Merge pull request #6871 from joachifm/apparmor-fixups

Apparmor fixups
This commit is contained in:
Austin Seipp 2015-03-20 15:36:42 -05:00
commit 3ff22a924f
2 changed files with 16 additions and 41 deletions

View File

@ -6,37 +6,26 @@ let
in in
{ {
#### interface
options = { options = {
security.apparmor = { security.apparmor = {
enable = mkOption { enable = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = "Enable the AppArmor Mandatory Access Control system."; description = "Enable the AppArmor Mandatory Access Control system.";
}; };
profiles = mkOption { profiles = mkOption {
type = types.listOf types.path; type = types.listOf types.path;
default = []; default = [];
description = "List of files containing AppArmor profiles."; description = "List of files containing AppArmor profiles.";
}; };
};
}; };
};
#### implementation
config = mkIf cfg.enable { config = mkIf cfg.enable {
environment.systemPackages = [ pkgs.apparmor-utils ];
environment.systemPackages = [
pkgs.apparmor-utils
];
systemd.services.apparmor = { systemd.services.apparmor = {
wantedBy = [ "local-fs.target" ]; wantedBy = [ "local-fs.target" ];
serviceConfig = { serviceConfig = {
Type = "oneshot"; Type = "oneshot";
RemainAfterExit = "yes"; RemainAfterExit = "yes";
@ -50,12 +39,11 @@ in
}; };
security.pam.services.apparmor.text = '' security.pam.services.apparmor.text = ''
## The AppArmor service changes hats according to order: first try ## AppArmor changes hats according to `order`: first try user, then
## user, then group, and finally fall back to a hat called "DEFAULT" ## group, and finally fall back to a hat called "DEFAULT"
## ##
## For now, enable debugging as this is an experimental feature. ## For now, enable debugging as this is an experimental feature.
session optional ${pkgs.apparmor-pam}/lib/security/pam_apparmor.so order=user,group,default debug session optional ${pkgs.apparmor-pam}/lib/security/pam_apparmor.so order=user,group,default debug
''; '';
}; };
} }

View File

@ -20,6 +20,13 @@ let
sha256 = "a63b8724c36c29ed438c9e3ca403bfeeb6c998a45990e300aa1b10faa23a0a22"; sha256 = "a63b8724c36c29ed438c9e3ca403bfeeb6c998a45990e300aa1b10faa23a0a22";
}; };
prePatchCommon = ''
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2man" "${perl}/bin/pod2man"
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2html" "${perl}/bin/pod2html"
substituteInPlace ./common/Make.rules --replace "/usr/include/linux/capability.h" "${glibc}/include/linux/capability.h"
substituteInPlace ./common/Make.rules --replace "/usr/share/man" "share/man"
'';
libapparmor = stdenv.mkDerivation { libapparmor = stdenv.mkDerivation {
name = "libapparmor-${apparmor-version}"; name = "libapparmor-${apparmor-version}";
src = apparmor-sources; src = apparmor-sources;
@ -39,19 +46,12 @@ let
which which
]; ];
prePatch = '' prePatch = prePatchCommon + ''
### common
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2man" "${perl}/bin/pod2man"
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2html" "${perl}/bin/pod2html"
substituteInPlace ./common/Make.rules --replace "/usr/include/linux/capability.h" "${glibc}/include/linux/capability.h"
### libapparmor
substituteInPlace ./libraries/libapparmor/src/Makefile.am --replace "/usr/include/netinet/in.h" "${glibc}/include/netinet/in.h" substituteInPlace ./libraries/libapparmor/src/Makefile.am --replace "/usr/include/netinet/in.h" "${glibc}/include/netinet/in.h"
substituteInPlace ./libraries/libapparmor/src/Makefile.in --replace "/usr/include/netinet/in.h" "${glibc}/include/netinet/in.h" substituteInPlace ./libraries/libapparmor/src/Makefile.in --replace "/usr/include/netinet/in.h" "${glibc}/include/netinet/in.h"
''; '';
buildPhase = '' buildPhase = ''
### libapparmor
cd ./libraries/libapparmor cd ./libraries/libapparmor
./autogen.sh ./autogen.sh
./configure --prefix="$out" --with-python ./configure --prefix="$out" --with-python
@ -75,12 +75,7 @@ let
which which
]; ];
prePatch = '' prePatch = prePatchCommon;
### common
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2man" "${perl}/bin/pod2man"
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2html" "${perl}/bin/pod2html"
substituteInPlace ./common/Make.rules --replace "/usr/include/linux/capability.h" "${glibc}/include/linux/capability.h"
'';
buildPhase = '' buildPhase = ''
cd ./utils cd ./utils
@ -88,7 +83,7 @@ let
''; '';
installPhase = '' installPhase = ''
make install LANGS="" DESTDIR="$out" BINDIR="$out/bin" make install LANGS="" DESTDIR="$out" BINDIR="$out/bin" VIM_INSTALL_PATH="$out/share" PYPREFIX=""
''; '';
meta = apparmor-meta "user-land utilities"; meta = apparmor-meta "user-land utilities";
@ -105,13 +100,7 @@ let
which which
]; ];
prePatch = '' prePatch = prePatchCommon + ''
### common
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2man" "${perl}/bin/pod2man"
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2html" "${perl}/bin/pod2html"
substituteInPlace ./common/Make.rules --replace "/usr/include/linux/capability.h" "${glibc}/include/linux/capability.h"
### apparmor-parser
substituteInPlace ./parser/Makefile --replace "/usr/bin/bison" "${bison}/bin/bison" substituteInPlace ./parser/Makefile --replace "/usr/bin/bison" "${bison}/bin/bison"
substituteInPlace ./parser/Makefile --replace "/usr/bin/flex" "${flex}/bin/flex" substituteInPlace ./parser/Makefile --replace "/usr/bin/flex" "${flex}/bin/flex"
substituteInPlace ./parser/Makefile --replace "/usr/include/linux/capability.h" "${glibc}/include/linux/capability.h" substituteInPlace ./parser/Makefile --replace "/usr/include/linux/capability.h" "${glibc}/include/linux/capability.h"
@ -158,9 +147,7 @@ let
name = "apparmor-profiles-${apparmor-version}"; name = "apparmor-profiles-${apparmor-version}";
src = apparmor-sources; src = apparmor-sources;
buildInputs = [ buildInputs = [ which ];
which
];
buildPhase = '' buildPhase = ''
cd ./profiles cd ./profiles
@ -168,7 +155,7 @@ let
''; '';
installPhase = '' installPhase = ''
make install DESTDIR="$out" make install DESTDIR="$out" EXTRAS_DEST="$out/share/apparmor/extra-profiles"
''; '';
meta = apparmor-meta "profiles"; meta = apparmor-meta "profiles";