;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2016, 2017, 2018 Ricardo Wurmus ;;; Copyright © 2018 Tobias Geerinckx-Rice ;;; ;;; This file is part of GNU Guix. ;;; ;;; GNU Guix is free software; you can redistribute it and/or modify it ;;; under the terms of the GNU General Public License as published by ;;; the Free Software Foundation; either version 3 of the License, or (at ;;; your option) any later version. ;;; ;;; GNU Guix is distributed in the hope that it will be useful, but ;;; WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ;;; GNU General Public License for more details. ;;; ;;; You should have received a copy of the GNU General Public License ;;; along with GNU Guix. If not, see . (define-module (gnu packages selinux) #:use-module ((guix licenses) #:prefix license:) #:use-module (guix packages) #:use-module (guix download) #:use-module (guix git-download) #:use-mod
aboutsummaryrefslogtreecommitdiff
blob: 554416627bcab46af6cf17df1d792fa1b0c253de (about) (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
# GNU Guix --- Functional package management for GNU
# Copyright © 2018 Ludovic Courtès <ludo@gnu.org>
#
# This file is part of GNU Guix.
#
# GNU Guix is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or (at
# your option) any later version.
#
# GNU Guix is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with GNU Guix.  If not, see <http://www.gnu.org/licenses/>.

#
# Test the 'guix pack --relocatable' using the external store, if any.
#

guix pack --version

# 'guix pack --relocatable' requires a C compiler and libc.a, which our
# bootstrap binaries don't provide.  To make the test relatively inexpensive,
# run it on the user's global store if possible, on the grounds that binaries
# may already be there or can be built or downloaded inexpensively.

NIX_STORE_DIR="`guile -c '(use-modules (guix config))(display %storedir)'`"
localstatedir="`guile -c '(use-modules (guix config))(display %localstatedir)'`"
GUIX_DAEMON_SOCKET="$localstatedir/guix/daemon-socket/socket"
export NIX_STORE_DIR GUIX_DAEMON_SOCKET

if ! guile -c '(use-modules (guix)) (exit (false-if-exception (open-connection)))'
then
    exit 77
fi

STORE_PARENT="`dirname $NIX_STORE_DIR`"
export STORE_PARENT
if test "$STORE_PARENT" = "/"; then exit 77; fi

# This test requires user namespaces and associated command-line tools.
if ! unshare -mrf sh -c 'mount -t tmpfs none "$STORE_PARENT"'
then
    exit 77
fi

test_directory="`mktemp -d`"
export test_directory
trap 'chmod -Rf +w "$test_directory"; rm -rf "$test_directory"' EXIT

tarball="`guix pack -R -S /Bin=bin sed`"
(cd "$test_directory"; tar xvf "$tarball")

