]> git.ipfire.org Git - people/stevee/selinux-policy.git/blame - refpolicy/Rules.monolithic
fix typo
[people/stevee/selinux-policy.git] / refpolicy / Rules.monolithic
CommitLineData
fb0a3a98
CP
1########################################
2#
3# Rules and Targets for building monolithic policies
4#
5
5b45ffb0
CP
6POLICY_CONF = $(BUILDDIR)policy.conf
7FC = $(BUILDDIR)file_contexts
8POLVER = $(BUILDDIR)policy.$(PV)
9HOMEDIR_TEMPLATE = $(BUILDDIR)homedir_template
c9f20d5b 10
3abd5ee8
CP
11M4PARAM += -D self_contained_policy
12
fb0a3a98
CP
13# install paths
14POLICYPATH = $(INSTALLDIR)/policy
5b45ffb0 15LOADPATH = $(POLICYPATH)/$(notdir $(POLVER))
fb0a3a98
CP
16HOMEDIRPATH = $(CONTEXTPATH)/files/homedir_template
17
049e11af 18APPFILES += $(INSTALLDIR)/booleans
fb0a3a98 19
c767b14c 20# for monolithic policy use all base and module to create policy
cf0ff557 21ALL_MODULES := $(strip $(BASE_MODS) $(MOD_MODS))
ab23bb90
CP
22# off module interfaces included to make sure all interfaces are expanded.
23ALL_INTERFACES := $(ALL_MODULES:.te=.if) $(OFF_MODS:.te=.if)
fb0a3a98
CP
24ALL_TE_FILES := $(ALL_MODULES)
25ALL_FC_FILES := $(ALL_MODULES:.te=.fc)
26
a0824843 27PRE_TE_FILES := $(SECCLASS) $(ISIDS) $(AVS) $(M4SUPPORT) $(POLDIR)/mls $(POLDIR)/mcs
ffd04848 28POST_TE_FILES := $(USER_FILES) $(POLDIR)/constraints
fb0a3a98 29
3abd5ee8 30POLICY_SECTIONS := $(TMPDIR)/pre_te_files.conf $(TMPDIR)/all_attrs_types.conf $(TMPDIR)/global_bools.conf $(TMPDIR)/only_te_rules.conf $(TMPDIR)/all_post.conf
c767b14c
CP
31
32# search layer dirs for source files
e2680fb4
CP
33vpath %.te $(ALL_LAYERS)
34vpath %.if $(ALL_LAYERS)
35vpath %.fc $(ALL_LAYERS)
c767b14c 36
fb0a3a98
CP
37########################################
38#
39# default action: build policy locally
40#
41default: policy
42
43policy: $(POLVER)
44
45install: $(LOADPATH) $(FCPATH) $(APPFILES) $(USERPATH)/local.users
46
c9f20d5b 47load: $(TMPDIR)/load
fb0a3a98 48
120988c4
CP
49checklabels: $(FCPATH)
50restorelabels: $(FCPATH)
51relabel: $(FCPATH)
52resetlabels: $(FCPATH)
53
fb0a3a98
CP
54########################################
55#
56# Build a binary policy locally
57#
c9f20d5b 58$(POLVER): $(POLICY_CONF)
fb0a3a98
CP
59 @echo "Compiling $(NAME) $(POLVER)"
60ifneq ($(PV),$(KV))
61 @echo
62 @echo "WARNING: Policy version mismatch! Is your OUTPUT_POLICY set correctly?"
63 @echo
64endif
5b45ffb0 65 $(verbose) $(CHECKPOLICY) $^ -o $@
fb0a3a98
CP
66
67########################################
68#
69# Install a binary policy
70#
c9f20d5b 71$(LOADPATH): $(POLICY_CONF)
fb0a3a98
CP
72 @mkdir -p $(POLICYPATH)
73 @echo "Compiling and installing $(NAME) $(LOADPATH)"
74ifneq ($(PV),$(KV))
75 @echo
76 @echo "WARNING: Policy version mismatch! Is your OUTPUT_POLICY set correctly?"
