241 lines
14 KiB
Diff
241 lines
14 KiB
Diff
---
|
|
runtime/filetype.vim | 4
|
|
runtime/syntax/apparmor.vim | 219 ++++++++++++++++++++++++++++++++++++++++++++
|
|
2 files changed, 223 insertions(+)
|
|
|
|
--- vim72/runtime/filetype.vim
|
|
+++ vim72/runtime/filetype.vim
|
|
@@ -113,6 +113,10 @@ au BufNewFile,BufRead proftpd.conf* cal
|
|
au BufNewFile,BufRead .htaccess setf apache
|
|
au BufNewFile,BufRead httpd.conf*,srm.conf*,access.conf*,apache.conf*,apache2.conf*,/etc/apache2/*.conf* call s:StarSetf('apache')
|
|
|
|
+" AppArmor
|
|
+au BufNewFile,BufRead */etc/apparmor.d/* setf apparmor
|
|
+au BufNewFile,BufRead */etc/apparmor/profiles/* setf apparmor
|
|
+
|
|
" XA65 MOS6510 cross assembler
|
|
au BufNewFile,BufRead *.a65 setf a65
|
|
|
|
--- vim72/runtime/syntax/apparmor.vim
|
|
+++ vim72/runtime/syntax/apparmor.vim
|
|
@@ -0,0 +1,219 @@
|
|
+" $Id: apparmor.vim.in,v 1.6 2008/09/25 00:13:43 cb Exp $
|
|
+"
|
|
+" ----------------------------------------------------------------------
|
|
+" Copyright (c) 2005 Novell, Inc. All Rights Reserved.
|
|
+" Copyright (c) 2006-2008 Christian Boltz. All Rights Reserved.
|
|
+"
|
|
+" This program is free software; you can redistribute it and/or
|
|
+" modify it under the terms of version 2 of the GNU General Public
|
|
+" License as published by the Free Software Foundation.
|
|
+"
|
|
+" This program is distributed in the hope that it will be useful,
|
|
+" but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
+" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
+" GNU General Public License for more details.
|
|
+"
|
|
+" You should have received a copy of the GNU General Public License
|
|
+" along with this program; if not, contact Novell, Inc.
|
|
+"
|
|
+" To contact Novell about this file by physical or electronic mail,
|
|
+" you may find current contact information at rudin.suse.de:8891.
|
|
+"
|
|
+" To contact Christian Boltz about this file by physical or electronic
|
|
+" mail, you may find current contact information at www.cboltz.de/en/kontakt.
|
|
+" ----------------------------------------------------------------------
|
|
+"
|
|
+" stick this file into ~/.vim/syntax/ and add these commands into your .vimrc
|
|
+" to have vim automagically use this syntax file for these directories:
|
|
+"
|
|
+" autocmd BufNewFile,BufRead /etc/apparmor.d/* set syntax=apparmor
|
|
+" autocmd BufNewFile,BufRead /etc/apparmor/profiles/* set syntax=apparmor
|
|
+
|
|
+" profiles are case sensitive
|
|
+syntax case match
|
|
+
|
|
+" color setup...
|
|
+
|
|
+" adjust colors according to the background
|
|
+
|
|
+" switching colors depending on the background color doesn't work
|
|
+" unfortunately, so we use colors that work with light and dark background.
