2023-09-25 01:06:07 +02:00
|
|
|
// apparmor.d - Full set of apparmor profiles
|
2024-02-07 00:16:21 +01:00
|
|
|
// Copyright (C) 2021-2024 Alexandre Pujol <alexandre@pujol.io>
|
2023-09-25 01:06:07 +02:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
|
|
|
|
|
|
|
package aa
|
|
|
|
|
2024-05-05 15:19:25 +02:00
|
|
|
import (
|
2024-05-25 23:36:39 +02:00
|
|
|
"fmt"
|
2024-05-05 15:19:25 +02:00
|
|
|
)
|
2024-04-23 22:17:25 +02:00
|
|
|
|
2024-05-28 19:15:22 +02:00
|
|
|
const CAPABILITY Kind = "capability"
|
2024-04-23 22:26:09 +02:00
|
|
|
|
2024-05-25 23:01:29 +02:00
|
|
|
func init() {
|
2024-05-28 19:15:22 +02:00
|
|
|
requirements[CAPABILITY] = requirement{
|
2024-05-25 23:01:29 +02:00
|
|
|
"name": {
|
|
|
|
"audit_control", "audit_read", "audit_write", "block_suspend", "bpf",
|
|
|
|
"checkpoint_restore", "chown", "dac_override", "dac_read_search",
|
|
|
|
"fowner", "fsetid", "ipc_lock", "ipc_owner", "kill", "lease",
|
|
|
|
"linux_immutable", "mac_admin", "mac_override", "mknod", "net_admin",
|
|
|
|
"net_bind_service", "net_broadcast", "net_raw", "perfmon", "setfcap",
|
|
|
|
"setgid", "setpcap", "setuid", "sys_admin", "sys_boot", "sys_chroot",
|
|
|
|
"sys_module", "sys_nice", "sys_pacct", "sys_ptrace", "sys_rawio",
|
|
|
|
"sys_resource", "sys_time", "sys_tty_config", "syslog", "wake_alarm",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-25 01:06:07 +02:00
|
|
|
type Capability struct {
|
2024-06-25 20:50:27 +02:00
|
|
|
Base
|
2023-09-25 01:06:07 +02:00
|
|
|
Qualifier
|
2024-04-23 22:17:25 +02:00
|
|
|
Names []string
|
|
|
|
}
|
|
|
|
|
2024-06-20 00:22:49 +02:00
|
|
|
func newCapability(q Qualifier, rule rule) (Rule, error) {
|
|
|
|
names, err := toValues(CAPABILITY, "name", rule.GetString())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &Capability{
|
2024-06-25 20:50:27 +02:00
|
|
|
Base: newBase(rule),
|
2024-06-20 00:22:49 +02:00
|
|
|
Qualifier: q,
|
|
|
|
Names: names,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2024-04-19 23:43:02 +02:00
|
|
|
func newCapabilityFromLog(log map[string]string) Rule {
|
2023-09-25 01:06:07 +02:00
|
|
|
return &Capability{
|
2024-06-25 20:50:27 +02:00
|
|
|
Base: newBaseFromLog(log),
|
2024-04-15 00:58:34 +02:00
|
|
|
Qualifier: newQualifierFromLog(log),
|
2024-05-28 19:15:22 +02:00
|
|
|
Names: Must(toValues(CAPABILITY, "name", log["capname"])),
|
2023-09-25 01:06:07 +02:00
|
|
|
}
|
|
|
|
}
|
2023-09-25 01:09:11 +02:00
|
|
|
|
2024-06-25 20:56:36 +02:00
|
|
|
func (r *Capability) Kind() Kind {
|
|
|
|
return CAPABILITY
|
|
|
|
}
|
|
|
|
|
2024-06-27 19:45:32 +02:00
|
|
|
func (r *Capability) Constraint() Constraint {
|
|
|
|
return BlockRule
|
2024-06-25 20:56:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *Capability) String() string {
|
|
|
|
return renderTemplate(r.Kind(), r)
|
|
|
|
}
|
|
|
|
|
2024-05-25 23:36:39 +02:00
|
|
|
func (r *Capability) Validate() error {
|
|
|
|
if err := validateValues(r.Kind(), "name", r.Names); err != nil {
|
|
|
|
return fmt.Errorf("%s: %w", r, err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-06-19 19:34:58 +02:00
|
|
|
func (r *Capability) Compare(other Rule) int {
|
2023-09-25 01:09:11 +02:00
|
|
|
o, _ := other.(*Capability)
|
2024-06-19 19:34:58 +02:00
|
|
|
if res := compare(r.Names, o.Names); res != 0 {
|
|
|
|
return res
|
2023-09-25 01:09:11 +02:00
|
|
|
}
|
2024-06-19 19:34:58 +02:00
|
|
|
return r.Qualifier.Compare(o.Qualifier)
|
2024-04-23 22:17:25 +02:00
|
|
|
}
|
2024-06-25 21:10:12 +02:00
|
|
|
|
|
|
|
func (r *Capability) Merge(other Rule) bool {
|
|
|
|
return false // Never merge capabilities
|
|
|
|
}
|
2024-06-29 23:27:39 +02:00
|
|
|
|
|
|
|
func (r *Capability) Lengths() []int {
|
|
|
|
return []int{
|
|
|
|
r.Qualifier.getLenAudit(),
|
|
|
|
r.Qualifier.getLenAccess(),
|
|
|
|
length("", r.Names),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *Capability) setPaddings(max []int) {
|
|
|
|
r.Paddings = append(r.Qualifier.setPaddings(max[:2]), setPaddings(
|
|
|
|
max[2:], []string{""}, []any{r.Names})...,
|
|
|
|
)
|
|
|
|
}
|