-
apparmor: profile generation · 1800f924Wolfgang Bumiller authored
This copies lxd's apparmor profile generation. This tries to detect features such as cgroup namespaces, apparmor namespaces and stacking support, and has profile parts conditionally for unprivileged containers. This introduces the following changes to the configuration: lxc.apparmor.profile = generated The fixed value 'generated' will cause this functionality to be used, otherwise there should be no functional changes happening unless specifically requested with the next key: lxc.apparmor.allow_nesting This is a boolean which, if enabled, causes the following changes: When generated apparmor profiles are used, they will contain the necessary changes to allow creating a nested container. In addition to the usual mount points, /dev/.lxc/proc and /dev/.lxc/sys will contain procfs and sysfs mount points without the lxcfs overlays, which, if generated apparmor profiles are being used, will not be read/writable directly. lxc.apparmor.raw A list of raw apparmor profile lines to append to the profile. Only valid when using generated profiles. The following apparmor profile lines have not been copied from lxd: mount /var/lib/lxd/shmounts/ -> /var/lib/lxd/shmounts/, mount none -> /var/lib/lxd/shmounts/, mount options=bind /var/lib/lxd/shmounts/** -> /var/lib/lxd/**, They should be added via lxc.apparmor.raw entries by lxd. In order for apparmor_parser's cache to be of use, this adds a --with-apparmor-cache-dir ./configure option. Signed-off-by:Wolfgang Bumiller <w.bumiller@proxmox.com>
1800f924
×