Skip to content

Commit

Permalink
Merge pull request #5274 from ChrysoliteAzalea/master
Browse files Browse the repository at this point in the history
Add support for custom AppArmor profiles (--apparmor=)
  • Loading branch information
netblue30 committed Aug 14, 2022
2 parents 40c0f3c + 7f3b6c1 commit b987cf0
Show file tree
Hide file tree
Showing 9 changed files with 39 additions and 7 deletions.
2 changes: 1 addition & 1 deletion contrib/vim/syntax/firejail.vim
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ syn match fjVar /\v\$\{(CFG|DESKTOP|DOCUMENTS|DOWNLOADS|HOME|MUSIC|PATH|PICTURES

" Commands grabbed from: src/firejail/profile.c
" Generate list with: { rg -o 'strn?cmp\(ptr, "([^"]+) "' -r '$1' src/firejail/profile.c; echo private-lib; } | grep -vEx '(include|ignore|caps\.drop|caps\.keep|protocol|restrict-namespaces|seccomp|seccomp\.drop|seccomp\.keep|env|rmenv|net|ip)' | sort -u | tr $'\n' '|' # private-lib is special-cased in the code and doesn't match the regex; grep-ed patterns are handled later with 'syn match nextgroup=' directives (except for include which is special-cased as a fjCommandNoCond keyword)
syn match fjCommand /\v(bind|blacklist|blacklist-nolog|cpu|defaultgw|dns|hostname|hosts-file|ip6|iprange|join-or-start|mac|mkdir|mkfile|mtu|name|netfilter|netfilter6|netmask|nice|noblacklist|noexec|nowhitelist|overlay-named|private|private-bin|private-cwd|private-etc|private-home|private-lib|private-opt|private-srv|read-only|read-write|rlimit-as|rlimit-cpu|rlimit-fsize|rlimit-nofile|rlimit-nproc|rlimit-sigpending|timeout|tmpfs|veth-name|whitelist|xephyr-screen) / skipwhite contained
syn match fjCommand /\v(apparmor|bind|blacklist|blacklist-nolog|cpu|defaultgw|dns|hostname|hosts-file|ip6|iprange|join-or-start|mac|mkdir|mkfile|mtu|name|netfilter|netfilter6|netmask|nice|noblacklist|noexec|nowhitelist|overlay-named|private|private-bin|private-cwd|private-etc|private-home|private-lib|private-opt|private-srv|read-only|read-write|rlimit-as|rlimit-cpu|rlimit-fsize|rlimit-nofile|rlimit-nproc|rlimit-sigpending|timeout|tmpfs|veth-name|whitelist|xephyr-screen) / skipwhite contained
" Generate list with: rg -o 'strn?cmp\(ptr, "([^ "]*[^ ])"' -r '$1' src/firejail/profile.c | grep -vEx '(include|rlimit|quiet)' | sed -e 's/\./\\./' | sort -u | tr $'\n' '|' # include/rlimit are false positives, quiet is special-cased below
syn match fjCommand /\v(allow-debuggers|allusers|apparmor|caps|deterministic-exit-code|deterministic-shutdown|disable-mnt|ipc-namespace|keep-config-pulse|keep-dev-shm|keep-fd|keep-var-tmp|machine-id|memory-deny-write-execute|netfilter|no3d|noautopulse|nodbus|nodvd|nogroups|noinput|nonewprivs|noprinters|noroot|nosound|notv|nou2f|novideo|overlay|overlay-tmpfs|private|private-cache|private-cwd|private-dev|private-lib|private-tmp|seccomp|seccomp\.32|seccomp\.block-secondary|tracelog|writable-etc|writable-run-user|writable-var|writable-var-log|x11)$/ contained
syn match fjCommand /ignore / nextgroup=fjCommand,fjCommandNoCond skipwhite contained
Expand Down
1 change: 1 addition & 0 deletions src/firejail/firejail.h
Original file line number Diff line number Diff line change
Expand Up @@ -338,6 +338,7 @@ extern int arg_writable_run_user; // writable /run/user
extern int arg_writable_var_log; // writable /var/log
extern int arg_appimage; // appimage
extern int arg_apparmor; // apparmor
extern char *apparmor_profile; // apparmor profile
extern int arg_allow_debuggers; // allow debuggers
extern int arg_x11_block; // block X11
extern int arg_x11_xorg; // use X11 security extension
Expand Down
9 changes: 8 additions & 1 deletion src/firejail/main.c
Original file line number Diff line number Diff line change
Expand Up @@ -133,6 +133,7 @@ int arg_writable_run_user = 0; // writable /run/user
int arg_writable_var_log = 0; // writable /var/log
int arg_appimage = 0; // appimage
int arg_apparmor = 0; // apparmor
char *apparmor_profile = NULL; // apparmor profile
int arg_allow_debuggers = 0; // allow debuggers
int arg_x11_block = 0; // block X11
int arg_x11_xorg = 0; // use X11 security extension
Expand Down Expand Up @@ -1287,8 +1288,14 @@ int main(int argc, char **argv, char **envp) {
// filtering
//*************************************
#ifdef HAVE_APPARMOR
else if (strcmp(argv[i], "--apparmor") == 0)
else if (strcmp(argv[i], "--apparmor") == 0) {
arg_apparmor = 1;
apparmor_profile = "firejail-default";
}
else if (strncmp(argv[i], "--apparmor=", 11) == 0) {
arg_apparmor = 1;
apparmor_profile = argv[i] + 11;
}
#endif
else if (strncmp(argv[i], "--protocol=", 11) == 0) {
if (checkcfg(CFG_SECCOMP)) {
Expand Down
11 changes: 11 additions & 0 deletions src/firejail/profile.c
Original file line number Diff line number Diff line change
Expand Up @@ -939,6 +939,17 @@ int profile_check_line(char *ptr, int lineno, const char *fname) {
if (strcmp(ptr, "apparmor") == 0) {
#ifdef HAVE_APPARMOR
arg_apparmor = 1;
apparmor_profile = "firejail-default";
#endif
return 0;
}

