# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2022-2024 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only

abi <abi/4.0>,

include <tunables/global>

@{exec_path} = @{lib}/systemd/systemd-homed
@{att} = /att/systemd-homed/
profile systemd-homed /{,usr/}lib{,exec,32,64}/systemd/systemd-homed  flags=(attach_disconnected,attach_disconnected.path=@{att},complain) {
  include <abstractions/attached/base>
  include <abstractions/bus-system>
  include <abstractions/disks-write>
  include <abstractions/attached/nameservice-strict>
  include <abstractions/common/systemd>

  userns,

  capability chown,
  capability dac_override,
  capability dac_read_search,
  capability fowner,
  capability fsetid,
  capability setfcap,
  capability setgid,
  capability setpcap,
  capability setuid,
  capability sys_admin,
  capability sys_ptrace,
  capability sys_resource,

  network inet dgram,
  network inet6 dgram,
  network inet raw,
  network inet6 raw,
  network netlink raw,

  mount                                                           -> @{run}/systemd/user-home-mount/,
  mount options=(rw bind) @{run}/systemd/user-home-mount/@{user}/ -> @{HOME}/,
  mount options=(rw make-rslave)                                     @{run}/,
  mount options=(rw move)                                         -> @{run}/systemd/user-home-mount/@{user}/,
  mount options=(rw private)                                      -> @{run}/systemd/user-home-mount/,

  umount @{HOME}/,
  umount @{run}/systemd/user-home-mount/,
  umount @{run}/systemd/user-home-mount/@{user}/,

  signal (send receive) set=kill peer=systemd-homed//&systemd-homework,

  ptrace read peer=systemd-homed//&systemd-homework,

  unix bind type=dgram  addr=@@{udbus},
  unix bind type=stream addr=@@{udbus}/bus/systemd-homed/system,
  unix receive type=dgram addr=@@{int}@{int} peer=(label=systemd-homework),

  include <abstractions/bus/system/own>

  dbus bind bus=system name=org.freedesktop.home1{,.*},
  dbus receive bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.home1{,.*}
       peer=(name="@{busname}"),
  dbus send bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.home1{,.*}
       peer=(name="{@{busname},org.freedesktop.DBus}"),
  dbus (send receive) bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.Properties
       member={Get,GetAll,Set,PropertiesChanged}
       peer=(name="{@{busname},org.freedesktop.DBus}"),
  dbus receive bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.Introspectable
       member=Introspect
       peer=(name="{@{busname},org.freedesktop.DBus}"),
  dbus receive bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.ObjectManager
       member=GetManagedObjects
       peer=(name="{@{busname},org.freedesktop.DBus}"),
  dbus send bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.ObjectManager
       member={InterfacesAdded,InterfacesRemoved}
       peer=(name="{@{busname},org.freedesktop.DBus}"),
  unix type=stream peer=(label=polkitd),

  dbus (send receive) bus=system path=/org/freedesktop/PolicyKit1{,/**}
       interface=org.freedesktop.PolicyKit1{,.*}
       peer=(name="{@{busname},org.freedesktop.PolicyKit1{,.*}}", label=polkitd),
  dbus (send receive) bus=system path=/org/freedesktop/PolicyKit1{,/**}
       interface=org.freedesktop.DBus.Properties
       member={Get,GetAll,Set,PropertiesChanged}
       peer=(name="{@{busname},org.freedesktop.PolicyKit1{,.*}}", label=polkitd),
  dbus send bus=system path=/org/freedesktop/PolicyKit1{,/**}
       interface=org.freedesktop.DBus.Introspectable
       member=Introspect
       peer=(name="{@{busname},org.freedesktop.PolicyKit1{,.*}}", label=polkitd),
  dbus send bus=system path=/org/freedesktop/PolicyKit1{,/**}
       interface=org.freedesktop.DBus.ObjectManager
       member=GetManagedObjects
       peer=(name="{@{busname},org.freedesktop.PolicyKit1{,.*}}", label=polkitd),
  dbus receive bus=system path=/org/freedesktop/PolicyKit1{,/**}
       interface=org.freedesktop.DBus.ObjectManager
       member={InterfacesAdded,InterfacesRemoved}
       peer=(name="{@{busname},org.freedesktop.PolicyKit1{,.*}}", label=polkitd),

  @{exec_path} mr,

  @{lib}/systemd/systemd-homework  px -> systemd-homed//&systemd-homework,
  @{sbin}/mkfs.fat                 px,
  @{sbin}/mke2fs                   px,

  # nnp
  @{bin}/fsck.* rix,
  @{bin}/mkfs.*  ix,

  /etc/fstab r,
  /etc/machine-id r,
  /etc/security/pwquality.conf r,
  /etc/security/pwquality.conf.d/{,**} r,
  /etc/skel/{,**} r,
  /etc/systemd/homed.conf r,

  /var/cache/systemd/home/{,**} rw,
  /var/lib/systemd/home/{,**} rw,

  @{att}/ r,
  @{att}/@{HOMEDIRS}/@{user}.home rw,

  / r,
  @{HOMEDIRS}/ r,
  @{HOMEDIRS}/* rw,
  @{HOMEDIRS}/*.homedir/ rw,
  @{HOMEDIRS}/@{user}.home k,

  @{HOME}/ rw,
  @{HOME}/.#.identity-blob@{hex16}/ rw,
  @{HOME}/.#.identity@{hex16} rw,
  @{HOME}/.identity rw,
  @{HOME}/.identity-blob/ w,

  @{run}/ r,
  @{run}/cryptsetup/{,*} rwk,
  @{run}/systemd/home/{,**} rw,
  @{run}/systemd/userdb/io.systemd.home r,
  @{run}/systemd/user-home-mount/{,**} rw,

  @{sys}/bus/ r,
  @{sys}/class/ r,
  @{sys}/devices/**/read_ahead_kb r,
  @{sys}/devices/**/uevent r,
  @{sys}/fs/ r,
  @{sys}/kernel/uevent_seqnum r,

        @{PROC}/@{pid}/cgroup r,
        @{PROC}/@{pid}/setgroups w,
        @{PROC}/devices r,
        @{PROC}/pressure/* r,
        @{PROC}/swaps r,
        @{PROC}/sys/fs/nr_open r,
        @{PROC}/sysvipc/{shm,sem,msg} r,
  owner @{PROC}/@{pid}/gid_map w,
  owner @{PROC}/@{pid}/mountinfo r,
  owner @{PROC}/@{pid}/mounts r,
  owner @{PROC}/@{pid}/uid_map w,

  @{att}/dev/loop@{int} rw,
  /dev/btrfs-control rw,
  /dev/loop-control rwk,
  /dev/mapper/control rw,
  /dev/mqueue/ r,
  /dev/shm/ r,
  /dev/tty rw,

  include if exists <local/systemd-homed>
}

# vim:syntax=apparmor
