a1e6d5d | ||
|
6580331625 | ||
|
1e7f63415a | ||
|
d4dff5ce4e | ||
|
86c05357cf | ||
|
f17bd59904 | ||
|
d38c7b22ce | ||
|
942202da17 | ||
|
5c34655f4a | ||
|
57ba373213 | ||
|
5d9d4483fb | ||
|
8b95030665 | ||
|
58a89284d5 | ||
|
28f336cb91 | ||
|
61fc6805a9 | ||
|
f2f24884c3 | ||
|
5d8347bc26 | ||
|
0c595ac801 | ||
|
1d5f90efcd | ||
|
4f51c93f9d | ||
|
4d1c17b426 | ||
|
918a15e244 | ||
|
fc8c7722a1 | ||
|
7eff621fc7 | ||
|
659a187687 | ||
|
cee501349e | ||
|
27de7ea0c2 | ||
|
bfd72c93be | ||
|
6ac0e0236b | ||
|
151bf26bb9 | ||
|
26903320fd |
1
.gitignore
vendored
1
.gitignore
vendored
@@ -264,6 +264,7 @@ tests/regression/apparmor/link_subset
|
||||
tests/regression/apparmor/mkdir
|
||||
tests/regression/apparmor/mmap
|
||||
tests/regression/apparmor/mount
|
||||
tests/regression/apparmor/move_mount
|
||||
tests/regression/apparmor/named_pipe
|
||||
tests/regression/apparmor/net_raw
|
||||
tests/regression/apparmor/open
|
||||
|
@@ -1 +1 @@
|
||||
4.0.0~alpha3
|
||||
4.0.0~alpha4
|
||||
|
@@ -116,6 +116,14 @@ The specified I<file/task> does not exist or is not visible.
|
||||
|
||||
The confinement data is too large to fit in the supplied buffer.
|
||||
|
||||
=item B<ENOPROTOOPT>
|
||||
|
||||
The kernel doesn't support the SO_PEERLABEL option in sockets. This happens
|
||||
mainly when the kernel lacks 'fine grained unix mediation' support. It also
|
||||
can happen on LSM stacking kernels where another LSM has claimed this
|
||||
interface and decides to return this error, although this is really a
|
||||
corner case.
|
||||
|
||||
=back
|
||||
|
||||
=head1 NOTES
|
||||
|
@@ -109,12 +109,12 @@ To immediately stack a profile named "profile_a", as performed with
|
||||
aa_stack_profile("profile_a"), the equivalent of this shell command can be
|
||||
used:
|
||||
|
||||
$ echo -n "stackprofile profile_a" > /proc/self/attr/current
|
||||
$ echo -n "stack profile_a" > /proc/self/attr/current
|
||||
|
||||
To stack a profile named "profile_a" at the next exec, as performed with
|
||||
aa_stack_onexec("profile_a"), the equivalent of this shell command can be used:
|
||||
|
||||
$ echo -n "stackexec profile_a" > /proc/self/attr/exec
|
||||
$ echo -n "stack profile_a" > /proc/self/attr/exec
|
||||
|
||||
These raw AppArmor filesystem operations must only be used when using
|
||||
libapparmor is not a viable option.
|
||||
@@ -184,6 +184,7 @@ with apparmor_parser(8):
|
||||
/etc/passwd r,
|
||||
|
||||
# Needed for aa_stack_profile()
|
||||
change-profile -> &i_cant_be_trusted_anymore,
|
||||
/usr/lib/libapparmor*.so* mr,
|
||||
/proc/[0-9]*/attr/current w,
|
||||
}
|
||||
|
@@ -117,7 +117,7 @@ B<PROFILE FLAGS> = I<PROFILE MODE> | I<AUDIT_MODE> | 'mediate_deleted'
|
||||
| 'attach_disconnected' | 'attach_disconneced.path='I<ABS PATH> | 'chroot_relative'
|
||||
| 'debug' | 'interruptible' | 'kill.signal='I<SIGNAL>
|
||||
|
||||
B<PROFILE MODE> = 'enforce' | 'complain' | 'kill' | 'unconfined' | 'prompt'
|
||||
B<PROFILE MODE> = 'enforce' | 'complain' | 'kill' | 'default_allow' | 'unconfined' | 'prompt'
|
||||
|
||||
B<AUDIT MODE> = 'audit'
|
||||
|
||||
@@ -466,12 +466,36 @@ a signal to kill it.
|
||||
permission the action will be allowed, but the violation will be logged
|
||||
with a tag of the access being B<ALLOWED>.
