mirror of
https://github.com/roddhjav/apparmor.d.git
synced 2024-11-14 23:43:56 +01:00
Add new profiles
This commit is contained in:
parent
7a24f98f48
commit
80de79b66a
49
apparmor.d/profiles-a-f/btop
Normal file
49
apparmor.d/profiles-a-f/btop
Normal file
@ -0,0 +1,49 @@
|
||||
# apparmor.d - Full set of apparmor profiles
|
||||
# SPDX-License-Identifier: GPL-2.0-only
|
||||
|
||||
abi <abi/3.0>,
|
||||
|
||||
include <tunables/global>
|
||||
|
||||
@{exec_path} = /{,usr/}{,local/}bin/btop
|
||||
profile btop @{exec_path} {
|
||||
include <abstractions/base>
|
||||
include <abstractions/consoles>
|
||||
|
||||
capability sys_ptrace,
|
||||
|
||||
network netlink raw,
|
||||
|
||||
signal (send),
|
||||
ptrace (read),
|
||||
|
||||
@{exec_path} mr,
|
||||
|
||||
/etc/fstab r,
|
||||
/etc/passwd r,
|
||||
|
||||
owner @{user_config_dirs}/btop/{,**} rw,
|
||||
|
||||
@{sys}/class/power_supply/ r,
|
||||
@{sys}/class/hwmon/ r,
|
||||
@{sys}/devices/system/cpu/cpufreq/policy[0-9]*/scaling_{cur,min,max}_freq r,
|
||||
@{sys}/devices/virtual/thermal/thermal_zone[0-9]*/ r,
|
||||
@{sys}/devices/virtual/thermal/thermal_zone[0-9]*/hwmon[0-9]*/{,*} r,
|
||||
@{sys}/devices/platform/coretemp.[0-9]*/hwmon/hwmon[0-9]*/{,*} r,
|
||||
@{sys}/devices/pci*/*/*/host[0-9]*/*/*/block/*/*/stat r,
|
||||
@{sys}/devices/virtual/block/dm-[0-9]*/stat r,
|
||||
@{sys}/devices/{pci*,virtual}/{,**/}net/*/statistics/{rx,tx}_bytes r,
|
||||
@{sys}/devices/{pci*,virtual}/{,*/*/}net/*/address r,
|
||||
@{sys}/devices/pci*/*/*/usb3/*/*/*/*/power_supply/hidpp_battery_[0-9]*/{,hwmon[0-9]*/} r,
|
||||
|
||||
@{PROC} r,
|
||||
@{PROC}/loadavg r,
|
||||
@{PROC}/uptime r,
|
||||
@{PROC}/@{pid}/comm r,
|
||||
@{PROC}/@{pid}/cmdline r,
|
||||
@{PROC}/@{pid}/stat r,
|
||||
@{PROC}/@{pid}/io r,
|
||||
owner @{PROC}/@{pid}/mounts r,
|
||||
|
||||
include if exists <local/btop>
|
||||
}
|
27
apparmor.d/profiles-g-l/hostapd
Normal file
27
apparmor.d/profiles-g-l/hostapd
Normal file
@ -0,0 +1,27 @@
|
||||
# apparmor.d - Full set of apparmor profiles
|
||||
# SPDX-License-Identifier: GPL-2.0-only
|
||||
|
||||
abi <abi/3.0>,
|
||||
|
||||
include <tunables/global>
|
||||
|
||||
@{exec_path} = /{,usr/}{,s}bin/hostapd
|
||||
profile hostapd @{exec_path} {
|
||||
include <abstractions/base>
|
||||
include <abstractions/nameservice-strict>
|
||||
|
||||
capability net_admin,
|
||||
capability net_raw,
|
||||
|
||||
@{exec_path} mr,
|
||||
|
||||
/dev/rfkill r,
|
||||
|
||||
/etc/hostapd.conf r,
|
||||
/etc/hostapd/{,*} r,
|
||||
|
||||
@{run}/hostapd/{,**} rw,
|
||||
@{run}/hostapd.pid rw,
|
||||
|
||||
include if exists <local/hostapd>
|
||||
}
|
21
apparmor.d/profiles-g-l/lsd
Normal file
21
apparmor.d/profiles-g-l/lsd
Normal file
@ -0,0 +1,21 @@
|
||||
# vim:syntax=apparmor
|
||||
|
||||
abi <abi/3.0>,
|
||||
|
||||
include <tunables/global>
|
||||
|
||||
@{exec_path} = /{,usr/}{,local/}bin/lsd
|
||||
profile lsd @{exec_path} {
|
||||
include <abstractions/base>
|
||||
include <abstractions/nameservice-strict>
|
||||
include <abstractions/consoles>
|
||||
|
||||
capability dac_read_search,
|
||||
|
||||
@{exec_path} mr,
|
||||
|
||||
/ r,
|
||||
/**/ r,
|
||||
|
||||
include if exists <local/lsd>
|
||||
}
|
53
apparmor.d/profiles-m-r/murmurd
Normal file
53
apparmor.d/profiles-m-r/murmurd
Normal file
@ -0,0 +1,53 @@
|
||||
# apparmor.d - Full set of apparmor profiles
|
||||
# SPDX-License-Identifier: GPL-2.0-only
|
||||
|
||||
include <tunables/global>
|
||||
|
||||
