Blob Blame History Raw
########################################
#
# Rules and Targets for building monolithic policies
#

POLICY_CONF = $(BUILDDIR)/policy.conf
FC = $(BUILDDIR)/file_contexts
POLVER = policy.$(PV)
HOMEDIR_TEMPLATE = $(BUILDDIR)/homedir_template

# install paths
POLICYPATH = $(INSTALLDIR)/policy
LOADPATH = $(POLICYPATH)/$(POLVER)
HOMEDIRPATH = $(CONTEXTPATH)/files/homedir_template

APPFILES += $(INSTALLDIR)/booleans

# for monolithic policy use all base and module to create policy
ALL_MODULES := $(strip $(BASE_MODS) $(MOD_MODS))

ALL_INTERFACES := $(ALL_MODULES:.te=.if)
ALL_TE_FILES := $(ALL_MODULES)
ALL_FC_FILES := $(ALL_MODULES:.te=.fc)

PRE_TE_FILES := $(SECCLASS) $(ISIDS) $(AVS) $(M4SUPPORT) $(POLDIR)/mls $(POLDIR)/mcs
POST_TE_FILES := $(USER_FILES) $(POLDIR)/constraints

POLICY_SECTIONS := $(TMPDIR)/pre_te_files.conf $(TMPDIR)/generated_definitions.conf $(TMPDIR)/all_interfaces.conf $(TMPDIR)/all_attrs_types.conf $(GLOBALBOOL) $(GLOBALTUN) $(TMPDIR)/only_te_rules.conf $(TMPDIR)/all_post.conf

# search layer dirs for source files
vpath %.te $(ALL_LAYERS)
vpath %.if $(ALL_LAYERS)
vpath %.fc $(ALL_LAYERS)

########################################
#
# default action: build policy locally
#
default: policy

policy: $(POLVER)

install: $(LOADPATH) $(FCPATH) $(APPFILES) $(USERPATH)/local.users

load: $(TMPDIR)/load

checklabels: $(FCPATH)
restorelabels: $(FCPATH)
relabel:  $(FCPATH)
resetlabels:  $(FCPATH)

########################################
#
# Build a binary policy locally
#
$(POLVER): $(POLICY_CONF)
	@echo "Compiling $(NAME) $(POLVER)"
ifneq ($(PV),$(KV))
	@echo
	@echo "WARNING: Policy version mismatch!  Is your OUTPUT_POLICY set correctly?"
	@echo
endif
	$(verbose) $(CHECKPOLICY) $^ -o $(BUILDDIR)/$@

########################################
#
# Install a binary policy
#
$(LOADPATH): $(POLICY_CONF)
	@mkdir -p $(POLICYPATH)
	@echo "Compiling and installing $(NAME) $(LOADPATH)"
ifneq ($(PV),$(KV))
	@echo
	@echo "WARNING: Policy version mismatch!  Is your OUTPUT_POLICY set correctly?"
	@echo
endif
	$(verbose) $(CHECKPOLICY) $^ -o $@

########################################
#
# Load the binary policy
#
reload $(TMPDIR)/load: $(LOADPATH) $(FCPATH) $(APPFILES)
	@echo "Loading $(NAME) $(LOADPATH)"
	$(verbose) $(LOADPOLICY) -q $(LOADPATH)
	@touch $(TMPDIR)/load

########################################
#
# Construct a monolithic policy.conf
#
$(POLICY_CONF): $(POLICY_SECTIONS)
	@echo "Creating $(NAME) $(@F)"
	@test -d $(TMPDIR) || mkdir -p $(TMPDIR)
	@test -d $(BUILDDIR) || mkdir -p $(BUILDDIR)
# checkpolicy can use the #line directives provided by -s for error reporting:
	$(verbose) m4 -D self_contained_policy $(M4PARAM) -s $^ > $(TMPDIR)/$(@F).tmp
	$(verbose) sed -e /^portcon/d -e /^nodecon/d -e /^netifcon/d < $(TMPDIR)/$(@F).tmp > $@
# the ordering of these ocontexts matters:
	$(verbose) grep ^portcon $(TMPDIR)/$(@F).tmp >> $@ || true
	$(verbose) grep ^netifcon $(TMPDIR)/$(@F).tmp >> $@ || true
	$(verbose) grep ^nodecon $(TMPDIR)/$(@F).tmp >> $@ || true

$(TMPDIR)/pre_te_files.conf: $(PRE_TE_FILES)
	@test -d $(TMPDIR) || mkdir -p $(TMPDIR)
	$(verbose) cat $^ > $@

$(TMPDIR)/generated_definitions.conf: $(ALL_LAYERS) $(ALL_TE_FILES)
# per-userdomain templates:
	@test -d $(TMPDIR) || mkdir -p $(TMPDIR)
	$(verbose) echo "define(\`base_per_userdomain_template',\`" > $@
	$(verbose) for i in $(patsubst %.te,%,$(notdir $(ALL_MODULES))); do \
		echo "ifdef(\`""$$i""_per_userdomain_template',\`""$$i""_per_userdomain_template("'$$*'")')" \
			>> $@ ;\
	done
	$(verbose) echo "')" >> $@
# define foo.te
	$(verbose) for i in $(notdir $(ALL_MODULES)); do \
		echo "define(\`$$i')" >> $@ ;\
	done
	$(verbose) test -f $(BOOLEANS) && $(SETBOOLS) $(BOOLEANS) >> $@