|
||||
|
||||
=item B<default_allow> This mode changes the default behavior of
|
||||
apparmor from default deny to default allow. When default_allow is
|
||||
specified the resulting profile will allow operations that the profile
|
||||
does not have a rule for. This mode is similar to I<unconfined> but
|
||||
allows for allow and deny rules, specifying audit, and domain
|
||||
transitions. Profiles in this mode may be be reported as being in
|
||||
I<enforce> mode or I<allow> mode when introspected from the kernel.
|
||||
|
||||
Note: default_allow is similar and for many profiles will be equivalent
|
||||
to specifying an I<allow all,> rule in the profile. The default_allow
|
||||
flag does not provide all the same option that the I<allow all,> rule
|
||||
provides.
|
||||
|
||||
=item B<unconfined> This mode allows a task confined by the profile to
|
||||
behave as though they are I<unconfined>. This mode allow for an
|
||||
unconfined behavior that can be later changed to confinement by using
|
||||
profile replacement. This mode is should not be used under regular
|
||||
deployment but can be useful during debugging and some system
|
||||
initialization scenarios.
|
||||
behave as though it is I<unconfined>. The unconfined behavior can be
|
||||
later changed to confinement by using profile replacement. This mode
|
||||
should not be used under regular deployment but can be useful during
|
||||
debugging and some system initialization scenarios.
|
||||
|
||||
This mode is similar to default_allow and may be emulated by
|
||||
default_allow in kernels that no longer support a true unconfined
|
||||
mode. It does not generally allow for specifying deny rules, or allow
|
||||
rules that override the default behavior, except in a few custom
|
||||
kernels where unconfined restricts a few operations. It relies on
|
||||
special customized behavior of the unconfined profile in the kernel
|
||||
and as such should only be used for debugging.
|
||||
|
||||
Note: true unconfined is being phased out, with unconfined becoming a
|
||||
replaceable profile. As such unconfined mode will be emulated by a
|
||||
special profile compiled with the default_allow flag in newer kernels.
|
||||
|
||||
=item B<prompt> This mode allows task mediation to send an up call to
|
||||
userspace to ask for a decision when there isn't a rule covering the
|
||||
|
@@ -6,6 +6,8 @@ After=systemd-journald-audit.socket
|
||||
# profile cache: /var/cache/apparmor/ and /usr/share/apparmor/cache/
|
||||
After=var.mount var-cache.mount usr.mount usr-share.mount
|
||||
ConditionSecurity=apparmor
|
||||
Documentation=man:apparmor(7)
|
||||
Documentation=https://gitlab.com/apparmor/apparmor/wikis/home/
|
||||
|
||||
[Service]
|
||||
Type=oneshot
|
||||
|
@@ -299,11 +299,11 @@ Enable various warnings during policy compilation. A single warn flag
|
||||
can be specified per --warn option, but the --warn flag can be passed
|
||||
multiple times.
|
||||
|
||||
apparmor_parser --warn=rules-not-enforced ...
|
||||
apparmor_parser --warn=rule-not-enforced ...
|
||||
|
||||
A specific warning can be disabled by prepending I<no>- to the flag
|
||||
|
||||
apparmor_parser --warn=no-rules-not-enforced ...
|
||||
apparmor_parser --warn=no-rule-not-enforced ...
|
||||
|
||||
Use --help=warn to see a full list of which warn flags are supported.
|
||||
|
||||
|
@@ -72,6 +72,7 @@ static inline Chars* insert_char_range(Chars* cset, transchar a, transchar b)
|
||||
* parsing succeeds!
