Commit a1d5fdfd by Long Wang

doc: s/aa_profile/apparmor.profile/g

Signed-off-by: 's avatarLong Wang <w@laoqinren.net>
parent 69e38e00
...@@ -7,12 +7,12 @@ lxc.tty.dir = ...@@ -7,12 +7,12 @@ lxc.tty.dir =
# When using LXC with apparmor, the container will be confined by default. # When using LXC with apparmor, the container will be confined by default.
# If you wish for it to instead run unconfined, copy the following line # If you wish for it to instead run unconfined, copy the following line
# (uncommented) to the container's configuration file. # (uncommented) to the container's configuration file.
#lxc.aa_profile = unconfined #lxc.apparmor.profile = unconfined
# If you wish to allow mounting block filesystems, then use the following # If you wish to allow mounting block filesystems, then use the following
# line instead, and make sure to grant access to the block device and/or loop # line instead, and make sure to grant access to the block device and/or loop
# devices below in lxc.cgroup.devices.allow. # devices below in lxc.cgroup.devices.allow.
#lxc.aa_profile = lxc-container-default-with-mounting #lxc.apparmor.profile = lxc-container-default-with-mounting
# Extra cgroup device access # Extra cgroup device access
## rtc ## rtc
......
# Use a profile which allows nesting # Use a profile which allows nesting
lxc.aa_profile = lxc-container-default-with-nesting lxc.apparmor.profile = lxc-container-default-with-nesting
# Add uncovered mounts of proc and sys, else unprivileged users # Add uncovered mounts of proc and sys, else unprivileged users
# cannot remount those # cannot remount those
......
...@@ -10,7 +10,7 @@ lxc.mount.entry = mqueue dev/mqueue mqueue rw,relatime,create=dir,optional 0 0 ...@@ -10,7 +10,7 @@ lxc.mount.entry = mqueue dev/mqueue mqueue rw,relatime,create=dir,optional 0 0
# When using LXC with apparmor, the container will be confined by default. # When using LXC with apparmor, the container will be confined by default.
# If you wish for it to instead run unconfined, copy the following line # If you wish for it to instead run unconfined, copy the following line
# (uncommented) to the container's configuration file. # (uncommented) to the container's configuration file.
#lxc.aa_profile = unconfined #lxc.apparmor.profile = unconfined
# Uncomment the following line to autodetect squid-deb-proxy configuration on the # Uncomment the following line to autodetect squid-deb-proxy configuration on the
# host and forward it to the guest at start time. # host and forward it to the guest at start time.
...@@ -19,7 +19,7 @@ lxc.mount.entry = mqueue dev/mqueue mqueue rw,relatime,create=dir,optional 0 0 ...@@ -19,7 +19,7 @@ lxc.mount.entry = mqueue dev/mqueue mqueue rw,relatime,create=dir,optional 0 0
# If you wish to allow mounting block filesystems, then use the following # If you wish to allow mounting block filesystems, then use the following
# line instead, and make sure to grant access to the block device and/or loop # line instead, and make sure to grant access to the block device and/or loop
# devices below in lxc.cgroup.devices.allow. # devices below in lxc.cgroup.devices.allow.
#lxc.aa_profile = lxc-container-default-with-mounting #lxc.apparmor.profile = lxc-container-default-with-mounting
# Extra cgroup device access # Extra cgroup device access
## rtc ## rtc
......
...@@ -1690,7 +1690,7 @@ by KATOH Yasufumi <karma at jazz.email.ne.jp> ...@@ -1690,7 +1690,7 @@ by KATOH Yasufumi <karma at jazz.email.ne.jp>
<variablelist> <variablelist>
<varlistentry> <varlistentry>
<term> <term>
<option>lxc.aa_profile</option> <option>lxc.apparmor.profile</option>
</term> </term>
<listitem> <listitem>
<para> <para>
...@@ -1702,7 +1702,7 @@ by KATOH Yasufumi <karma at jazz.email.ne.jp> ...@@ -1702,7 +1702,7 @@ by KATOH Yasufumi <karma at jazz.email.ne.jp>
コンテナが従うべき apparmor プロファイルを指定します。 コンテナが従うべき apparmor プロファイルを指定します。
コンテナが apparmor による制限を受けないように設定するには、以下のように設定します。 コンテナが apparmor による制限を受けないように設定するには、以下のように設定します。
</para> </para>
<programlisting>lxc.aa_profile = unconfined</programlisting> <programlisting>lxc.apparmor.profile = unconfined</programlisting>
<para> <para>
<!-- <!--
If the apparmor profile should remain unchanged (i.e. if you If the apparmor profile should remain unchanged (i.e. if you
...@@ -1710,7 +1710,7 @@ by KATOH Yasufumi <karma at jazz.email.ne.jp> ...@@ -1710,7 +1710,7 @@ by KATOH Yasufumi <karma at jazz.email.ne.jp>
--> -->
もし apparmor プロファイルが変更されないままでなくてはならない場合 (ネストしたコンテナである場合や、すでに confined されている場合) は以下のように設定します。 もし apparmor プロファイルが変更されないままでなくてはならない場合 (ネストしたコンテナである場合や、すでに confined されている場合) は以下のように設定します。
</para> </para>
<programlisting>lxc.aa_profile = unchanged</programlisting> <programlisting>lxc.apparmor.profile = unchanged</programlisting>
</listitem> </listitem>
</varlistentry> </varlistentry>
<varlistentry> <varlistentry>
......
