File: task.yaml

package info (click to toggle)
apparmor 4.1.6-2
  • links: PTS, VCS
  • area: main
  • in suites: forky
  • size: 29,884 kB
  • sloc: ansic: 24,945; python: 24,914; cpp: 9,140; sh: 8,175; yacc: 2,061; makefile: 1,908; lex: 1,215; pascal: 1,147; perl: 1,033; ruby: 365; lisp: 282; exp: 250; java: 212; xml: 159
file content (51 lines) | stat: -rw-r--r-- 1,598 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
summary: check runtime behavior of owner rules
systems:
  - ubuntu-cloud-22.04
  - ubuntu-cloud-24.04
prepare: |
  ../../../parser/apparmor_parser \
    --base ../../../profiles/apparmor.d \
    --config-file ../../../parser/parser.conf \
    --warn all \
    --Werror \
    --skip-cache \
    --skip-kernel-load \
    --verbose \
    --ofile owner.bin \
    owner.aa
  ../../../parser/apparmor_parser \
    --skip-cache \
    --replace \
    --verbose \
    --binary \
    owner.bin
execute: |
  dmesg -c >/dev/null

  echo "Confined root can read and write the file (confined root has both permissions, file is owned by root.)"
  echo "Hello, World!" | aa-exec -p test-owner busybox tee /foo
  aa-exec -p test-owner busybox cat /foo | MATCH "Hello, World!"

  echo "Chown the file to non-root user and group so that owner checks will no longer match."
  chmod -v 666 /foo
  chown -v 1000:1000 /foo

  echo "Confined root can still read the file (non-owner has read permission)."
  aa-exec -p test-owner busybox cat /foo | MATCH "Hello, World!"
  if echo "Goodbye, World!" | aa-exec -p test-owner busybox tee /foo; then
    echo "Confined root process was able to write to the file despite owner constraint, test failed." >&2
    exit 1
  fi

  echo "The file still has the original content."
  MATCH "Hello, World!" /foo

restore: |
  echo -n test-owner >/sys/kernel/security/apparmor/.remove
  rm -f /foo
  rm -f owner.bin

debug: |
  snap install --beta apparmor-insight
  /snap/apparmor-insight/current/bin/apparmor-insight \
    info -0 owner.bin | grep "profile\\[0\\].file.hfa.accept[12] "