$(TMPDIR)/all_interfaces.conf: $(M4SUPPORT) $(ALL_INTERFACES)
ifeq ($(ALL_INTERFACES),)
	$(error No enabled modules! $(notdir $(MOD_CONF)) may need to be generated by using "make conf")
endif
	@test -d $(TMPDIR) || mkdir -p $(TMPDIR)
	$(verbose) m4 $^ | sed -e s/dollarsstar/\$$\*/g > $@

$(TMPDIR)/all_te_files.conf: $(ALL_TE_FILES)
ifeq ($(ALL_TE_FILES),)
	$(error No enabled modules! $(notdir $(MOD_CONF)) may need to be generated by using "make conf")
endif
	@test -d $(TMPDIR) || mkdir -p $(TMPDIR)
	$(verbose) cat $^ > $@
	$(call parse-rolemap,base,$@)

$(TMPDIR)/post_te_files.conf: $(POST_TE_FILES)
	@test -d $(TMPDIR) || mkdir -p $(TMPDIR)
	$(verbose) cat $^ > $@

# extract attributes and put them first. extract post te stuff
# like genfscon and put last.  portcon, nodecon, and netifcon
# is delayed since they are generated by m4
$(TMPDIR)/all_attrs_types.conf $(TMPDIR)/only_te_rules.conf $(TMPDIR)/all_post.conf: $(TMPDIR)/all_te_files.conf $(TMPDIR)/post_te_files.conf
	$(verbose) grep ^attribute $(TMPDIR)/all_te_files.conf > $(TMPDIR)/all_attrs_types.conf || true
	$(verbose) grep '^type ' $(TMPDIR)/all_te_files.conf >> $(TMPDIR)/all_attrs_types.conf
	$(verbose) cat $(TMPDIR)/post_te_files.conf > $(TMPDIR)/all_post.conf
	$(verbose) grep '^sid ' $(TMPDIR)/all_te_files.conf >> $(TMPDIR)/all_post.conf || true
	$(verbose) egrep '^fs_use_(xattr|task|trans)' $(TMPDIR)/all_te_files.conf >> $(TMPDIR)/all_post.conf || true
	$(verbose) grep ^genfscon $(TMPDIR)/all_te_files.conf >> $(TMPDIR)/all_post.conf || true
	$(verbose) sed -r -e /^attribute/d -e '/^type /d' -e /^genfscon/d \
			-e '/^sid /d' -e '/^fs_use_(xattr|task|trans)/d' \
			< $(TMPDIR)/all_te_files.conf > $(TMPDIR)/only_te_rules.conf

########################################
#
# Remove the dontaudit rules from the policy.conf
#
enableaudit: $(POLICY_CONF)
	@test -d $(TMPDIR) || mkdir -p $(TMPDIR)
	@echo "Removing dontaudit rules from $(notdir $(POLICY_CONF))"
	$(verbose) grep -v dontaudit @^ > $(TMPDIR)/policy.audit
	$(verbose) mv $(TMPDIR)/policy.audit $(POLICY_CONF)

########################################
#
# Construct file_contexts
#
$(FC): $(TMPDIR)/$(notdir $(FC)).tmp $(FCSORT)
	$(verbose) $(FCSORT) $< $@
	$(verbose) grep -e HOME -e ROLE $@ > $(HOMEDIR_TEMPLATE)
	$(verbose) sed -i -e /HOME/d -e /ROLE/d $@

$(TMPDIR)/$(notdir $(FC)).tmp: $(M4SUPPORT) $(TMPDIR)/generated_definitions.conf $(ALL_FC_FILES)
ifeq ($(ALL_FC_FILES),)
	$(error No enabled modules! $(notdir $(MOD_CONF)) may need to be generated by using "make conf")
endif
	@echo "Creating $(NAME) file_contexts."
	@test -d $(TMPDIR) || mkdir -p $(TMPDIR)
	$(verbose) m4 $(M4PARAM) $^ > $@

########################################
#
# Install file_contexts
#
$(FCPATH): $(FC) $(LOADPATH) $(USERPATH)/system.users
	@echo "Validating $(NAME) file_contexts."
	$(verbose) $(SETFILES) -q -c $(LOADPATH) $(FC)
	@echo "Installing file_contexts."
	@mkdir -p $(CONTEXTPATH)/files
	$(verbose) install -m 644 $(FC) $(FCPATH)
	$(verbose) install -m 644 $(HOMEDIR_TEMPLATE) $(HOMEDIRPATH)
	$(verbose) $(GENHOMEDIRCON) -d $(TOPDIR) -t $(NAME) $(USEPWD)

########################################
#
# Run policy source checks
#
check: $(POLICY_CONF) $(FC)
	$(SECHECK) -s --profile=development --policy=$(POLICY_CONF) --fcfile=$(FC) > $(BUILDDIR)/$@.res

longcheck: $(POLICY_CONF) $(FC)
	$(SECHECK) -s --profile=all --policy=$(POLICY_CONF) --fcfile=$(FC) > $(BUILDDIR)/$@.res

########################################
#
# Appconfig files
#
$(APPDIR)/customizable_types: policy.conf
	@mkdir -p $(APPDIR)
	$(verbose) grep "^type .*customizable" $< | cut -d',' -f1 | cut -d' ' -f2 > tmp/customizable_types
	$(verbose) install -m 644 tmp/customizable_types $@ 

########################################
#
# Clean the sources
#
clean:
	rm -f $(POLICY_CONF)
	rm -f $(BUILDDIR)/policy.$(PV)
	rm -f $(FC)
	rm -f $(HOMEDIR_TEMPLATE)
	rm -f *.res
	rm -fR $(TMPDIR)

.PHONY: default policy install load reload enableaudit checklabels restorelabels relabel check longcheck clean