# apparmor.d - Full set of apparmor profiles
# Copyright (C) 2022-2024 Alexandre Pujol <alexandre@pujol.io>
# SPDX-License-Identifier: GPL-2.0-only

abi <abi/4.0>,

include <tunables/global>

@{exec_path} = @{lib}/systemd/systemd-homed
profile systemd-homed /{,usr/}lib{,exec,32,64}/systemd/systemd-homed  flags=(attach_disconnected,complain) {
  include <abstractions/base>
  include <abstractions/bus-system>
  include <abstractions/disks-write>
  include <abstractions/nameservice-strict>
  include <abstractions/common/systemd>

  capability chown,
  capability dac_override,
  capability dac_read_search,
  capability fowner,
  capability fsetid,
  capability setfcap,
  capability setgid,
  capability setpcap,
  capability setuid,
  capability sys_admin,
  capability sys_resource,

  network inet dgram,
  network inet6 dgram,
  network inet raw,
  network inet6 raw,
  network netlink raw,

  mount options=(rw, rslave) -> @{run}/,
  mount /dev/dm-@{int} -> @{run}/systemd/user-home-mount/,

  dbus bind bus=system name=org.freedesktop.home1{,.*},
  dbus receive bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.home1{,.*}
       peer=(name=":1.@{int}"),
  dbus receive bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.Properties
       peer=(name=":1.@{int}"),
  dbus receive bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.ObjectManager
       peer=(name=":1.@{int}"),
  dbus send bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.home1{,.*}
       peer=(name="{:1.@{int},org.freedesktop.DBus}"),
  dbus send bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.Properties
       peer=(name="{:1.@{int},org.freedesktop.DBus}"),
  dbus send bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.ObjectManager
       peer=(name="{:1.@{int},org.freedesktop.DBus}"),
  dbus receive bus=system path=/org/freedesktop/home1{,/**}
       interface=org.freedesktop.DBus.Introspectable
       member=Introspect
       peer=(name=":1.@{int}"),

  @{exec_path} mr,

  @{lib}/systemd/systemd-homework rPx,
  @{bin}/mkfs.btrfs rPx,
  @{bin}/mkfs.fat   rPx,
  @{bin}/mke2fs     rPx,

  /etc/machine-id r,
  /etc/systemd/homed.conf r,
  /etc/skel/{,**} r,

  /var/lib/systemd/home/{,**} rw,

  / r,
  @{HOMEDIRS}/ r,
  @{HOMEDIRS}/* rw,
  @{HOMEDIRS}/*.homedir/ rw,

  @{run}/ r,
  @{run}/cryptsetup/{,*} rwk,
  @{run}/systemd/home/{,**} rw,
  @{run}/systemd/userdb/io.systemd.home r,
  @{run}/systemd/user-home-mount/{,**} rw,

  @{sys}/bus/ r,
  @{sys}/fs/ r,
  @{sys}/class/ r,
  @{sys}/kernel/uevent_seqnum r,
  @{sys}/devices/**/read_ahead_kb r,

        @{PROC}/@{pid}/cgroup r,
        @{PROC}/devices r,
        @{PROC}/pressure/* r,
        @{PROC}/sysvipc/{shm,sem,msg} r,
  owner @{PROC}/@{pid}/gid_map w,
  owner @{PROC}/@{pid}/mountinfo r,
  owner @{PROC}/@{pid}/uid_map w,

  /dev/loop-control rwk,
  /dev/loop@{int} rw,
  /dev/mapper/control rw,
  /dev/mqueue/ r,
  /dev/shm/ r,

  include if exists <local/systemd-homed>
}