|
||||
*/
|
||||
%destructor { $$->release(); } expr terms0 terms qterm term
|
||||
%destructor { delete $$; } charset cset_chars
|
||||
|
||||
%%
|
||||
|
||||
|
@@ -276,7 +276,7 @@ static inline void sd_write_aligned_blob(std::ostringstream &buf, void *b, int b
|
||||
buf.write((const char *) b, b_size);
|
||||
}
|
||||
|
||||
static void sd_write_strn(std::ostringstream &buf, char *b, int size, const char *name)
|
||||
static void sd_write_strn(std::ostringstream &buf, const char *b, int size, const char *name)
|
||||
{
|
||||
sd_write_name(buf, name);
|
||||
sd_write8(buf, SD_STRING);
|
||||
@@ -284,7 +284,7 @@ static void sd_write_strn(std::ostringstream &buf, char *b, int size, const char
|
||||
buf.write(b, size);
|
||||
}
|
||||
|
||||
static inline void sd_write_string(std::ostringstream &buf, char *b, const char *name)
|
||||
static inline void sd_write_string(std::ostringstream &buf, const char *b, const char *name)
|
||||
{
|
||||
sd_write_strn(buf, b, strlen(b) + 1, name);
|
||||
}
|
||||
@@ -403,11 +403,7 @@ void sd_serialize_profile(std::ostringstream &buf, Profile *profile,
|
||||
sd_write_struct(buf, "profile");
|
||||
if (flattened) {
|
||||
assert(profile->parent);
|
||||
autofree char *name = (char *) malloc(3 + strlen(profile->name) + strlen(profile->parent->name));
|
||||
if (!name)
|
||||
return;
|
||||
sprintf(name, "%s//%s", profile->parent->name, profile->name);
|
||||
sd_write_string(buf, name, NULL);
|
||||
sd_write_string(buf, profile->get_name(false).c_str(), NULL);
|
||||
} else {
|
||||
sd_write_string(buf, profile->name, NULL);
|
||||
}
|
||||
|
@@ -28,6 +28,7 @@ const char *profile_mode_table[] = {
|
||||
"kill",
|
||||
"unconfined",
|
||||
"prompt",
|
||||
"default_allow",
|
||||
"conflict" /* should not ever be displayed */
|
||||
};
|
||||
|
||||
|
@@ -64,9 +64,10 @@ enum profile_mode {
|
||||
MODE_KILL = 3,
|
||||
MODE_UNCONFINED = 4,
|
||||
MODE_PROMPT = 5,
|
||||
MODE_CONFLICT = 6 /* greater than MODE_LAST */
|
||||
MODE_DEFAULT_ALLOW = 6,
|
||||
MODE_CONFLICT = 7 /* greater than MODE_LAST */
|
||||
};
|
||||
#define MODE_LAST MODE_PROMPT
|
||||
#define MODE_LAST MODE_DEFAULT_ALLOW
|
||||
|
||||
static inline enum profile_mode operator++(enum profile_mode &mode)
|
||||
{
|
||||
@@ -85,6 +86,9 @@ static inline enum profile_mode merge_profile_mode(enum profile_mode l, enum pro
|
||||
|
||||
static inline uint32_t profile_mode_packed(enum profile_mode mode)
|
||||
{
|
||||
/* until dominance is fixed use unconfined mode for default_allow */
|
||||
if (mode == MODE_DEFAULT_ALLOW)
|
||||
mode = MODE_UNCONFINED;
|
||||
/* kernel doesn't have an unspecified mode everything
|
||||
* shifts down by 1
|
||||
*/
|
||||
|
@@ -105,11 +105,12 @@ is_container_with_internal_policy() {
|
||||
return 1
|
||||
fi
|
||||
|
||||
# LXD and LXC set up AppArmor namespaces starting with "lxd-" and
|
||||
# "lxc-", respectively. Return non-zero for all other namespace
|
||||
# identifiers.
|
||||
# LXD, Incus and LXC set up AppArmor namespaces starting with "lxd-",
|
||||
# "incus-" and "lxc-", respectively. Return non-zero for all other
|
||||
# namespace identifiers.
|
||||
read -r ns_name < "$ns_name_path"
|
||||
if [ "${ns_name#lxd-*}" = "$ns_name" ] && \
|
||||
[ "${ns_name#incus-*}" = "$ns_name" ] && \
|
||||
[ "${ns_name#lxc-*}" = "$ns_name" ]; then
|
||||
return 1
|
||||
fi
|
||||
|
9
parser/tst/simple_tests/profile/flags/flags_bad70.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad70.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, complain) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad71.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad71.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, kill) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad72.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad72.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, unconfined) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad73.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad73.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, enforce) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad74.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad74.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, prompt) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad75.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad75.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, enforce, complain) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad76.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad76.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, enforce, kill) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad77.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad77.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, enforce, unconfined) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad78.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad78.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, enforce, prompt) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad79.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad79.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, complain, kill) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad80.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad80.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, complain, unconfined) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad81.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad81.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, complain, prompt) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad82.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad82.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, kill, prompt) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad83.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad83.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, unconfined, prompt) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad84.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad84.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, enforce, complain, unconfined) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad85.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad85.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, enforce, complain, kill, prompt) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
9
parser/tst/simple_tests/profile/flags/flags_bad86.sd
Normal file
9
parser/tst/simple_tests/profile/flags/flags_bad86.sd
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
#=DESCRIPTION Ensure conflicting mode flags cause an error
|
||||
#=EXRESULT FAIL
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow, enforce, complain, kill, unconfined, prompt) {
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
74
parser/tst/simple_tests/profile/flags/flags_ok51.sd
Normal file
74
parser/tst/simple_tests/profile/flags/flags_ok51.sd
Normal file
@@ -0,0 +1,74 @@
|
||||
#
|
||||
#=DESCRIPTION validate some uses of the profile flags.