@{exec_path} = /{,usr/}{,s}bin/murmurd
|
||||
profile murmurd @{exec_path} {
|
||||
include <abstractions/base>
|
||||
include <abstractions/nameservice-strict>
|
||||
include <abstractions/openssl>
|
||||
include <abstractions/dbus-strict>
|
||||
include <abstractions/ssl_certs>
|
||||
|
||||
capability chown,
|
||||
capability setgid,
|
||||
capability setuid,
|
||||
capability dac_override,
|
||||
capability sys_resource,
|
||||
|
||||
network inet stream,
|
||||
network inet6 stream,
|
||||
network inet dgram,
|
||||
network inet6 dgram,
|
||||
|
||||
@{exec_path} mr,
|
||||
|
||||
/{,usr/}bin/lsb_release Px -> lsb_release,
|
||||
|
||||
dbus send bus=system path=/
|
||||
interface=org.freedesktop.DBus.Peer
|
||||
member=Ping
|
||||
peer=(name=org.freedesktop.Avahi, label=avahi-daemon),
|
||||
|
||||
/etc/mumble-server.ini r,
|
||||
|
||||
owner /var/lib/mumble-server/{,**} rw,
|
||||
owner /var/lib/mumble-server/*.sqlite rwk,
|
||||
|
||||
/var/log/mumble-server/*.log rw,
|
||||
|
||||
owner @{run}/mumble-server/*.pid rw,
|
||||
|
||||
# Silencer
|
||||
deny / r,
|
||||
deny /usr/{,local/}lib/ r,
|
||||
deny /usr/lib32/ r,
|
||||
deny /usr/lib64/ r,
|
||||
|
||||
# file_inherit
|
||||
unix (send, receive) type=stream addr=none peer=(label=lsb_release),
|
||||
|
||||
include if exists <local/murmurd>
|
||||
}
|
31
apparmor.d/profiles-s-z/sslocal
Normal file
31
apparmor.d/profiles-s-z/sslocal
Normal file
@ -0,0 +1,31 @@
|
||||
# apparmor.d - Full set of apparmor profiles
|
||||
# SPDX-License-Identifier: GPL-2.0-only
|
||||
|
||||
# shadowsocks-rust only:
|
||||
# https://github.com/shadowsocks/shadowsocks-rust
|
||||
|
||||
abi <abi/3.0>,
|
||||
|
||||
include <tunables/global>
|
||||
|
||||
@{exec_path} = /{,usr/}{,local/}bin/sslocal
|
||||
profile sslocal @{exec_path} {
|
||||
include <abstractions/base>
|
||||
include <abstractions/nameservice-strict>
|
||||
include <abstractions/consoles>
|
||||
|
||||
@{exec_path} mr,
|
||||
|
||||
network inet stream,
|
||||
network inet6 stream,
|
||||
network inet dgram,
|
||||
network inet6 dgram,
|
||||
|
||||
/etc/shadowsocks-rust/local/*/ss.json{,5} r,
|
||||
|
||||
owner @{user_config_dirs}/shadowsocks-rust/local/*/ss.json{,5} r,
|
||||
|
||||
owner @{PROC}/@{pid}/cgroup r,
|
||||
|
||||
include if exists <local/sslocal>
|
||||
}
|
31
apparmor.d/profiles-s-z/ssmanager
Normal file
31
apparmor.d/profiles-s-z/ssmanager
Normal file
@ -0,0 +1,31 @@
|
||||
# apparmor.d - Full set of apparmor profiles
|
||||
# SPDX-License-Identifier: GPL-2.0-only
|
||||
|
||||
# shadowsocks-rust only:
|
||||
# https://github.com/shadowsocks/shadowsocks-rust
|
||||
|
||||
abi <abi/3.0>,
|
||||
|
||||
include <tunables/global>
|
||||
|
||||
@{exec_path} = /{,usr/}{,local/}bin/ssmanager
|
||||
profile ssmanager @{exec_path} {
|
||||
include <abstractions/base>
|
||||
include <abstractions/nameservice-strict>
|
||||
include <abstractions/consoles>
|
||||
|
||||
network inet stream,
|
||||
network inet6 stream,
|
||||
network inet dgram,
|
||||
network inet6 dgram,
|
||||
|
||||
@{exec_path} mr,
|
||||
|
||||
/etc/shadowsocks-rust/server/*/ss.json{,5} r,
|
||||
|
||||
owner @{user_config_dirs}/shadowsocks-rust/server/*/ss.json{,5} r,
|
||||
|
||||
owner @{PROC}/@{pid}/cgroup r,
|
||||
|
||||
include if exists <local/ssmanager>
|
||||
}
|
30
apparmor.d/profiles-s-z/ssserver
Normal file
30
apparmor.d/profiles-s-z/ssserver
Normal file
@ -0,0 +1,30 @@
|
||||
# apparmor.d - Full set of apparmor profiles
|