|
|
+" Patches welcome ;-)
|
|
+
|
|
+"if &background == "light"
|
|
+" light background
|
|
+ hi sdProfileName ctermfg=lightblue
|
|
+ hi sdHatName ctermfg=darkblue
|
|
+ hi sdExtHat ctermfg=darkblue
|
|
+" hi sdComment2 ctermfg=darkblue
|
|
+ hi sdGlob ctermfg=darkmagenta
|
|
+ hi sdAlias ctermfg=darkmagenta
|
|
+ hi sdEntryWriteExec ctermfg=black ctermbg=yellow
|
|
+ hi sdEntryUX ctermfg=darkred cterm=underline
|
|
+ hi sdEntryUXe ctermfg=darkred
|
|
+ hi sdEntryIX ctermfg=darkcyan
|
|
+ hi sdEntryM ctermfg=darkcyan
|
|
+ hi sdEntryPX ctermfg=darkgreen cterm=underline
|
|
+ hi sdEntryPXe ctermfg=darkgreen
|
|
+ hi sdEntryW ctermfg=darkyellow
|
|
+ hi sdCap ctermfg=lightblue
|
|
+ hi sdSetCap ctermfg=black ctermbg=yellow
|
|
+ hi sdNetwork ctermfg=lightblue
|
|
+ hi sdNetworkDanger ctermfg=darkred
|
|
+ hi sdCapKey cterm=underline ctermfg=lightblue
|
|
+ hi sdCapDanger ctermfg=darkred
|
|
+ hi sdRLimit ctermfg=lightblue
|
|
+ hi def link sdEntryR Normal
|
|
+ hi def link sdEntryK Normal
|
|
+ hi def link sdFlags Normal
|
|
+ hi sdEntryChangeProfile ctermfg=darkgreen cterm=underline
|
|
+"else
|
|
+" dark background
|
|
+" hi sdProfileName ctermfg=white
|
|
+" hi sdHatName ctermfg=white
|
|
+" hi sdGlob ctermfg=magenta
|
|
+" hi sdEntryWriteExec ctermfg=black ctermbg=yellow
|
|
+" hi sdEntryUX ctermfg=red cterm=underline
|
|
+" hi sdEntryUXe ctermfg=red
|
|
+" hi sdEntryIX ctermfg=cyan
|
|
+" hi sdEntryM ctermfg=cyan
|
|
+" hi sdEntryPX ctermfg=green cterm=underline
|
|
+" hi sdEntryPXe ctermfg=green
|
|
+" hi sdEntryW ctermfg=yellow
|
|
+" hi sdCap ctermfg=lightblue
|
|
+" hi sdCapKey cterm=underline ctermfg=lightblue
|
|
+" hi def link sdEntryR Normal
|
|
+" hi def link sdFlags Normal
|
|
+" hi sdCapDanger ctermfg=red
|
|
+"endif
|
|
+
|
|
+hi def link sdInclude Include
|
|
+high def link sdComment Comment
|
|
+"high def link sdComment2 Comment
|
|
+high def link sdFlagKey TODO
|
|
+high def link sdError ErrorMsg
|
|
+
|
|
+
|
|
+" always sync from the start. should be relatively quick since we don't have
|
|
+" that many rules and profiles shouldn't be _extremely_ large...
|
|
+syn sync fromstart
|
|
+
|
|
+syn keyword sdFlagKey complain audit debug
|
|
+
|
|
+" highlight invalid syntax
|
|
+syn match sdError /{/ contained
|
|
+syn match sdError /}/
|
|
+syn match sdError /^.*$/ contains=sdComment "highlight all non-valid lines as error
|
|
+" TODO: do not mark lines containing only whitespace as error
|
|
+
|
|
+" TODO: the sdGlob pattern is not anchored with ^ and $, so it matches all lines matching ^@{...}.*
|
|
+" This allows incorrect lines also and should be checked better.