|
||||
#=EXRESULT PASS
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist2 flags=(audit) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist2 r,
|
||||
}
|
||||
|
||||
/does/not/exist3 flags=(default_allow,audit) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist5 r,
|
||||
}
|
||||
|
||||
/does/not/exist4 flags=(audit,default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist7 r,
|
||||
}
|
||||
|
||||
/does/not/exist5 flags=(audit,default_allow,audit) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist8 r,
|
||||
}
|
||||
|
||||
/does/not/exist6 (default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist7 (audit) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist2 r,
|
||||
}
|
||||
|
||||
/does/not/exist8 (default_allow,audit) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist5 r,
|
||||
}
|
||||
|
||||
/does/not/exist9 (audit,default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist7 r,
|
||||
}
|
||||
|
||||
/does/not/exist10 (audit,default_allow,audit) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist8 r,
|
||||
}
|
39
parser/tst/simple_tests/profile/flags/flags_ok52.sd
Normal file
39
parser/tst/simple_tests/profile/flags/flags_ok52.sd
Normal file
@@ -0,0 +1,39 @@
|
||||
#
|
||||
#=DESCRIPTION validate some uses of the profile flags.
|
||||
#=EXRESULT PASS
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist flags=(default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist1 flags=(audit, default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist2 flags=(default_allow, audit) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist3 flags=(default_allow, chroot_relative) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist4 flags=(chroot_relative, default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
19
parser/tst/simple_tests/profile/flags/flags_ok53.sd
Normal file
19
parser/tst/simple_tests/profile/flags/flags_ok53.sd
Normal file
@@ -0,0 +1,19 @@
|
||||
#
|
||||
#=DESCRIPTION validate some uses of the profile flags.
|
||||
#=EXRESULT PASS
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist1 flags=(default_allow, namespace_relative) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist2 flags=(namespace_relative, default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
19
parser/tst/simple_tests/profile/flags/flags_ok54.sd
Normal file
19
parser/tst/simple_tests/profile/flags/flags_ok54.sd
Normal file
@@ -0,0 +1,19 @@
|
||||
#
|
||||
#=DESCRIPTION validate some uses of the profile flags.
|
||||
#=EXRESULT PASS
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
|
||||
/does/not/exist1 flags=(default_allow, mediate_deleted) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist2 flags=(mediate_deleted, default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
18
parser/tst/simple_tests/profile/flags/flags_ok55.sd
Normal file
18
parser/tst/simple_tests/profile/flags/flags_ok55.sd
Normal file
@@ -0,0 +1,18 @@
|
||||
#
|
||||
#=DESCRIPTION validate some uses of the profile flags.
|
||||
#=EXRESULT PASS
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist1 flags=(default_allow, delegate_deleted) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist2 flags=(delegate_deleted, default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
18
parser/tst/simple_tests/profile/flags/flags_ok56.sd
Normal file
18
parser/tst/simple_tests/profile/flags/flags_ok56.sd
Normal file
@@ -0,0 +1,18 @@
|
||||
#
|
||||
#=DESCRIPTION validate some uses of the profile flags.
|
||||
#=EXRESULT PASS
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist1 flags=(default_allow, attach_disconnected) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist2 flags=(attach_disconnected, default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
19
parser/tst/simple_tests/profile/flags/flags_ok57.sd
Normal file
19
parser/tst/simple_tests/profile/flags/flags_ok57.sd
Normal file
@@ -0,0 +1,19 @@
|
||||
#
|
||||
#=DESCRIPTION validate some uses of the profile flags.
|
||||
#=EXRESULT PASS
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist1 flags=(default_allow, no_attach_disconnected) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist2 flags=(no_attach_disconnected, default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
18
parser/tst/simple_tests/profile/flags/flags_ok58.sd
Normal file
18
parser/tst/simple_tests/profile/flags/flags_ok58.sd
Normal file
@@ -0,0 +1,18 @@
|
||||
#
|
||||
#=DESCRIPTION validate some uses of the profile flags.
|
||||
#=EXRESULT PASS
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist1 flags=(default_allow, chroot_attach) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist2 flags=(chroot_attach, default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
18
parser/tst/simple_tests/profile/flags/flags_ok59.sd
Normal file
18
parser/tst/simple_tests/profile/flags/flags_ok59.sd
Normal file
@@ -0,0 +1,18 @@
|
||||
#
|
||||
#=DESCRIPTION validate some uses of the profile flags.
