mirror of
https://git.proxmox.com/git/mirror_lxc
synced 2025-07-14 09:53:28 +00:00

This uses the generate-apparmor-rules.py script I sent out some time ago to auto-generate apparmor rules based on a higher level set of block/allow rules. Add apparmor policy testcase to make sure that some of the paths we expect to be denied (and allowed) write access to are in fact in effect in the final policy. With this policy, libvirt in a container is able to start its default network, which previously it could not. v2: address feedback from stgraber put lxc-generate-aa-rules.py into EXTRA_DIST add lxc-test-apparmor, container-base and container-rules to .gitignore take lxc-test-apparmor out of EXTRA_DIST make lxc-generate-aa-rules.py pep8-compliant don't automatically generate apparmor rules This is only bc we can't be guaranteed that python3 will be available. Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> Acked-by: Stéphane Graber <stgraber@ubuntu.com>
13 lines
447 B
Plaintext
13 lines
447 B
Plaintext
The abstractions/container-base file is partially automatically
|
|
generated. The two source files are container-rules.base and
|
|
abstractions/container-base.in. If these file are updated,
|
|
then
|
|
|
|
1. Generate a new container-rules file using
|
|
|
|
./lxc-generate-aa-rules.py container-rules.base > container-rules
|
|
|
|
2. Concatenate container-base.in with container-rules using
|
|
|
|
cat abstractions/container-base.in container-rules > abstractions/container-base
|