77 @echo
78endif
9b3756bf 79 $(verbose) $(CHECKPOLICY) $^ -o $@
fb0a3a98
CP
80
81########################################
82#
83# Load the binary policy
84#
c9f20d5b 85reload $(TMPDIR)/load: $(LOADPATH) $(FCPATH) $(APPFILES)
fb0a3a98 86 @echo "Loading $(NAME) $(LOADPATH)"
9b3756bf 87 $(verbose) $(LOADPOLICY) -q $(LOADPATH)
c9f20d5b 88 @touch $(TMPDIR)/load
fb0a3a98
CP
89
90########################################
91#
92# Construct a monolithic policy.conf
93#
c9f20d5b
CP
94$(POLICY_CONF): $(POLICY_SECTIONS)
95 @echo "Creating $(NAME) $(@F)"
3abd5ee8
CP
96 @test -d $(@D) || mkdir -p $(@D)
97 $(verbose) cat $^ > $@
fb0a3a98 98
c9f20d5b
CP
99$(TMPDIR)/pre_te_files.conf: $(PRE_TE_FILES)
100 @test -d $(TMPDIR) || mkdir -p $(TMPDIR)
3abd5ee8 101 $(verbose) $(M4) $(M4PARAM) $^ > $@
fb0a3a98 102
988a441b 103$(TMPDIR)/generated_definitions.conf: $(ALL_TE_FILES)
c9f20d5b 104 @test -d $(TMPDIR) || mkdir -p $(TMPDIR)
70131678
CP
105# define all available object classes
106 $(verbose) $(GENPERM) $(AVS) $(SECCLASS) > $@
107# per-userdomain templates:
108 $(verbose) echo "define(\`base_per_userdomain_template',\`" >> $@
3abd5ee8
CP
109 $(verbose) $(foreach mod,$(basename $(notdir $(ALL_MODULES))), \
110 echo "ifdef(\`""$(mod)""_per_userdomain_template',\`""$(mod)""_per_userdomain_template("'$$*'")')" >> $@ ;)
9b3756bf 111 $(verbose) echo "')" >> $@
5b45ffb0 112 $(verbose) test -f $(BOOLEANS) && $(SETBOOLS) $(BOOLEANS) >> $@ || true
fb0a3a98 113
3abd5ee8
CP
114$(TMPDIR)/global_bools.conf: $(M4SUPPORT) $(TMPDIR)/generated_definitions.conf $(GLOBALBOOL) $(GLOBALTUN)
115 $(verbose) $(M4) $(M4PARAM) $^ > $@
116
c9f20d5b 117$(TMPDIR)/all_interfaces.conf: $(M4SUPPORT) $(ALL_INTERFACES)
fb0a3a98
CP
118ifeq ($(ALL_INTERFACES),)
119 $(error No enabled modules! $(notdir $(MOD_CONF)) may need to be generated by using "make conf")
120endif
c9f20d5b 121 @test -d $(TMPDIR) || mkdir -p $(TMPDIR)
5706facd 122 @echo "ifdef(\`__if_error',\`m4exit(1)')" > $(TMPDIR)/iferror.m4
3abd5ee8 123 @echo "divert(-1)" > $@
5706facd
CP
124 $(verbose) $(M4) $^ $(TMPDIR)/iferror.m4 >> $(TMPDIR)/$(@F).tmp
125 $(verbose) $(SED) -e s/dollarsstar/\$$\*/g $(TMPDIR)/$(@F).tmp >> $@
3abd5ee8 126 @echo "divert" >> $@
fb0a3a98 127
3abd5ee8
CP
128$(TMPDIR)/rolemap.conf: $(ROLEMAP)
129 $(call parse-rolemap,base,$@)
130
131$(TMPDIR)/all_te_files.conf: $(M4SUPPORT) $(TMPDIR)/generated_definitions.conf $(TMPDIR)/all_interfaces.conf $(ALL_TE_FILES) $(TMPDIR)/rolemap.conf
fb0a3a98
CP
132ifeq ($(ALL_TE_FILES),)
133 $(error No enabled modules! $(notdir $(MOD_CONF)) may need to be generated by using "make conf")
134endif
c9f20d5b 135 @test -d $(TMPDIR) || mkdir -p $(TMPDIR)
3abd5ee8 136 $(verbose) $(M4) $(M4PARAM) -s $^ > $@
fb0a3a98 137
3abd5ee8 138$(TMPDIR)/post_te_files.conf: $(M4SUPPORT) $(POST_TE_FILES)
c9f20d5b 139 @test -d $(TMPDIR) || mkdir -p $(TMPDIR)
3abd5ee8 140 $(verbose) $(M4) $(M4PARAM) $^ > $@
fb0a3a98
CP
141
142# extract attributes and put them first. extract post te stuff
3abd5ee8 143# like genfscon and put last.
