mirror of
https://github.com/roddhjav/apparmor.d.git
synced 2024-11-15 16:03:51 +01:00
269 lines
6.5 KiB
Go
269 lines
6.5 KiB
Go
// apparmor.d - Full set of apparmor profiles
|
|
// Copyright (C) 2021-2023 Alexandre Pujol <alexandre@pujol.io>
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
|
|
|
package aa
|
|
|
|
var (
|
|
// Capability
|
|
capability1Log = map[string]string{
|
|
"apparmor": "ALLOWED",
|
|
"class": "cap",
|
|
"operation": "capable",
|
|
"capname": "net_admin",
|
|
"capability": "12",
|
|
"profile": "pkexec",
|
|
"comm": "pkexec",
|
|
}
|
|
capability1 = &Capability{
|
|
Qualifier: Qualifier{},
|
|
Name: "net_admin",
|
|
}
|
|
capability2 = &Capability{
|
|
Qualifier: Qualifier{},
|
|
Name: "sys_ptrace",
|
|
}
|
|
|
|
// Network
|
|
network1Log = map[string]string{
|
|
"apparmor": "ALLOWED",
|
|
"class": "net",
|
|
"operation": "create",
|
|
"family": "netlink",
|
|
"profile": "sddm-greeter",
|
|
"sock_type": "raw",
|
|
"protocol": "15",
|
|
"requested_mask": "create",
|
|
"denied_mask": "create",
|
|
"comm": "sddm-greeter",
|
|
}
|
|
network1 = &Network{
|
|
Qualifier: Qualifier{},
|
|
Domain: "netlink",
|
|
Type: "raw",
|
|
Protocol: "15",
|
|
AddressExpr: AddressExpr{},
|
|
}
|
|
network2 = &Network{
|
|
Qualifier: Qualifier{},
|
|
Domain: "inet",
|
|
Type: "dgram",
|
|
Protocol: "",
|
|
AddressExpr: AddressExpr{},
|
|
}
|
|
|
|
// Mount
|
|
mount1Log = map[string]string{
|
|
"apparmor": "ALLOWED",
|
|
"class": "mount",
|
|
"operation": "mount",
|
|
"info": "failed perms check",
|
|
"error": "-13",
|
|
"profile": "dockerd",
|
|
"name": "/var/lib/docker/overlay2/opaque-bug-check1209538631/merged/",
|
|
"comm": "dockerd",
|
|
"fstype": "overlay",
|
|
"srcname": "overlay",
|
|
}
|
|
mount2Log = map[string]string{
|
|
"apparmor": "ALLOWED",
|
|
"class": "mount",
|
|
"operation": "mount",
|
|
"info": "failed perms check",
|
|
"error": "-13",
|
|
"profile": "dockerd",
|
|
"name": "/var/lib/docker/overlay2/metacopy-check906831159/merged/",
|
|
"comm": "dockerd",
|
|
"fstype": "overlay",
|
|
"srcname": "overlay",
|
|
}
|
|
mount1 = &Mount{
|
|
Qualifier: Qualifier{},
|
|
MountConditions: MountConditions{
|
|
Fs: "",
|
|
Op: "",
|
|
FsType: "overlay",
|
|
Options: []string{},
|
|
},
|
|
Source: "overlay",
|
|
MountPoint: "/var/lib/docker/overlay2/opaque-bug-check1209538631/merged/",
|
|
}
|
|
mount2 = &Mount{
|
|
Qualifier: Qualifier{},
|
|
MountConditions: MountConditions{
|
|
Fs: "",
|
|
Op: "",
|
|
FsType: "overlay",
|
|
Options: []string{},
|
|
},
|
|
Source: "overlay",
|
|
MountPoint: "/var/lib/docker/overlay2/metacopy-check906831159/merged/",
|
|
}
|
|
|
|
// Signal
|
|
signal1Log = map[string]string{
|
|
"apparmor": "ALLOWED",
|
|
"class": "signal",
|
|
"profile": "firefox",
|
|
"operation": "signal",
|
|
"comm": "49504320492F4F20506172656E74",
|
|
"requested_mask": "receive",
|
|
"denied_mask": "receive",
|
|
"signal": "kill",
|
|
"peer": "firefox//&firejail-default",
|
|
}
|
|
signal1 = &Signal{
|
|
Qualifier: Qualifier{},
|
|
Access: "receive",
|
|
Set: "kill",
|
|
Peer: "firefox//&firejail-default",
|
|
}
|
|
signal2 = &Signal{
|
|
Qualifier: Qualifier{},
|
|
Access: "receive",
|
|
Set: "up",
|
|
Peer: "firefox//&firejail-default",
|
|
}
|
|
|
|
// Ptrace
|
|
ptrace1Log = map[string]string{
|
|
"apparmor": "ALLOWED",
|
|