|
||||
#=EXRESULT PASS
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist1 flags=(default_allow, chroot_no_attach) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist2 flags=(chroot_no_attach, default_allow) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
110
parser/tst/simple_tests/profile/flags/flags_ok60.sd
Normal file
110
parser/tst/simple_tests/profile/flags/flags_ok60.sd
Normal file
@@ -0,0 +1,110 @@
|
||||
#
|
||||
#=DESCRIPTION validate some uses of the profile flags.
|
||||
#=EXRESULT PASS
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
|
||||
#==============================
|
||||
|
||||
/does/not/exist1 flags=(default_allow, chroot_relative, mediate_deleted) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist2 flags=(chroot_relative, mediate_deleted, default_allow) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
|
||||
#-------
|
||||
|
||||
|
||||
/does/not/exist12 flags=(default_allow, chroot_relative, delegate_deleted) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist13 flags=(chroot_relative, delegate_deleted, default_allow) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
|
||||
#-------
|
||||
|
||||
|
||||
/does/not/exist22 flags=(default_allow, chroot_relative, attach_disconnected) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist23 flags=(chroot_relative, attach_disconnected, default_allow) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
|
||||
#-------
|
||||
|
||||
/does/not/exist32 flags=(default_allow, chroot_relative, no_attach_disconnected) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist33 flags=(chroot_relative, no_attach_disconnected, default_allow) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
|
||||
#-------
|
||||
|
||||
|
||||
/does/not/exist42 flags=(default_allow, chroot_relative, chroot_attach) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist43 flags=(chroot_relative, chroot_attach, default_allow) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
|
||||
#-------
|
||||
|
||||
|
||||
/does/not/exist52 flags=(default_allow, chroot_relative, chroot_no_attach) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
||||
|
||||
/does/not/exist53 flags=(chroot_relative, chroot_no_attach, default_allow) {
|
||||
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist r,
|
||||
}
|
25
parser/tst/simple_tests/profile/flags/flags_ok61.sd
Normal file
25
parser/tst/simple_tests/profile/flags/flags_ok61.sd
Normal file
@@ -0,0 +1,25 @@
|
||||
#
|
||||
#=DESCRIPTION verify whitespace is allowed in profile flags.
|
||||
#=EXRESULT PASS
|
||||
# vim:syntax=subdomain
|
||||
#
|
||||
/does/not/exist3 flags=(default_allow, audit) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist5 r,
|
||||
}
|
||||
|
||||
/does/not/exist4 flags = (audit , default_allow){
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist7 r,
|
||||
}
|
||||
|
||||
/does/not/exist5 flags = ( audit , default_allow , audit ) {
|
||||
#include <includes/base>
|
||||
|
||||
/usr/X11R6/lib/lib*so* r,
|
||||
/does/not/exist8 r,
|
||||
}
|
12
profiles/apparmor.d/1password
Normal file
12
profiles/apparmor.d/1password
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile 1password /opt/1Password/1password flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/1password>
|
||||
}
|
12
profiles/apparmor.d/Discord
Normal file
12
profiles/apparmor.d/Discord
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile Discord /usr/share/discord/Discord flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/Discord>
|
||||
}
|
12
profiles/apparmor.d/MongoDB_Compass
Normal file
12
profiles/apparmor.d/MongoDB_Compass
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile "MongoDB Compass" "/usr/lib/mongodb-compass/MongoDB Compass" flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/MongoDB_Compass>
|
||||
}
|
12
profiles/apparmor.d/QtWebEngineProcess
Normal file
12
profiles/apparmor.d/QtWebEngineProcess
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile QtWebEngineProcess /usr/lib/@{multiarch}/qt{5,6}/libexec/QtWebEngineProcess flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/QtWebEngineProcess>
