File: userns.cc

package info (click to toggle)
apparmor 4.1.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 34,800 kB
  • sloc: ansic: 24,940; python: 24,595; sh: 12,524; cpp: 9,024; yacc: 2,061; makefile: 1,921; lex: 1,215; pascal: 1,145; perl: 1,033; ruby: 365; lisp: 282; exp: 250; java: 212; xml: 159
file content (117 lines) | stat: -rw-r--r-- 2,669 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
/*
 *   Copyright (c) 2022
 *   Canonical, Ltd. (All rights reserved)
 *
 *   This program is free software; you can redistribute it and/or
 *   modify it under the terms of version 2 of the GNU General Public
 *   License published by the Free Software Foundation.
 *
 *   This program is distributed in the hope that it will be useful,
 *   but WITHOUT ANY WARRANTY; without even the implied warranty of
 *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 *   GNU General Public License for more details.
 *
 *   You should have received a copy of the GNU General Public License
 *   along with this program; if not, contact Novell, Inc. or Canonical
 *   Ltd.
 */

#include "parser.h"
#include "profile.h"
#include "userns.h"

#include <iomanip>
#include <string>
#include <iostream>
#include <sstream>

void userns_rule::move_conditionals(struct cond_entry *conds)
{
	struct cond_entry *cond_ent;

	list_for_each(conds, cond_ent) {
		/* for now disallow keyword 'in' (list) */
		if (!cond_ent->eq)
			yyerror("keyword \"in\" is not allowed in userns rules\n");

		/* no valid conditionals atm */
		yyerror("invalid userns rule conditional \"%s\"\n",
			cond_ent->name);
	}
}

userns_rule::userns_rule(perm32_t perms_p, struct cond_entry *conds):
	perms_rule_t(AA_CLASS_NS)
{
	if (perms_p) {
		if (perms_p & ~AA_VALID_USERNS_PERMS)
			yyerror("perms contains invalid permissions for userns\n");
		perms = perms_p;

	} else {
		/* default to all perms */
		perms = AA_VALID_USERNS_PERMS;
	}

	move_conditionals(conds);
	free_cond_list(conds);
}

ostream &userns_rule::dump(ostream &os)
{
	class_rule_t::dump(os);

	if (perms != AA_VALID_USERNS_PERMS) {
		if (perms & AA_USERNS_CREATE)
			os << " create";
	}

	os << ",\n";

	return os;
}


int userns_rule::expand_variables(void)
{
	return 0;
}

void userns_rule::warn_once(const char *name)
{
	rule_t::warn_once(name, "userns rules not enforced");
}

int userns_rule::gen_policy_re(Profile &prof)
{
	std::ostringstream buffer;
	std::string buf;

	if (!features_supports_userns) {
		warn_once(prof.name);
		return RULE_NOT_SUPPORTED;
	}

	buffer << "\\x" << std::setfill('0') << std::setw(2) << std::hex << AA_CLASS_NS;
	buf = buffer.str();
	if (perms & AA_VALID_USERNS_PERMS) {
		if (!prof.policy.rules->add_rule(buf.c_str(), priority,
					rule_mode, perms,
					audit == AUDIT_FORCE ? perms : 0,
					parseopts))

			goto fail;
		/* add a mediates_userns rule for every rule added. It
		 * needs to be the same priority
		 */
		if (!prof.policy.rules->add_rule(buf.c_str(), priority,
					RULE_ALLOW, AA_MAY_READ, 0,
					parseopts))
			goto fail;
	}

	return RULE_OK;

fail:
	return RULE_ERROR;
}