...@@ -1630,7 +1630,7 @@ proc proc proc nodev,noexec,nosuid 0 0 ...@@ -1630,7 +1630,7 @@ proc proc proc nodev,noexec,nosuid 0 0
<variablelist> <variablelist>
<varlistentry> <varlistentry>
<term> <term>
<option>lxc.aa_profile</option> <option>lxc.apparmor.profile</option>
</term> </term>
<listitem> <listitem>
<para> <para>
...@@ -1642,7 +1642,7 @@ proc proc proc nodev,noexec,nosuid 0 0 ...@@ -1642,7 +1642,7 @@ proc proc proc nodev,noexec,nosuid 0 0
컨테이너가 따라야할 apparmor 프로파일을 지정한다. 컨테이너가 따라야할 apparmor 프로파일을 지정한다.
컨테이너가 apparmor로 인한 제한을 받지 않도록 하려면, 아래와 같이 지정하면 된다. 컨테이너가 apparmor로 인한 제한을 받지 않도록 하려면, 아래와 같이 지정하면 된다.
</para> </para>
<programlisting>lxc.aa_profile = unconfined</programlisting> <programlisting>lxc.apparmor.profile = unconfined</programlisting>
<para> <para>
<!-- <!--
If the apparmor profile should remain unchanged (i.e. if you If the apparmor profile should remain unchanged (i.e. if you
...@@ -1650,7 +1650,7 @@ proc proc proc nodev,noexec,nosuid 0 0 ...@@ -1650,7 +1650,7 @@ proc proc proc nodev,noexec,nosuid 0 0
--> -->
apparmor 프로파일이 변경되지 않아야 한다면(중첩 컨테이너 안에 있고, 이미 confined된 경우), 아래와 같이 지정하면 된다. apparmor 프로파일이 변경되지 않아야 한다면(중첩 컨테이너 안에 있고, 이미 confined된 경우), 아래와 같이 지정하면 된다.
</para> </para>
<programlisting>lxc.aa_profile = unchanged</programlisting> <programlisting>lxc.apparmor.profile = unchanged</programlisting>
</listitem> </listitem>
</varlistentry> </varlistentry>
<varlistentry> <varlistentry>
......
...@@ -1224,7 +1224,7 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA ...@@ -1224,7 +1224,7 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
<variablelist> <variablelist>
<varlistentry> <varlistentry>
<term> <term>
<option>lxc.aa_profile</option> <option>lxc.apparmor.profile</option>
</term> </term>
<listitem> <listitem>
<para> <para>
...@@ -1232,12 +1232,12 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA ...@@ -1232,12 +1232,12 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
be run. To specify that the container should be unconfined, be run. To specify that the container should be unconfined,
use use
</para> </para>
<programlisting>lxc.aa_profile = unconfined</programlisting> <programlisting>lxc.apparmor.profile = unconfined</programlisting>
<para> <para>
If the apparmor profile should remain unchanged (i.e. if you If the apparmor profile should remain unchanged (i.e. if you
are nesting containers and are already confined), then use are nesting containers and are already confined), then use
</para> </para>
<programlisting>lxc.aa_profile = unchanged</programlisting> <programlisting>lxc.apparmor.profile = unchanged</programlisting>
</listitem> </listitem>
</varlistentry> </varlistentry>
<varlistentry> <varlistentry>
......
...@@ -55,7 +55,7 @@ static void test_lsm_detect(void) ...@@ -55,7 +55,7 @@ static void test_lsm_detect(void)
lsm_label = "unconfined_u:unconfined_r:lxc_t:s0-s0:c0.c1023"; lsm_label = "unconfined_u:unconfined_r:lxc_t:s0-s0:c0.c1023";
} }
else if (!strcmp(lsm_name(), "AppArmor")) { else if (!strcmp(lsm_name(), "AppArmor")) {
lsm_config_key = "lxc.aa_profile"; lsm_config_key = "lxc.apparmor.profile";
if (file_exists("/proc/self/ns/cgroup")) if (file_exists("/proc/self/ns/cgroup"))
lsm_label = "lxc-container-default-cgns"; lsm_label = "lxc-container-default-cgns";
else else
......
