# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2024 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only
# LOGPROF-SUGGEST: no

# Minimal set of rules for sudo.

  abi <abi/4.0>,

  include <abstractions/authentication>
  include <abstractions/bus-system>
  include <abstractions/consoles>
  include <abstractions/nameservice-strict>
  include <abstractions/wutmp>
  include <abstractions/devices-usb>

  capability audit_write,
  capability dac_override,
  capability dac_read_search,
  capability net_admin,
  capability setgid,
  capability setuid,
  capability sys_resource,

  network netlink raw,   # PAM

  unix type=stream addr=@@{udbus}/bus/sudo/system,

  unix type=stream addr=none peer=(label="@{p_systemd_homed}", addr=none),

  dbus (send receive) bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.home1{,.*}
       peer=(name="{@{busname},org.freedesktop.home1{,.*}}", label="@{p_systemd_homed}"),
  dbus (send receive) bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.Properties
       member={Get,GetAll,Set,PropertiesChanged}
       peer=(name="{@{busname},org.freedesktop.home1{,.*}}", label="@{p_systemd_homed}"),
  dbus send bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.Introspectable
       member=Introspect
       peer=(name="{@{busname},org.freedesktop.home1{,.*}}", label="@{p_systemd_homed}"),
  dbus send bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.ObjectManager
       member=GetManagedObjects
       peer=(name="{@{busname},org.freedesktop.home1{,.*}}", label="@{p_systemd_homed}"),
  dbus receive bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.ObjectManager
       member={InterfacesAdded,InterfacesRemoved}
       peer=(name="{@{busname},org.freedesktop.home1{,.*}}", label="@{p_systemd_homed}"),
  unix type=stream addr=none peer=(label="@{p_systemd_logind}", addr=none),

  dbus (send receive) bus=system path=/org/freedesktop/login1{,/**}
       interface=org.freedesktop.login1{,.*}
       peer=(name="{@{busname},org.freedesktop.login1{,.*}}", label="@{p_systemd_logind}"),
  dbus (send receive) bus=system path=/org/freedesktop/login1{,/**}
       interface=org.freedesktop.DBus.Properties
       member={Get,GetAll,Set,PropertiesChanged}
       peer=(name="{@{busname},org.freedesktop.login1{,.*}}", label="@{p_systemd_logind}"),
  dbus send bus=system path=/org/freedesktop/login1{,/**}
       interface=org.freedesktop.DBus.Introspectable
       member=Introspect
       peer=(name="{@{busname},org.freedesktop.login1{,.*}}", label="@{p_systemd_logind}"),
  dbus send bus=system path=/org/freedesktop/login1{,/**}
       interface=org.freedesktop.DBus.ObjectManager
       member=GetManagedObjects
       peer=(name="{@{busname},org.freedesktop.login1{,.*}}", label="@{p_systemd_logind}"),
  dbus receive bus=system path=/org/freedesktop/login1{,/**}
       interface=org.freedesktop.DBus.ObjectManager
       member={InterfacesAdded,InterfacesRemoved}
       peer=(name="{@{busname},org.freedesktop.login1{,.*}}", label="@{p_systemd_logind}"),

  dbus (send receive) bus=session path=/org/freedesktop/systemd1
         interface=org.freedesktop.systemd.Manager
         member={JobRemoved,StartTransientUnit},

  @{bin}/sudo     mr,
  @{lib}/sudo/**  mr,

  @{etc_ro}/sudo.conf r,
  @{etc_ro}/sudoers r,
  @{etc_ro}/sudoers.d/{,*} r,

  / r,
  /etc/machine-id r,

        /var/db/sudo/lectured/ r,
  owner /var/lib/sudo/ts/ rw,
  owner /var/lib/sudo/ts/@{uid} rwk,
  owner /var/log/sudo.log wk,

  owner @{HOME}/.sudo_as_admin_successful rw,

  # yubikey support
        @{HOME}/.yubico/ r,
  owner @{HOME}/.yubico/challenge-* rw,

        @{run}/faillock/ rw,
        @{run}/faillock/@{user} rwk,
  owner @{run}/sudo/ rw,
  owner @{run}/sudo/ts/ rw,
  owner @{run}/sudo/ts/@{uid} rwk,

  @{PROC}/@{pid}/limits r,
  @{PROC}/@{pid}/loginuid r,
  @{PROC}/@{pid}/stat r,
  @{PROC}/sys/kernel/seccomp/actions_avail r,

        /dev/ r,
        /dev/ptmx rwk,
        /dev/tty rwk,
  owner /dev/tty@{int} rw,

  deny @{user_share_dirs}/gvfs-metadata/* r,

  include if exists <abstractions/app/sudo.d>

# vim:syntax=apparmor