if (strncmp(ptr, "apparmor ", 9) == 0) {
#ifdef HAVE_APPARMOR
arg_apparmor = 1;
apparmor_profile = strdup(ptr + 9);
if (!apparmor_profile)
errExit("strdup");
#endif
return 0;
}
Expand Down
2 changes: 1 addition & 1 deletion src/firejail/sandbox.c
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ static void set_caps(void) {
static void set_apparmor(void) {
EUID_ASSERT();
if (checkcfg(CFG_APPARMOR) && arg_apparmor) {
if (aa_change_onexec("firejail-default")) {
if (aa_stack_onexec(apparmor_profile)) {
fwarning("Cannot confine the application using AppArmor.\n"
"Maybe firejail-default AppArmor profile is not loaded into the kernel.\n"
"As root, run \"aa-enforce firejail-default\" to load it.\n");
Expand Down
4 changes: 3 additions & 1 deletion src/firejail/usage.c
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,9 @@ static char *usage_str =
" -- - signal the end of options and disables further option processing.\n"
" --allow-debuggers - allow tools such as strace and gdb inside the sandbox.\n"
" --allusers - all user home directories are visible inside the sandbox.\n"
" --apparmor - enable AppArmor confinement.\n"
" --apparmor - enable AppArmor confinement with the default profile.\n"
" --apparmor=profile_name - enable AppArmor confinement with a\n"
"\tcustom profile.\n"
" --apparmor.print=name|pid - print apparmor status.\n"
" --appimage - sandbox an AppImage application.\n"
#ifdef HAVE_NETWORK
Expand Down
6 changes: 5 additions & 1 deletion src/man/firejail-profile.txt
Original file line number Diff line number Diff line change
Expand Up @@ -478,7 +478,11 @@ Allow tools such as strace and gdb inside the sandbox by whitelisting system cal
#ifdef HAVE_APPARMOR
.TP
\fBapparmor
Enable AppArmor confinement.
Enable AppArmor confinement with the "firejail-default" AppArmor profile.
.TP
\fBapparmor profile_name
Enable AppArmor confinement with a custom AppArmor profile.
Note that the profile in question must already be loaded into the kernel.
#endif
.TP
\fBcaps
Expand Down
8 changes: 7 additions & 1 deletion src/man/firejail.txt
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,13 @@ $ firejail --allusers
#ifdef HAVE_APPARMOR
.TP
\fB\-\-apparmor
Enable AppArmor confinement. For more information, please see \fBAPPARMOR\fR section below.
Enable AppArmor confinement with the "firejail-default" AppArmor profile.
For more information, please see \fBAPPARMOR\fR section below.
.TP
\fB\-\-apparmor=profile_name
Enable AppArmor confinement with a custom AppArmor profile.
Note that profile in question must already be loaded into the kernel.
For more information, please see \fBAPPARMOR\fR section below.
.TP
\fB\-\-apparmor.print=name|pid
Print the AppArmor confinement status for the sandbox identified by name or by PID.
Expand Down
3 changes: 2 additions & 1 deletion src/zsh_completion/_firejail.in
Original file line number Diff line number Diff line change
Expand Up @@ -171,7 +171,8 @@ _firejail_args=(
'--writable-var-log[use the real /var/log directory, not a clone]'

#ifdef HAVE_APPARMOR
'--apparmor[enable AppArmor confinement]'
'--apparmor[enable AppArmor confinement with the default profile]'
'--apparmor=-[enable AppArmor confinement with a custom profile]: :'
'--apparmor.print=-[print apparmor status name|pid]:firejail:_all_firejails'
#endif

Expand Down

0 comments on commit b987cf0

Please sign in to comment.