"class": "ptrace",
|
|
"profile": "xdg-document-portal",
|
|
"operation": "ptrace",
|
|
"comm": "pool-/usr/lib/x",
|
|
"requested_mask": "read",
|
|
"denied_mask": "read",
|
|
"peer": "nautilus",
|
|
}
|
|
ptrace2Log = map[string]string{
|
|
"apparmor": "DENIED",
|
|
"class": "ptrace",
|
|
"operation": "ptrace",
|
|
"comm": "systemd-journal",
|
|
"requested_mask": "readby",
|
|
"denied_mask": "readby",
|
|
"peer": "systemd-journald",
|
|
}
|
|
ptrace1 = &Ptrace{
|
|
Qualifier: Qualifier{},
|
|
Access: "read",
|
|
Peer: "nautilus",
|
|
}
|
|
ptrace2 = &Ptrace{
|
|
Qualifier: Qualifier{},
|
|
Access: "readby",
|
|
Peer: "systemd-journald",
|
|
}
|
|
|
|
// Unix
|
|
unix1Log = map[string]string{
|
|
"apparmor": "ALLOWED",
|
|
"class": "net",
|
|
"family": "unix",
|
|
"operation": "file_perm",
|
|
"profile": "gsettings",
|
|
"comm": "dbus-daemon",
|
|
"requested_mask": "send receive",
|
|
"addr": "none",
|
|
"peer_addr": "@/tmp/dbus-AaKMpxzC4k",
|
|
"peer": "dbus-daemon",
|
|
"denied_mask": "send receive",
|
|
"sock_type": "stream",
|
|
"protocol": "0",
|
|
}
|
|
unix1 = &Unix{
|
|
Access: "send receive",
|
|
Type: "stream",
|
|
Protocol: "0",
|
|
Address: "none",
|
|
Peer: "dbus-daemon",
|
|
PeerAddr: "@/tmp/dbus-AaKMpxzC4k",
|
|
}
|
|
unix2 = &Unix{
|
|
Qualifier: Qualifier{FileInherit: true},
|
|
Access: "receive",
|
|
Type: "stream",
|
|
}
|
|
|
|
// Dbus
|
|
dbus1Log = map[string]string{
|
|
"apparmor": "ALLOWED",
|
|
"operation": "dbus_method_call",
|
|
"bus": "session",
|
|
"path": "/org/gtk/vfs/metadata",
|
|
"interface": "org.gtk.vfs.Metadata",
|
|
"member": "Remove",
|
|
"name": ":1.15",
|
|
"mask": "receive",
|
|
"label": "gvfsd-metadata",
|
|
"peer_pid": "3888",
|
|
"peer_label": "tracker-extract",
|
|
}
|
|
dbus2Log = map[string]string{
|
|
"apparmor": "ALLOWED",
|
|
"operation": "dbus_bind",
|
|
"bus": "session",
|
|
"name": "org.gnome.evolution.dataserver.Sources5",
|
|
"mask": "bind",
|
|
"pid": "3442",
|
|
"label": "evolution-source-registry",
|
|
}
|
|
dbus1 = &Dbus{
|
|
Access: "receive",
|
|
Bus: "session",
|
|
Name: ":1.15",
|
|
Path: "/org/gtk/vfs/metadata",
|
|
Interface: "org.gtk.vfs.Metadata",
|
|
Member: "Remove",
|
|
Label: "tracker-extract",
|
|
}
|
|
dbus2 = &Dbus{
|
|
Access: "bind",
|
|
Bus: "session",
|
|
Name: "org.gnome.evolution.dataserver.Sources5",
|
|
}
|
|
|
|
// File
|
|
file1Log = map[string]string{
|
|
"apparmor": "ALLOWED",
|
|
"operation": "open",
|
|
"class": "file",
|
|
"profile": "cupsd",
|
|
"name": "/usr/share/poppler/cMap/Identity-H",
|
|
"comm": "gs",
|
|
"requested_mask": "r",
|
|
"denied_mask": "r",
|
|
"fsuid": "209",
|
|
"FSUID": "cups",
|
|
"ouid": "0",
|
|
"OUID": "root",
|
|
}
|
|
file2Log = map[string]string{
|
|
"apparmor": "ALLOWED",
|
|
"operation": "open",
|
|
"class": "file",
|
|
"profile": "gsd-print-notifications",
|
|
"name": "/proc/4163/cgroup",
|
|
"comm": "gsd-print-notif",
|
|
"requested_mask": "r",
|
|
"denied_mask": "r",
|
|
"fsuid": "1000",
|
|
"FSUID": "user",
|
|
"ouid": "1000",
|
|
"OUID": "user",
|
|
"error": "-1",
|
|
}
|
|
file1 = &File{
|
|
Path: "/usr/share/poppler/cMap/Identity-H",
|
|
Access: "r",
|
|
Target: "",
|
|
}
|
|
file2 = &File{
|
|
Qualifier: Qualifier{Owner: true, NoNewPrivs: true},
|
|
Path: "/proc/4163/cgroup",
|
|
Access: "r",
|
|
Target: "",
|
|
}
|
|
)
|