...@@ -170,7 +170,7 @@ fi ...@@ -170,7 +170,7 @@ fi
run_cmd lxc-stop -n $cname -k run_cmd lxc-stop -n $cname -k
echo "test regular unconfined container" echo "test regular unconfined container"
echo "lxc.aa_profile = unconfined" >> $HDIR/.local/share/lxc/$cname/config echo "lxc.apparmor.profile = unconfined" >> $HDIR/.local/share/lxc/$cname/config
run_cmd lxc-start -n $cname -d run_cmd lxc-start -n $cname -d
run_cmd lxc-wait -n $cname -s RUNNING run_cmd lxc-wait -n $cname -s RUNNING
pid=`run_cmd lxc-info -p -H -n $cname` pid=`run_cmd lxc-info -p -H -n $cname`
...@@ -185,7 +185,7 @@ echo "masking $MOUNTSR" ...@@ -185,7 +185,7 @@ echo "masking $MOUNTSR"
mount --bind $dnam $MOUNTSR mount --bind $dnam $MOUNTSR
echo "test default confined container" echo "test default confined container"
sed -i '/aa_profile/d' $HDIR/.local/share/lxc/$cname/config sed -i '/apparmor.profile/d' $HDIR/.local/share/lxc/$cname/config
run_cmd lxc-start -n $cname -d || true run_cmd lxc-start -n $cname -d || true
sleep 3 sleep 3
pid=`run_cmd lxc-info -p -H -n $cname` || true pid=`run_cmd lxc-info -p -H -n $cname` || true
...@@ -196,7 +196,7 @@ if [ -n "$pid" -a "$pid" != "-1" ]; then ...@@ -196,7 +196,7 @@ if [ -n "$pid" -a "$pid" != "-1" ]; then
fi fi
echo "test regular unconfined container" echo "test regular unconfined container"
echo "lxc.aa_profile = unconfined" >> $HDIR/.local/share/lxc/$cname/config echo "lxc.apparmor.profile = unconfined" >> $HDIR/.local/share/lxc/$cname/config
run_cmd lxc-start -n $cname -d run_cmd lxc-start -n $cname -d
run_cmd lxc-wait -n $cname -s RUNNING run_cmd lxc-wait -n $cname -s RUNNING
pid=`run_cmd lxc-info -p -H -n $cname` pid=`run_cmd lxc-info -p -H -n $cname`
...@@ -212,7 +212,7 @@ fi ...@@ -212,7 +212,7 @@ fi
run_cmd lxc-stop -n $cname -k run_cmd lxc-stop -n $cname -k
echo "testing override" echo "testing override"
sed -i '/aa_profile/d' $HDIR/.local/share/lxc/$cname/config sed -i '/apparmor.profile/d' $HDIR/.local/share/lxc/$cname/config
echo "lxc.apparmor.allow_incomplete = 1" >> $HDIR/.local/share/lxc/$cname/config echo "lxc.apparmor.allow_incomplete = 1" >> $HDIR/.local/share/lxc/$cname/config
run_cmd lxc-start -n $cname -d run_cmd lxc-start -n $cname -d
run_cmd lxc-wait -n $cname -s RUNNING run_cmd lxc-wait -n $cname -s RUNNING
......
...@@ -282,7 +282,7 @@ lxc.pty.max = 1024 ...@@ -282,7 +282,7 @@ lxc.pty.max = 1024
lxc.cap.drop = sys_module mac_admin mac_override sys_time lxc.cap.drop = sys_module mac_admin mac_override sys_time
# When using LXC with apparmor, uncomment the next line to run unconfined: # When using LXC with apparmor, uncomment the next line to run unconfined:
#lxc.aa_profile = unconfined #lxc.apparmor.profile = unconfined
#networking #networking
#lxc.net.0.type = $lxc_network_type #lxc.net.0.type = $lxc_network_type
......
...@@ -349,7 +349,7 @@ lxc.pty.max = 1 ...@@ -349,7 +349,7 @@ lxc.pty.max = 1
lxc.cap.drop = sys_module mac_admin mac_override sys_time lxc.cap.drop = sys_module mac_admin mac_override sys_time
# When using LXC with apparmor, uncomment the next line to run unconfined: # When using LXC with apparmor, uncomment the next line to run unconfined:
#lxc.aa_profile = unconfined #lxc.apparmor.profile = unconfined
lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed
lxc.mount.entry = shm /dev/shm tmpfs defaults 0 0 lxc.mount.entry = shm /dev/shm tmpfs defaults 0 0
......
