mirror_lxc/config/apparmor/README
Serge Hallyn 198b363fff apparmor: auto-generate the blacklist rules
This uses the generate-apparmor-rules.py script I sent out some time
ago to auto-generate apparmor rules based on a higher level set of
block/allow rules.

Add apparmor policy testcase to make sure that some of the paths we
expect to be denied (and allowed) write access to are in fact in
effect in the final policy.

With this policy, libvirt in a container is able to start its
default network, which previously it could not.

v2: address feedback from stgraber
	  put lxc-generate-aa-rules.py into EXTRA_DIST
	  add lxc-test-apparmor, container-base and container-rules to .gitignore
	  take lxc-test-apparmor out of EXTRA_DIST
	  make lxc-generate-aa-rules.py pep8-compliant
	  don't automatically generate apparmor rules
	  This is only bc we can't be guaranteed that python3 will be
	  available.

Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com>
2014-04-01 13:49:43 -04:00

13 lines
447 B
Plaintext

The abstractions/container-base file is partially automatically
generated. The two source files are container-rules.base and
abstractions/container-base.in. If these file are updated,
then
1. Generate a new container-rules file using
./lxc-generate-aa-rules.py container-rules.base > container-rules
2. Concatenate container-base.in with container-rules using
cat abstractions/container-base.in container-rules > abstractions/container-base