Skip to content

  • Projects
  • Groups
  • Snippets
  • Help
  • This project
    • Loading...
  • Sign in / Register
L
lxc
  • Project
    • Overview
    • Details
    • Activity
    • Cycle Analytics
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Charts
  • Issues 0
    • Issues 0
    • List
    • Board
    • Labels
    • Milestones
  • Merge Requests 0
    • Merge Requests 0
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
    • Charts
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Charts
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
  • Chen Yisong
  • lxc
  • Repository

Switch branch/tag
  • lxc
  • config
  • apparmor
  • abstractions
  • start-container
Find file
BlameHistoryPermalink
  • Frédéric Dalleau's avatar
    Allow containers to start in AppArmor namespaces · d680929b
    Frédéric Dalleau authored Jul 07, 2017
    This patch allows users to start containers in AppArmor namespaces.
    Users can define their own profiles for their containers, but
    lxc-start must be allowed to change to a namespace.
    
    A container configuration file can wrap a container in an AppArmor
    profile using lxc.aa_profile.
    
    A process in an AppArmor namespace is restricted to view
    or manage only the profiles belonging to this namespace, as if no
    other profiles existed. A namespace can be created as follow:
    sudo mkdir /sys/kernel/security/apparmor/policy/namespaces/$NAMESPACE
    
    AppArmor can stack profiles so that the contained process is bound
    by the intersection of all profiles of the stack. This is achieved
    using the '//&' operator as follow:
    
    lxc.aa_profile = $PROFILE//&:$NAMESPACE://unconfined
    
    In this case, even the guest process appears unconfined in the
    namespace, it is still confined by $PROFILE.
    
    A guest allowed to access "/sys/kernel/security/apparmor/** rwklix,"
    will be able to manage its own profile set, while still being
    enclosed in the topmost profile $PROFILE:
    
    Different guests can be assigned the same namespace or different
    namespaces. In the first case, they will share their profiles.
    In the second case, they will have distinct sets of profiles.
    
    This is validated on privileged containers.
    Signed-off-by: 's avatarFrédéric Dalleau <frederic.dalleau@collabora.com>
    d680929b
start-container 1.39 KB
EditWeb IDE
×

Replace start-container

Attach a file by drag & drop or click to upload


Cancel
A new branch will be created in your fork and a new merge request will be started.