apparmor.d/apparmor.d/profiles-m-r/pkexec
2023-02-22 21:52:55 +00:00

81 lines
2.4 KiB
Text

# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2019-2022 Mikhail Morfikov
# Copyright (C) 2022 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
abi <abi/3.0>,
include <tunables/global>
@{exec_path} = /{usr/,}bin/pkexec
profile pkexec @{exec_path} {
include <abstractions/base>
include <abstractions/authentication>
include <abstractions/consoles>
include <abstractions/dbus-strict>
include <abstractions/nameservice-strict>
include <abstractions/wutmp>
signal (send) set=(term, kill) peer=polkit-agent-helper,
capability audit_write,
capability dac_read_search,
capability setgid, # gdbus
capability setuid, # gmain
capability sys_ptrace,
capability sys_resource,
audit deny capability sys_nice,
ptrace (read),
network netlink raw,
dbus (send) bus=system path=/org/freedesktop/PolicyKit[0-9]/Authority
interface=org.freedesktop.DBus.Properties
member=GetAll
peer=(name=:*),
dbus (send) bus=system path=/org/freedesktop/PolicyKit[0-9]/Authority
interface=org.freedesktop.PolicyKit[0-9].Authority
member={EnumerateActions,CheckAuthorization,RegisterAuthenticationAgent,UnregisterAuthenticationAgent}
peer=(name=:*),
dbus (receive) bus=system path=/org/freedesktop/PolicyKit[0-9]*/Authority
interface=org.freedesktop.PolicyKit[0-9]*.Authority
member=Changed
peer=(name=:*),
dbus (receive) bus=system path=/org/freedesktop/PolicyKit[0-9]*/AuthenticationAgent
interface=org.freedesktop.PolicyKit[0-9]*.AuthenticationAgent
member=BeginAuthentication
peer=(name=:*),
@{exec_path} mr,
# Apps to be run via pkexec
/{usr/,}{s,}bin/* rPUx,
/{usr/,}lib/gvfs/gvfsd-admin rPUx, #(#FIXME#)
@{libexec}/polkit-agent-helper-[0-9] rPx,
/{usr/,}lib/polkit-agent-helper-[0-9] rPx,
/{usr/,}lib/polkit-[0-9]/polkit-agent-helper-[0-9] rPx,
/{usr/,}lib/update-notifier/package-system-locked rPx,
/usr/share/apport/apport-gtk rPx,
@{libexec}/cc-remote-login-helper rPx,
/etc/shells r,
@{etc_ro}/environment r,
/etc/default/locale r,
@{etc_ro}/security/limits.d/{,*} r,
@{PROC}/@{pids}/stat r,
owner @{PROC}/@{pid}/fd/ r,
# file_inherit
owner /dev/tty[0-9]* rw,
owner @{HOME}/.xsession-errors w,
# Silencer
deny @{user_share_dirs}/gvfs-metadata/* r,
include if exists <local/pkexec>
}