# Run that relocatable 'sed' in a user namespace where we "erase" the store by
# mounting an empty file system on top of it.  That way, we exercise the
# wrapper code that creates the user namespace and bind-mounts the store.
unshare -mrf sh -c 'mount -t tmpfs none "$STORE_PARENT"; echo "$STORE_PARENT"/*; "$test_directory/Bin/sed" --version > "$test_directory/output"'
grep 'GNU sed' "$test_directory/output"
libsepol) (name "libsemanage") (arguments (substitute-keyword-arguments (package-arguments libsepol) ((#:make-flags flags) `(cons* "PYTHON=python3" (string-append "PYSITEDIR=" (assoc-ref %outputs "out") "/lib/python" ,(version-major+minor (package-version python)) "/site-packages/") ,flags)) ((#:phases phases) `(modify-phases ,phases (delete 'portability) (replace 'enter-dir (lambda _ (chdir ,name) #t)) (add-after 'build 'pywrap (lambda* (#:key make-flags #:allow-other-keys) (apply invoke "make" "pywrap" make-flags))) (add-after 'install 'install-pywrap (lambda* (#:key make-flags #:allow-other-keys) (apply invoke "make" "install-pywrap" make-flags))))))) (inputs `(("libsepol" ,libsepol) ("libselinux" ,libselinux) ("audit" ,audit) ("ustr" ,ustr) ;; For pywrap phase ("python" ,python-wrapper))) (native-inputs `(("bison" ,bison) ("flex" ,flex) ;; For pywrap phase ("swig" ,swig) ("pkg-config" ,pkg-config))) (synopsis "SELinux policy management libraries") (description "The libsemanage library provides an API for the manipulation of SELinux binary policies.") (license license:lgpl2.1+))) (define-public secilc (package (inherit libsepol) (name "secilc") (arguments (substitute-keyword-arguments (package-arguments libsepol) ((#:make-flags flags) `(let ((docbook (assoc-ref %build-inputs "docbook-xsl"))) (cons (string-append "XMLTO=xmlto --skip-validation -x " docbook "/xml/xsl/docbook-xsl-" ,(package-version docbook-xsl) "/manpages/docbook.xsl") ,flags))) ((#:phases phases) `(modify-phases ,phases (delete 'portability) (replace 'enter-dir (lambda _ (chdir ,name) #t)))))) (inputs `(("libsepol" ,libsepol))) (native-inputs `(("xmlto" ,xmlto) ("docbook-xsl" ,docbook-xsl))) (synopsis "SELinux common intermediate language (CIL) compiler") (description "The SELinux CIL compiler is a compiler that converts the @dfn{common intermediate language} (CIL) into a kernel binary policy file.") (license license:bsd-2))) (define-public python-sepolgen (package (inherit libsepol) (name "python-sepolgen") (arguments `(#:modules ((srfi srfi-1) (guix build gnu-build-system) (guix build utils)) ,@(substitute-keyword-arguments (package-arguments libsepol) ((#:phases phases) `(modify-phases ,phases (delete 'portability) (replace 'enter-dir (lambda _ (chdir "python/sepolgen") #t)) ;; By default all Python files would be installed to ;; $out/gnu/store/...-python-.../, so we override the ;; PACKAGEDIR to fix this. (add-after 'enter-dir 'fix-target-path (lambda* (#:key inputs outputs #:allow-other-keys) (let ((get-python-version ;; FIXME: copied from python-build-system (lambda (python) (let* ((version (last (string-split python #\-))) (components (string-split version #\.)) (major+minor (take components 2))) (string-join major+minor "."))))) (substitute* "src/sepolgen/Makefile" (("^PACKAGEDIR.*") (string-append "PACKAGEDIR=" (assoc-ref outputs "out") "/lib/python" (get-python-version (assoc-ref inputs "python")) "/site-packages/sepolgen"))) (substitute* "src/share/Makefile" (("\\$\\(DESTDIR\\)") (assoc-ref outputs "out")))) #t))))))) (inputs `(("python" ,python-wrapper))) (native-inputs '()) (synopsis "Python module for generating SELinux policies") (description "This package contains a Python module that forms the core of @code{audit2allow}, a part of the package @code{policycoreutils}. The sepolgen library contains: Reference Policy Representation, which are Objects for representing policies and the reference policy interfaces. It has objects and algorithms for representing access and sets of access in an abstract way and searching that access. It also has a parser for