|
||||
}
|
@@ -87,7 +87,7 @@ owner @{HOME}/.local/share/openal/hrtf/{,**} r,
|
||||
/etc/wildmidi/wildmidi.cfg r,
|
||||
|
||||
# pipewire
|
||||
/usr/share/pipewire/client.conf r,
|
||||
/usr/share/pipewire/client{,-rt}.conf r,
|
||||
|
||||
# Include additions to the abstraction
|
||||
include if exists <abstractions/audio.d>
|
||||
|
@@ -23,6 +23,9 @@
|
||||
@{etc_ro}/passwd r,
|
||||
@{etc_ro}/protocols r,
|
||||
|
||||
# On systems with authselect installed, /etc/nsswitch.conf is a symlink to /etc/authselect/nsswitch.conf
|
||||
@{etc_ro}/authselect/nsswitch.conf r,
|
||||
|
||||
# libtirpc (used for NIS/YP login) needs this
|
||||
@{etc_ro}/netconfig r,
|
||||
|
||||
|
@@ -33,11 +33,7 @@ profile snap_browsers {
|
||||
/sys/kernel/security/apparmor/features/ r,
|
||||
|
||||
# allow launching official browser snaps.
|
||||
/snap/chromium/[0-9]*/meta/{snap.yaml,hooks/} r,
|
||||
/snap/firefox/[0-9]*/meta/{snap.yaml,hooks/} r,
|
||||
/snap/opera/[0-9]*/meta/{snap.yaml,hooks/} r,
|
||||
|
||||
/var/lib/snapd/sequence/{chromium,firefox,opera}.json r,
|
||||
/var/lib/snapd/inhibit/{chromium,firefox,opera}.lock rk,
|
||||
# add other browsers here
|
||||
/snap/{brave,chromium,firefox,opera}/[0-9]*/meta/{snap.yaml,hooks/} r,
|
||||
/var/lib/snapd/sequence/{brave,chromium,firefox,opera}.json r,
|
||||
/var/lib/snapd/inhibit/{brave,chromium,firefox,opera}.lock rk,
|
||||
}
|
||||
|
@@ -7,3 +7,6 @@
|
||||
|
||||
include <abstractions/kde>
|
||||
/usr/bin/kde4-config Cx -> sanitized_helper,
|
||||
|
||||
# https://bugs.kde.org/show_bug.cgi?id=397399
|
||||
/usr/bin/plasma-browser-integration-host Cx -> sanitized_helper,
|
||||
|
@@ -18,5 +18,8 @@
|
||||
/var/log/btmp rwk,
|
||||
@{run}/utmp rwk,
|
||||
|
||||
# Some read the list of sessions from systemd
|
||||
/run/systemd/sessions/ r,
|
||||
|
||||
# Include additions to the abstraction
|
||||
include if exists <abstractions/wutmp.d>
|
||||
|
12
profiles/apparmor.d/brave
Normal file
12
profiles/apparmor.d/brave
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile brave /opt/brave.com/brave/brave flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/brave>
|
||||
}
|
12
profiles/apparmor.d/buildah
Normal file
12
profiles/apparmor.d/buildah
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile buildah /usr/bin/buildah flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/buildah>
|
||||
}
|
12
profiles/apparmor.d/busybox
Normal file
12
profiles/apparmor.d/busybox
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile busybox /usr/bin/busybox flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/busybox>
|
||||
}
|
12
profiles/apparmor.d/cam
Normal file
12
profiles/apparmor.d/cam
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile cam /usr/bin/cam flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/cam>
|
||||
}
|
12
profiles/apparmor.d/ch-checkns
Normal file
12
profiles/apparmor.d/ch-checkns
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile ch-checkns /usr/bin/ch-checkns flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/ch-checkns>
|
||||
}
|
12
profiles/apparmor.d/ch-run
Normal file
12
profiles/apparmor.d/ch-run
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile ch-run /usr/bin/ch-run flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/ch-run>
|
||||
}
|
12
profiles/apparmor.d/chrome
Normal file
12
profiles/apparmor.d/chrome
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile chrome /opt/google/chrome/chrome flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/chrome>
|
||||
}
|
12
profiles/apparmor.d/code
Normal file
12
profiles/apparmor.d/code
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile code /usr/share/code/bin/code flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/code>
|
||||
}
|
12
profiles/apparmor.d/crun
Normal file
12
profiles/apparmor.d/crun
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile crun /usr/bin/crun flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/crun>
|
||||
}
|
12
profiles/apparmor.d/firefox
Normal file
12
profiles/apparmor.d/firefox
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile firefox /usr/lib/firefox{,-esr}/firefox{,-esr} flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/firefox>
|
||||
}
|
12
profiles/apparmor.d/flatpak
Normal file
12
profiles/apparmor.d/flatpak
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile flatpak /usr/bin/flatpak flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/flatpak>
|
||||
}
|
12
profiles/apparmor.d/github-desktop
Normal file
12
profiles/apparmor.d/github-desktop
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile github-desktop /usr/lib/github-desktop/github-desktop flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/github-desktop>
|
||||
}
|
12
profiles/apparmor.d/ipa_verify
Normal file
12
profiles/apparmor.d/ipa_verify
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile ipa_verify /usr/bin/ipa_verify flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/ipa_verify>
|
||||
}
|
12
profiles/apparmor.d/lc-compliance
Normal file
12
profiles/apparmor.d/lc-compliance