|
|
+syn match sdGlob /\v\?|\*|\{.*,.*\}|[[^\]]\+\]|\@\{[a-zA-Z_]*\}/
|
|
+
|
|
+syn match sdAlias /\v^alias\s+(\/|\@\{\S*\})\S*\s+-\>\s+(\/|\@\{\S*\})\S*\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob
|
|
+
|
|
+"syn match sdComment /#.*/
|
|
+
|
|
+syn cluster sdEntry contains=sdEntryWriteExec,sdEntryR,sdEntryW,sdEntryIX,sdEntryPX,sdEntryPXe,sdEntryUX,sdEntryUXe,sdEntryM,sdCap,sdSetCap,sdExtHat,sdRLimit,sdNetwork,sdNetworkDanger,sdEntryChangeProfile
|
|
+
|
|
+
|
|
+" TODO: support audit and deny keywords for all rules (not only for files)
|
|
+" TODO: higlight audit and deny keywords everywhere
|
|
+
|
|
+" Capability line
|
|
+
|
|
+" normal capabilities - really keep this list? syn match sdCap should be enough... (difference: sdCapKey words would loose underlining)
|
|
+syn keyword sdCapKey chown dac_override dac_read_search fowner fsetid kill setgid setuid setpcap linux_immutable net_bind_service net_broadcast net_admin net_raw ipc_lock ipc_owner sys_module sys_rawio sys_chroot sys_ptrace sys_pacct sys_boot sys_nice sys_resource sys_time sys_tty_config mknod lease audit_control
|
|
+
|
|
+" dangerous capabilities - highlighted separately
|
|
+syn keyword sdCapDanger sys_admin
|
|
+
|
|
+" full line. Keywords are from sdCapKey + sdCapDanger
|
|
+syn match sdCap /\v^\s*capability\s+(chown|dac_override|dac_read_search|fowner|fsetid|kill|setgid|setuid|setpcap|linux_immutable|net_bind_service|net_broadcast|net_admin|net_raw|ipc_lock|ipc_owner|sys_module|sys_rawio|sys_chroot|sys_ptrace|sys_pacct|sys_boot|sys_nice|sys_resource|sys_time|sys_tty_config|mknod|lease|sys_admin|audit_control)\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdCapKey,sdCapDanger,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+syn match sdSetCap /\v^\s*set\s+capability\s+(chown|dac_override|dac_read_search|fowner|fsetid|kill|setgid|setuid|setpcap|linux_immutable|net_bind_service|net_broadcast|net_admin|net_raw|ipc_lock|ipc_owner|sys_module|sys_rawio|sys_chroot|sys_ptrace|sys_pacct|sys_boot|sys_nice|sys_resource|sys_time|sys_tty_config|mknod|lease|sys_admin|audit_control)\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdCapKey,sdCapDanger,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+
|
|
+
|
|
+" Network line
|
|
+" Syntax: network domain (inet, ...) type (stream, ...) protocol (tcp, ...)
|
|
+syn match sdNetwork /\v^\s*network(\s+(inet|ax25|ipx|appletalk|netrom|bridge|atmpvc|x25|inet6|rose|netbeui|security|key|packet|ash|econet|atmsvc|sna|irda|pppox|wanpipe|bluetooth))?(\s+(stream|dgram|seqpacket|rdm|packet))?(\s+(tcp|udp|icmp))?\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+" network rules containing 'raw'
|
|
+syn match sdNetworkDanger /\v^\s*network(\s+(inet|ax25|ipx|appletalk|netrom|bridge|atmpvc|x25|inet6|rose|netbeui|security|key|packet|ash|econet|atmsvc|sna|irda|pppox|wanpipe|bluetooth))?(\s+(raw))(\s+(tcp|udp|icmp))?\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+" 'all networking' includes raw -> mark as dangerous
|
|
+syn match sdNetworkDanger /\v^\s*network\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+
|
|
+
|
|
+" Change Profile
|
|
+syn match sdEntryChangeProfile /\v^\s*change_profile\s+-\>\s+\S+\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+
|
|
+
|
|
+" rlimit
|
|
+"
|
|
+"syn match sdRLimit /\v^\s*rlimit\s+()\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdComment
|
|
+syn match sdRLimit /\v^\s*rlimit\s+(nofile|locks|sigpending|nproc|rtprio)\s+[0-9]+\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdComment
|
|
+syn match sdRLimit /\v^\s*rlimit\s+(fsize|data|stack|core|rss|as|memlock|msgqueue)\s+\<\=\s+[0-9]+([KMG])?\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdComment
|
|
+syn match sdRLimit /\v^\s*rlimit\s+nice\s+(-1?[0-9]|-20|1?[0-9])\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdComment
|
|
+
|
|
+" link rules
|
|
+syn match sdEntryW /\v^\s+link\s+(subset\s+)?(\/|\@\{\S*\})\S*\s+-\>\s+(\/|\@\{\S*\})\S*\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob
|
|
+
|
|
+
|
|
+" file permissions
|
|
+"
|
|
+" write + exec/mmap - danger!
