mirror of
https://github.com/roddhjav/apparmor.d.git
synced 2024-11-14 23:43:56 +01:00
feat(profile): enable abi 4 rules by default.
This commit is contained in:
parent
5ed4df6916
commit
d6b7bef89e
@ -43,7 +43,7 @@
|
||||
include <abstractions/user-read-strict>
|
||||
include <abstractions/video>
|
||||
|
||||
# userns,
|
||||
userns,
|
||||
|
||||
capability setgid,
|
||||
capability setuid,
|
||||
|
@ -30,7 +30,7 @@
|
||||
include <abstractions/thumbnails-cache-read>
|
||||
include <abstractions/uim>
|
||||
|
||||
# userns,
|
||||
userns,
|
||||
|
||||
capability sys_admin, # If kernel.unprivileged_userns_clone = 1
|
||||
capability sys_chroot, # If kernel.unprivileged_userns_clone = 1
|
||||
|
@ -7,7 +7,7 @@
|
||||
# - the flag: attach_disconnected
|
||||
# - bwrap execution: '@{bin}/bwrap rix,'
|
||||
|
||||
# userns,
|
||||
userns,
|
||||
|
||||
capability net_admin,
|
||||
capability setpcap,
|
||||
|
@ -6,7 +6,7 @@
|
||||
# This abstraction is for chromium based application. Chromium based browsers
|
||||
# need to use abstractions/chromium instead.
|
||||
|
||||
# userns,
|
||||
userns,
|
||||
|
||||
capability setgid, # If kernel.unprivileged_userns_clone = 1
|
||||
capability setuid, # If kernel.unprivileged_userns_clone = 1
|
||||
|
@ -18,7 +18,7 @@
|
||||
include <abstractions/nameservice-strict>
|
||||
include <abstractions/ssl_certs>
|
||||
|
||||
# userns,
|
||||
userns,
|
||||
|
||||
capability setgid, # If kernel.unprivileged_userns_clone = 1
|
||||
capability setuid, # If kernel.unprivileged_userns_clone = 1
|
||||
|
@ -26,7 +26,7 @@ profile nautilus @{exec_path} flags=(attach_disconnected) {
|
||||
include <abstractions/nameservice-strict>
|
||||
include <abstractions/trash-strict>
|
||||
|
||||
# mqueue r type=posix /,
|
||||
mqueue r type=posix /,
|
||||
|
||||
#aa:dbus own bus=session name=org.gnome.Nautilus interface=org.gtk.{Application,Actions}
|
||||
#aa:dbus own bus=session name=org.freedesktop.FileManager1
|
||||
|
@ -28,7 +28,7 @@ profile plasmashell @{exec_path} flags=(mediate_deleted) {
|
||||
include <abstractions/ssl_certs>
|
||||
include <abstractions/thumbnails-cache-read>
|
||||
|
||||
# userns,
|
||||
userns,
|
||||
|
||||
capability sys_ptrace,
|
||||
|
||||
|
@ -13,7 +13,7 @@ profile systemd-coredump @{exec_path} flags=(attach_disconnected,mediate_deleted
|
||||
include <abstractions/nameservice-strict>
|
||||
include <abstractions/common/systemd>
|
||||
|
||||
# userns,
|
||||
userns,
|
||||
|
||||
capability dac_override,
|
||||
capability dac_read_search,
|
||||
|
@ -27,7 +27,7 @@ profile systemd-logind @{exec_path} flags=(attach_disconnected) {
|
||||
|
||||
network netlink raw,
|
||||
|
||||
# mqueue r type=posix /,
|
||||
mqueue r type=posix /,
|
||||
|
||||
unix (bind) type=stream addr=@@{hex16}/bus/systemd-logind/system,
|
||||
|
||||
|
@ -17,7 +17,7 @@ profile package-system-locked @{exec_path} flags=(attach_disconnected) {
|
||||
network inet dgram,
|
||||
network inet6 dgram,
|
||||
|
||||
# mqueue r type=posix /,
|
||||
mqueue r type=posix /,
|
||||
|
||||
ptrace (read),
|
||||
|
||||
|
@ -10,7 +10,7 @@ include <tunables/global>
|
||||
profile virtiofsd @{exec_path} {
|
||||
include <abstractions/base>
|
||||
|
||||
# userns,
|
||||
userns,
|
||||
|
||||
capability chown,
|
||||
capability dac_override,
|
||||
|
@ -18,7 +18,7 @@ profile flatpak @{exec_path} flags=(attach_disconnected,mediate_deleted,complain
|
||||
include <abstractions/nameservice-strict>
|
||||
include <abstractions/ssl_certs>
|
||||
|
||||
# userns,
|
||||
userns,
|
||||
|
||||
capability dac_override,
|
||||
capability dac_read_search,
|
||||
|
@ -23,7 +23,7 @@ profile lvm @{exec_path} flags=(attach_disconnected) {
|
||||
|
||||
ptrace (read),
|
||||
|
||||
# mqueue r type=posix /,
|
||||
mqueue r type=posix /,
|
||||
|
||||
@{exec_path} rm,
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user