reference policy \"headers\". It contains infrastructure for parsing SELinux related messages as produced by the audit system. It has facilities for generating policy based on required access.") ;; GPLv2 only (license license:gpl2))) (define-public python-setools (package (name "python-setools") (version "4.1.1") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/TresysTechnology/setools.git") (commit version))) (file-name (string-append name "-" version "-checkout")) (sha256 (base32 "0459xxly6zzqc5azcwk3rbbcxvj60dq08f8z6xr05y7dsbb16cg6")))) (build-system python-build-system) (arguments `(#:tests? #f ; the test target causes a rebuild #:phases (modify-phases %standard-phases (delete 'portability) (add-after 'unpack 'set-SEPOL-variable (lambda* (#:key inputs #:allow-other-keys) (setenv "SEPOL" (string-append (assoc-ref inputs "libsepol") "/lib/libsepol.a")))) (add-after 'unpack 'remove-Werror (lambda _ (substitute* "setup.py" (("'-Werror',") "")) #t)) (add-after 'unpack 'fix-target-paths (lambda* (#:key outputs #:allow-other-keys) (substitute* "setup.py" (("join\\(sys.prefix") (string-append "join(\"" (assoc-ref outputs "out") "/\""))) #t))))) (propagated-inputs `(("python-networkx" ,python-networkx))) (inputs `(("libsepol" ,libsepol) ("libselinux" ,libselinux))) (native-inputs `(("bison" ,bison) ("flex" ,flex) ("swig" ,swig))) (home-page "https://github.com/TresysTechnology/setools") (synopsis "Tools for SELinux policy analysis") (description "SETools is a collection of graphical tools, command-line tools, and libraries designed to facilitate SELinux policy analysis.") ;; Some programs are under GPL, all libraries under LGPL. (license (list license:lgpl2.1+ license:gpl2+)))) (define-public policycoreutils (package (inherit libsepol) (name "policycoreutils") (arguments `(#:test-target "test" #:make-flags (let ((out (assoc-ref %outputs "out"))) (list "CC=gcc" (string-append "PREFIX=" out) (string-append "LOCALEDIR=" out "/share/locale") (string-append "BASHCOMPLETIONDIR=" out "/share/bash-completion/completions") "INSTALL=install -c -p" "INSTALL_DIR=install -d" ;; These ones are needed because some Makefiles define the ;; directories relative to DESTDIR, not relative to PREFIX. (string-append "SBINDIR=" out "/sbin") (string-append "ETCDIR=" out "/etc") (string-append "SYSCONFDIR=" out "/etc/sysconfig") (string-append "MAN5DIR=" out "/share/man/man5") (string-append "INSTALL_NLS_DIR=" out "/share/locale") (string-append "AUTOSTARTDIR=" out "/etc/xdg/autostart") (string-append "DBUSSERVICEDIR=" out "/share/dbus-1/services") (string-append "SYSTEMDDIR=" out "/lib/systemd") (string-append "INITDIR=" out "/etc/rc.d/init.d") (string-append "SELINUXDIR=" out "/etc/selinux"))) #:phases (modify-phases %standard-phases (delete 'configure) (delete 'portability) (add-after 'unpack 'enter-dir (lambda _ (chdir ,name) #t)) (add-after 'enter-dir 'ignore-/usr-tests (lambda* (#:key inputs #:allow-other-keys) ;; The Makefile decides to build restorecond only if it finds the ;; inotify header somewhere under /usr. (substitute* "Makefile" (("ifeq.*") "") (("endif.*") "")) ;; Rewrite lookup paths for header files. (substitute* '("newrole/Makefile" "setfiles/Makefile" "run_init/Makefile") (("/usr(/include/security/pam_appl.h)" _ file) (string-append (assoc-ref inputs "pam") file)) (("/usr(/include/libaudit.h)" _ file) (string-append (assoc-ref inputs "audit") file))) #t))))) (inputs `(("audit" ,audit) ("pam" ,linux-pam) ("libsepol" ,libsepol) ("libselinux" ,libselinux) ("libsemanage" ,libsemanage))) (native-inputs `(("gettext" ,gettext-minimal))) (synopsis "SELinux core utilities") (description "The policycoreutils package contains the core utilities that are required for the basic operation of an SELinux-enabled GNU system and its policies. These utilities include @code{load_policy} to load policies, @code{setfiles} to label file systems, @code{newrole} to switch roles, and @code{run_init} to run service scripts in their proper context.") (license license:gpl2+)))