c9f20d5b 144$(TMPDIR)/all_attrs_types.conf $(TMPDIR)/only_te_rules.conf $(TMPDIR)/all_post.conf: $(TMPDIR)/all_te_files.conf $(TMPDIR)/post_te_files.conf
f62f4c79 145 $(verbose) $(get_type_attr_decl) $(TMPDIR)/all_te_files.conf | $(SORT) > $(TMPDIR)/all_attrs_types.conf
c9f20d5b 146 $(verbose) cat $(TMPDIR)/post_te_files.conf > $(TMPDIR)/all_post.conf
3abd5ee8
CP
147# these have to run individually because order matters:
148 $(verbose) $(GREP) '^sid ' $(TMPDIR)/all_te_files.conf >> $(TMPDIR)/all_post.conf || true
149 $(verbose) $(GREP) '^fs_use_(xattr|task|trans)' $(TMPDIR)/all_te_files.conf >> $(TMPDIR)/all_post.conf || true
150 $(verbose) $(GREP) ^genfscon $(TMPDIR)/all_te_files.conf >> $(TMPDIR)/all_post.conf || true
151 $(verbose) $(GREP) ^portcon $(TMPDIR)/all_te_files.conf >> $(TMPDIR)/all_post.conf || true
152 $(verbose) $(GREP) ^netifcon $(TMPDIR)/all_te_files.conf >> $(TMPDIR)/all_post.conf || true
153 $(verbose) $(GREP) ^nodecon $(TMPDIR)/all_te_files.conf >> $(TMPDIR)/all_post.conf || true
154 $(verbose) $(comment_move_decl) $(TMPDIR)/all_te_files.conf > $(TMPDIR)/only_te_rules.conf
fb0a3a98
CP
155
156########################################
157#
158# Remove the dontaudit rules from the policy.conf
159#
c9f20d5b
CP
160enableaudit: $(POLICY_CONF)
161 @test -d $(TMPDIR) || mkdir -p $(TMPDIR)
162 @echo "Removing dontaudit rules from $(notdir $(POLICY_CONF))"
8e86e4e7 163 $(verbose) $(GREP) -v dontaudit $^ > $(TMPDIR)/policy.audit
c9f20d5b 164 $(verbose) mv $(TMPDIR)/policy.audit $(POLICY_CONF)
fb0a3a98
CP
165
166########################################
167#
168# Construct file_contexts
169#
c9f20d5b 170$(FC): $(TMPDIR)/$(notdir $(FC)).tmp $(FCSORT)
5d92a208 171 $(verbose) $(FCSORT) $< $@
3abd5ee8
CP
172 $(verbose) $(GREP) -e HOME -e ROLE $@ > $(HOMEDIR_TEMPLATE)
173 $(verbose) $(SED) -i -e /HOME/d -e /ROLE/d $@
c767b14c 174
c9f20d5b 175$(TMPDIR)/$(notdir $(FC)).tmp: $(M4SUPPORT) $(TMPDIR)/generated_definitions.conf $(ALL_FC_FILES)
fb0a3a98
CP
176ifeq ($(ALL_FC_FILES),)
177 $(error No enabled modules! $(notdir $(MOD_CONF)) may need to be generated by using "make conf")
178endif
179 @echo "Creating $(NAME) file_contexts."