||||
# SPDX-License-Identifier: GPL-2.0-only
|
||||
|
||||
# shadowsocks-rust only:
|
||||
# https://github.com/shadowsocks/shadowsocks-rust
|
||||
|
||||
abi <abi/3.0>,
|
||||
|
||||
include <tunables/global>
|
||||
|
||||
@{exec_path} = /{,usr/}{,local/}bin/ssserver
|
||||
profile ssserver @{exec_path} {
|
||||
include <abstractions/base>
|
||||
include <abstractions/nameservice-strict>
|
||||
|
||||
@{exec_path} mr,
|
||||
|
||||
network inet stream,
|
||||
network inet6 stream,
|
||||
network inet dgram,
|
||||
network inet6 dgram,
|
||||
|
||||
/etc/shadowsocks-rust/server/*/ss.json{,5} r,
|
||||
|
||||
owner @{user_config_dirs}/shadowsocks-rust/server/*/ss.json{,5} r,
|
||||
|
||||
owner @{PROC}/@{pid}/cgroup r,
|
||||
|
||||
include if exists <local/ssserver>
|
||||
}
|
18
apparmor.d/profiles-s-z/ssservice
Normal file
18
apparmor.d/profiles-s-z/ssservice
Normal file
@ -0,0 +1,18 @@
|
||||
# apparmor.d - Full set of apparmor profiles
|
||||
# SPDX-License-Identifier: GPL-2.0-only
|
||||
|
||||
# shadowsocks-rust only:
|
||||
# https://github.com/shadowsocks/shadowsocks-rust
|
||||
|
||||
abi <abi/3.0>,
|
||||
|
||||
include <tunables/global>
|
||||
|
||||
@{exec_path} = /{,usr/}{,local/}bin/ssservice
|
||||
profile ssservice @{exec_path} {
|
||||
include <abstractions/base>
|
||||
|
||||
@{exec_path} mr,
|
||||
|
||||
include if exists <local/ssservice>
|
||||
}
|
26
apparmor.d/profiles-s-z/ssurl
Normal file
26
apparmor.d/profiles-s-z/ssurl
Normal file
@ -0,0 +1,26 @@
|
||||
# apparmor.d - Full set of apparmor profiles
|
||||
# SPDX-License-Identifier: GPL-2.0-only
|
||||
|
||||
# shadowsocks-rust only:
|
||||
# https://github.com/shadowsocks/shadowsocks-rust
|
||||
|
||||
abi <abi/3.0>,
|
||||
|
||||
include <tunables/global>
|
||||
|
||||
@{exec_path} = /{,usr/}{,local/}bin/ssurl
|
||||
profile ssurl @{exec_path} {
|
||||
include <abstractions/base>
|
||||
include <abstractions/consoles>
|
||||
|
||||
capability dac_read_search,
|
||||
deny capability dac_override,
|
||||
|
||||
@{exec_path} mr,
|
||||
|
||||
/etc/shadowsocks-rust/{server,local}/*/ss.json{,5} r,
|
||||
|
||||
owner @{user_config_dirs}/shadowsocks-rust/{server,local}/*/ss.json{,5} r,
|
||||
|
||||
include if exists <local/ssurl>
|
||||
}
|
38
apparmor.d/profiles-s-z/yadifad
Normal file
38
apparmor.d/profiles-s-z/yadifad
Normal file
@ -0,0 +1,38 @@
|
||||
# apparmor.d - Full set of apparmor profiles
|
||||
# SPDX-License-Identifier: GPL-2.0-only
|
||||
|
||||
include <tunables/global>
|
||||
|
||||
@{exec_path} = /{,usr/}{,s}bin/yadifad
|
||||
profile yadifad @{exec_path} {
|
||||
include <abstractions/base>
|
||||
include <abstractions/nameservice-strict>
|
||||
include <abstractions/openssl>
|
||||
include <abstractions/nis>
|
||||
|
||||
capability dac_override,
|
||||
capability chown,
|
||||
capability setgid,
|
||||
capability setuid,
|
||||
|
||||
network inet dgram,
|
||||
network inet6 dgram,
|
||||
network netlink raw,
|
||||
|
||||
@{exec_path} mr,
|
||||
|
||||
/etc/yadifa/yadifad.conf r,
|
||||
|
||||
/var/lib/yadifa/** r,
|
||||
owner /var/lib/yadifa/ydf.?????? rw,
|
||||
owner /var/lib/yadifa/keys/ydf.?????? rw,
|
||||
owner /var/lib/yadifa/xfr/ydf.?????? rw,
|
||||
|
||||
/var/log/yadifa/*.log rw,
|
||||
/var/log/yadifa/ydf.?????? rw,
|
||||
|
||||
owner @{run}/yadifa/yadifad.pid rwk,
|
||||
owner @{run}/yadifa/ydf.?????? rw,
|
||||
|
||||
include if exists <local/yadifad>
|
||||
}
|
Loading…
Reference in New Issue
Block a user