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile lc-compliance /usr/bin/lc-compliance flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/lc-compliance>
|
||||
}
|
12
profiles/apparmor.d/libcamerify
Normal file
12
profiles/apparmor.d/libcamerify
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile libcamerify /usr/bin/libcamerify flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/libcamerify>
|
||||
}
|
12
profiles/apparmor.d/linux-sandbox
Normal file
12
profiles/apparmor.d/linux-sandbox
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile linux-sandbox /usr/libexec/@{multiarch}/bazel/linux-sandbox flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/linux-sandbox>
|
||||
}
|
12
profiles/apparmor.d/lxc-attach
Normal file
12
profiles/apparmor.d/lxc-attach
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile lxc-attach /usr/bin/lxc-attach flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/lxc-attach>
|
||||
}
|
12
profiles/apparmor.d/lxc-create
Normal file
12
profiles/apparmor.d/lxc-create
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile lxc-create /usr/bin/lxc-create flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/lxc-create>
|
||||
}
|
12
profiles/apparmor.d/lxc-destroy
Normal file
12
profiles/apparmor.d/lxc-destroy
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile lxc-destroy /usr/bin/lxc-destroy flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/lxc-destroy>
|
||||
}
|
12
profiles/apparmor.d/lxc-execute
Normal file
12
profiles/apparmor.d/lxc-execute
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile lxc-execute /usr/bin/lxc-execute flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/lxc-execute>
|
||||
}
|
12
profiles/apparmor.d/lxc-stop
Normal file
12
profiles/apparmor.d/lxc-stop
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile lxc-stop /usr/bin/lxc-stop flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/lxc-stop>
|
||||
}
|
12
profiles/apparmor.d/lxc-unshare
Normal file
12
profiles/apparmor.d/lxc-unshare
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile lxc-unshare /usr/bin/lxc-unshare flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/lxc-unshare>
|
||||
}
|
12
profiles/apparmor.d/lxc-usernsexec
Normal file
12
profiles/apparmor.d/lxc-usernsexec
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile lxc-usernsexec /usr/bin/lxc-usernsexec flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/lxc-usernsexec>
|
||||
}
|
12
profiles/apparmor.d/mmdebstrap
Normal file
12
profiles/apparmor.d/mmdebstrap
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile mmdebstrap /usr/bin/mmdebstrap flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/mmdebstrap>
|
||||
}
|
12
profiles/apparmor.d/msedge
Normal file
12
profiles/apparmor.d/msedge
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile msedge /opt/microsoft/msedge/msedge flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/msedge>
|
||||
}
|
12
profiles/apparmor.d/obsidian
Normal file
12
profiles/apparmor.d/obsidian
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile obsidian /opt/Obsidian/obsidian flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/obsidian>
|
||||
}
|
12
profiles/apparmor.d/opera
Normal file
12
profiles/apparmor.d/opera
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile opera /usr/lib/@{multiarch}/opera/opera flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/opera>
|
||||
}
|
42
profiles/apparmor.d/plasmashell
Normal file
42
profiles/apparmor.d/plasmashell
Normal file
@@ -0,0 +1,42 @@
|
||||
abi <abi/4.0>,
|
||||
|
||||
include <tunables/global>
|
||||
|
||||
profile plasmashell /usr/bin/plasmashell {
|
||||
include <abstractions/dbus-session>
|
||||
|
||||
capability,
|
||||
userns,
|
||||
network,
|
||||
dbus,
|
||||
mount,
|
||||
umount,
|
||||
remount,
|
||||
signal,
|
||||
mqueue,
|
||||
unix,
|
||||
ptrace,
|
||||
|
||||
/usr/lib/x86_64-linux-gnu/qt5/libexec/QtWebEngineProcess cx -> &plasmashell//QtWebEngineProcess,
|
||||
/** pux,
|
||||
/{,**} mrwlk,
|
||||
|
||||
profile QtWebEngineProcess {
|
||||
capability,
|
||||
userns,
|
||||
network,
|
||||
dbus,
|
||||
mount,
|
||||
umount,
|
||||
remount,
|
||||
signal,
|
||||
mqueue,
|
||||
unix,
|
||||
ptrace,
|
||||
/** pux,
|
||||
/{,**} mrwlk,
|
||||
}
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/plasmashell>
|
||||
}
|
12
profiles/apparmor.d/podman
Normal file
12
profiles/apparmor.d/podman
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile podman /usr/bin/podman flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/podman>
|
||||
}
|
12
profiles/apparmor.d/polypane
Normal file
12
profiles/apparmor.d/polypane
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile polypane /opt/Polypane/polypane flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/polypane>
|
||||
}
|
12
profiles/apparmor.d/qcam
Normal file
12
profiles/apparmor.d/qcam
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile qcam /usr/bin/qcam flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/qcam>
|
||||
}
|
12
profiles/apparmor.d/rootlesskit
Normal file
12
profiles/apparmor.d/rootlesskit