c9f20d5b 180 @test -d $(TMPDIR) || mkdir -p $(TMPDIR)
3abd5ee8 181 $(verbose) $(M4) $(M4PARAM) $^ > $@
fb0a3a98 182
fc47b34c
CP
183$(HOMEDIR_TEMPLATE): $(FC)
184
fb0a3a98
CP
185########################################
186#
187# Install file_contexts
188#
189$(FCPATH): $(FC) $(LOADPATH) $(USERPATH)/system.users
190 @echo "Validating $(NAME) file_contexts."
9b3756bf 191 $(verbose) $(SETFILES) -q -c $(LOADPATH) $(FC)
fb0a3a98
CP
192 @echo "Installing file_contexts."
193 @mkdir -p $(CONTEXTPATH)/files
9b3756bf
CP
194 $(verbose) install -m 644 $(FC) $(FCPATH)
195 $(verbose) install -m 644 $(HOMEDIR_TEMPLATE) $(HOMEDIRPATH)
fc47b34c
CP
196 $(verbose) $(genhomedircon) -d $(TOPDIR) -t $(NAME) $(USEPWD)
197ifeq "$(DISTRO)" "rhel4"
198# Setfiles in RHEL4 does not look at file_contexts.homedirs.
199 $(verbose) cat $@.homedirs >> $@
200# Delete the file_contexts.homedirs in case the toolchain has
201# been updated, to prevent duplicate match errors.
202 $(verbose) rm -f $@.homedirs
185ab241 203endif
fb0a3a98 204
8df65f13
CP
205########################################
206#
207# Run policy source checks
208#
5b45ffb0
CP
209check: $(BUILDDIR)check.res
210$(BUILDDIR)check.res: $(POLICY_CONF) $(FC)
211 $(SECHECK) -s --profile=development --policy=$(POLICY_CONF) --fcfile=$(FC) > $@
8df65f13 212
5b45ffb0
CP
213longcheck: $(BUILDDIR)longcheck.res
214$(BUILDDIR)longcheck.res: $(POLICY_CONF) $(FC)
215 $(SECHECK) -s --profile=all --policy=$(POLICY_CONF) --fcfile=$(FC) > $@
8df65f13 216
049e11af
CP
217########################################
218#
219# Appconfig files
220#
efc94af8 221$(APPDIR)/customizable_types: $(POLICY_CONF)
049e11af 222 @mkdir -p $(APPDIR)
85a0f967 223 $(verbose) $(GREP) '^[[:blank:]]*type .*customizable' $< | cut -d';' -f1 | cut -d',' -f1 | cut -d' ' -f2 | $(SORT) -u > $(TMPDIR)/customizable_types
4ca6d0d2 224 $(verbose) install -m 644 $(TMPDIR)/customizable_types $@
049e11af 225
fb0a3a98
CP
226########################################
227#
228# Clean the sources
229#
230clean:
c9f20d5b 231 rm -f $(POLICY_CONF)
5b45ffb0 232 rm -f $(POLVER)
fb0a3a98 233 rm -f $(FC)
c767b14c 234 rm -f $(HOMEDIR_TEMPLATE)
6962bb32 235 rm -f $(net_contexts)
8df65f13 236 rm -f *.res
c9f20d5b 237 rm -fR $(TMPDIR)
fb0a3a98 238
8df65f13 239.PHONY: default policy install load reload enableaudit checklabels restorelabels relabel check longcheck clean