|
|
+" known bug: accepts 'aw' to keep things simple
|
|
+syn match sdEntryWriteExec /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+(l|r|w|a|m|k|[iuUpPcC]x)+(\s+-\>\s+\S+)?\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+
|
|
+" ux(mr) - unconstrained entry, flag the line red
|
|
+syn match sdEntryUX /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+(r|m|k|ux)+(\s+-\>\s+\S+)?\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+" Ux(mr) - like ux + clean environment
|
|
+syn match sdEntryUXe /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+(r|m|k|Ux)+(\s+-\>\s+\S+)?\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+" px/cx/pix/cix(mrk) - standard exec entry, flag the line blue
|
|
+syn match sdEntryPX /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+(r|m|k|px|cx|pix|cix)+(\s+-\>\s+\S+)?\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+" Px/Cx/Pix/Cix(mrk) - like px/cx + clean environment
|
|
+syn match sdEntryPXe /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+(r|m|k|Px|Cx|Pix|Cix)+(\s+-\>\s+\S+)?\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+" ix(mr) - standard exec entry, flag the line green
|
|
+syn match sdEntryIX /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+(r|m|k|ix)+\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+" mr - mmap with PROT_EXEC
|
|
+syn match sdEntryM /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+(r|m|k)+\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+
|
|
+" if we've got u or i without x, it's an error
|
|
+" rule is superfluous because of the '/.*/ is an error' rule ;-)
|
|
+"syn match sdError /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+(l|r|w|k|u|p|i)+\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+
|
|
+" write + append is an error also
|
|
+"syn match sdError /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+(\S*r\S*a\S*|\S*a\S*w\S*)\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+syn match sdError /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+\S*(w\S*a|a\S*w)\S*\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+
|
|
+" write entry, flag the line yellow
|
|
+syn match sdEntryW /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+(l|r|w|k)+\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+" append entry, flag the line yellow
|
|
+syn match sdEntryW /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+(l|r|a|k)+\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+
|
|
+" read entry + locking, currently no highlighting
|
|
+syn match sdEntryK /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+[rlk]+\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+" read entry, no highlighting
|
|
+syn match sdEntryR /\v^\s*((owner\s+)|(audit\s+)|(deny\s+))*(\/|\@\{\S*\})\S*\s+[rl]+\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdGlob,sdComment nextgroup=@sdEntry,sdComment,sdError,sdInclude
|
|
+
|
|
+syn match sdExtHat /\v^\s+(\^|profile\s+)\S+\s*,(\s*$|(\s*#.*$)\@=)/ contains=sdComment " hat without {...}
|
|
+
|
|
+
|
|
+
|
|
+
|
|
+syn match sdProfileName /\v^((profile\s+)?\/\S+|profile\s+\S+)\s+(flags\=\((complain|audit)\)\s+)=\{/ contains=sdProfileStart,sdHatName,sdFlags,sdComment
|
|
+syn match sdProfileStart /{/ contained
|
|
+syn match sdProfileEnd /^}\s*(#.*)?$/ contained " TODO: syn region does not (yet?) allow usage of comment in end=
|
|
+ " TODO: Removing the $ mark from end= will allow non-comments also :-(
|
|
+syn match sdHatName /\v^\s+(\^|profile\s+)\S+\s+(flags\=\((complain|audit)\)\s+)=\{/ contains=sdProfileStart,sdFlags,sdComment
|
|
+syn match sdHatStart /{/ contained
|
|
+syn match sdHatEnd /}/ contained " TODO: allow comments + [same as for syn match sdProfileEnd]
|
|
+syn match sdFlags /\vflags\=\((complain|audit)\)/ contained contains=sdFlagKey
|
|
+
|
|
+syn match sdComment /\s*#.*$/
|
|
+syn match sdInclude /\s*#include.*$/
|
|
+
|
|
+" basic profile block...
|
|
+" \s+ does not work in end=, therefore using \s\s*
|
|
+syn region Normal start=/\v^(profile\s+)?\S+\s+(flags\=\(\S+\)\s+)=\{/ matchgroup=sdProfileEnd end=/^}\s*$/ contains=sdProfileName,Hat,@sdEntry,sdComment,sdError,sdInclude
|
|
+syn region Hat start=/\v^\s+(\^|profile\s+)\S+\s+(flags\=\(\S+\)\s+)=\{/ matchgroup=sdHatEnd end=/^\s\s*}\s*$/ contains=sdHatName,@sdEntry,sdComment,sdError,sdInclude
|
|
+
|
|
+
|