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile rootlesskit /usr/bin/rootlesskit flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/rootlesskit>
|
||||
}
|
12
profiles/apparmor.d/rpm
Normal file
12
profiles/apparmor.d/rpm
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile rpm /usr/bin/rpm flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/rpm>
|
||||
}
|
12
profiles/apparmor.d/runc
Normal file
12
profiles/apparmor.d/runc
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile runc /usr/sbin/runc flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/runc>
|
||||
}
|
12
profiles/apparmor.d/sbuild
Normal file
12
profiles/apparmor.d/sbuild
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild /usr/bin/sbuild flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild>
|
||||
}
|
12
profiles/apparmor.d/sbuild-abort
Normal file
12
profiles/apparmor.d/sbuild-abort
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-abort /usr/bin/sbuild-abort flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-abort>
|
||||
}
|
12
profiles/apparmor.d/sbuild-adduser
Normal file
12
profiles/apparmor.d/sbuild-adduser
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-adduser /usr/sbin/sbuild-adduser flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-adduser>
|
||||
}
|
12
profiles/apparmor.d/sbuild-apt
Normal file
12
profiles/apparmor.d/sbuild-apt
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-apt /usr/bin/sbuild-apt flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-apt>
|
||||
}
|
12
profiles/apparmor.d/sbuild-checkpackages
Normal file
12
profiles/apparmor.d/sbuild-checkpackages
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-checkpackages /usr/bin/sbuild-checkpackages flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-checkpackages>
|
||||
}
|
12
profiles/apparmor.d/sbuild-clean
Normal file
12
profiles/apparmor.d/sbuild-clean
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-clean /usr/bin/sbuild-clean flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-clean>
|
||||
}
|
12
profiles/apparmor.d/sbuild-createchroot
Normal file
12
profiles/apparmor.d/sbuild-createchroot
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-createchroot /usr/bin/sbuild-createchroot flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-createchroot>
|
||||
}
|
12
profiles/apparmor.d/sbuild-destroychroot
Normal file
12
profiles/apparmor.d/sbuild-destroychroot
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-destroychroot /usr/sbin/sbuild-destroychroot flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-destroychroot>
|
||||
}
|
12
profiles/apparmor.d/sbuild-distupgrade
Normal file
12
profiles/apparmor.d/sbuild-distupgrade
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-distupgrade /usr/bin/sbuild-distupgrade flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-distupgrade>
|
||||
}
|
12
profiles/apparmor.d/sbuild-hold
Normal file
12
profiles/apparmor.d/sbuild-hold
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-hold /usr/bin/sbuild-hold flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-hold>
|
||||
}
|
12
profiles/apparmor.d/sbuild-shell
Normal file
12
profiles/apparmor.d/sbuild-shell
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-shell /usr/bin/sbuild-shell flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/usr.bin.sbuild-shell>
|
||||
}
|
12
profiles/apparmor.d/sbuild-unhold
Normal file
12
profiles/apparmor.d/sbuild-unhold
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-unhold /usr/bin/sbuild-unhold flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-unhold>
|
||||
}
|
12
profiles/apparmor.d/sbuild-update
Normal file
12
profiles/apparmor.d/sbuild-update
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-update /usr/bin/sbuild-update flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-update>
|
||||
}
|
12
profiles/apparmor.d/sbuild-upgrade
Normal file
12
profiles/apparmor.d/sbuild-upgrade
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile sbuild-upgrade /usr/bin/sbuild-upgrade flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/sbuild-upgrade>
|
||||
}
|
12
profiles/apparmor.d/signal-desktop
Normal file
12
profiles/apparmor.d/signal-desktop
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile signal-desktop /opt/Signal/signal-desktop flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/signal-desktop>
|
||||
}
|
12
profiles/apparmor.d/slack
Normal file
12
profiles/apparmor.d/slack
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile slack /usr/lib/slack/slack flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/slack>
|
||||
}
|
12
profiles/apparmor.d/slirp4netns
Normal file
12
profiles/apparmor.d/slirp4netns
Normal file
@@ -0,0 +1,12 @@
|
||||
# This profile allows everything and only exists to give the
|
||||
# application a name instead of having the label "unconfined"
|
||||
|
||||
abi <abi/4.0>,
|
||||
include <tunables/global>
|
||||
|
||||
profile slirp4netns /usr/bin/slirp4netns flags=(unconfined) {
|
||||
userns,
|
||||
|
||||
# Site-specific additions and overrides. See local/README for details.
|
||||
include if exists <local/slirp4netns>
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user