...@@ -644,7 +644,7 @@ lxc.arch = $arch ...@@ -644,7 +644,7 @@ lxc.arch = $arch
lxc.uts.name = $utsname lxc.uts.name = $utsname
# When using LXC with apparmor, uncomment the next line to run unconfined: # When using LXC with apparmor, uncomment the next line to run unconfined:
#lxc.aa_profile = unconfined #lxc.apparmor.profile = unconfined
# example simple networking setup, uncomment to enable # example simple networking setup, uncomment to enable
#lxc.net.0.type = $lxc_network_type #lxc.net.0.type = $lxc_network_type
......
...@@ -128,7 +128,7 @@ lxc.arch = $arch ...@@ -128,7 +128,7 @@ lxc.arch = $arch
lxc.cap.drop = sys_module mac_admin mac_override sys_time lxc.cap.drop = sys_module mac_admin mac_override sys_time
# When using LXC with apparmor, uncomment the next line to run unconfined: # When using LXC with apparmor, uncomment the next line to run unconfined:
#lxc.aa_profile = unconfined #lxc.apparmor.profile = unconfined
lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed
lxc.cgroup.devices.deny = a lxc.cgroup.devices.deny = a
......
...@@ -1130,7 +1130,7 @@ lxc.arch = $arch ...@@ -1130,7 +1130,7 @@ lxc.arch = $arch
lxc.uts.name = $utsname lxc.uts.name = $utsname
# When using LXC with apparmor, uncomment the next line to run unconfined: # When using LXC with apparmor, uncomment the next line to run unconfined:
#lxc.aa_profile = unconfined #lxc.apparmor.profile = unconfined
# example simple networking setup, uncomment to enable # example simple networking setup, uncomment to enable
#lxc.net.0.type = $lxc_network_type #lxc.net.0.type = $lxc_network_type
......
...@@ -489,7 +489,7 @@ lxc.arch = ${basearch} ...@@ -489,7 +489,7 @@ lxc.arch = ${basearch}
lxc.uts.name = ${utsname} lxc.uts.name = ${utsname}
# When using LXC with apparmor, uncomment the next line to run unconfined: # When using LXC with apparmor, uncomment the next line to run unconfined:
#lxc.aa_profile = unconfined #lxc.apparmor.profile = unconfined
# example simple networking setup, uncomment to enable # example simple networking setup, uncomment to enable
#lxc.net.0.type = ${lxc_network_type} #lxc.net.0.type = ${lxc_network_type}
......
...@@ -235,7 +235,7 @@ lxc.cap.drop = sys_module mac_admin mac_override sys_time ...@@ -235,7 +235,7 @@ lxc.cap.drop = sys_module mac_admin mac_override sys_time
lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed
# When using LXC with apparmor, uncomment the next line to run unconfined: # When using LXC with apparmor, uncomment the next line to run unconfined:
#lxc.aa_profile = unconfined #lxc.apparmor.profile = unconfined
#networking #networking
lxc.net.0.type = $lxc_network_type lxc.net.0.type = $lxc_network_type
......
...@@ -355,7 +355,7 @@ lxc.uts.name = $name ...@@ -355,7 +355,7 @@ lxc.uts.name = $name
lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed
# When using LXC with apparmor, uncomment the next line to run unconfined: # When using LXC with apparmor, uncomment the next line to run unconfined:
lxc.aa_profile = unconfined lxc.apparmor.profile = unconfined
# example simple networking setup, uncomment to enable # example simple networking setup, uncomment to enable
#lxc.net.0.type = $lxc_network_type #lxc.net.0.type = $lxc_network_type
......
...@@ -248,7 +248,7 @@ lxc.cap.drop = sys_module mac_admin mac_override sys_time ...@@ -248,7 +248,7 @@ lxc.cap.drop = sys_module mac_admin mac_override sys_time
lxc.autodev = $auto_dev lxc.autodev = $auto_dev
# When using LXC with apparmor, uncomment the next line to run unconfined: # When using LXC with apparmor, uncomment the next line to run unconfined:
#lxc.aa_profile = unconfined #lxc.apparmor.profile = unconfined
## Devices ## Devices
# Allow all devices # Allow all devices
......
...@@ -134,7 +134,7 @@ lxc.pty.max = 1024 ...@@ -134,7 +134,7 @@ lxc.pty.max = 1024
lxc.cap.drop = sys_module mac_admin mac_override sys_time lxc.cap.drop = sys_module mac_admin mac_override sys_time
# When using LXC with apparmor, uncomment the next line to run unconfined: # When using LXC with apparmor, uncomment the next line to run unconfined:
#lxc.aa_profile = unconfined #lxc.apparmor.profile = unconfined
lxc.mount.entry = /dev dev none ro,bind 0 0 lxc.mount.entry = /dev dev none ro,bind 0 0
lxc.mount.entry = /lib lib none ro,bind 0 0 lxc.mount.entry = /lib lib none ro,bind 0 0
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment