You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
right now, we depend on some external entity (packaging, aliens) to distribute an apparmor profile called lxc-container-default-cgns, and we hope that profile is reasonable. we should really have some way for stacker to generate that profile, perhaps using lxd's apparmor library:
FWIW, it looks like liblxc proper has this functionality. It should be fairly easy to use this in stacker: tych0@434cfeb
However, this assumes that you are a privileged user, since users without CAP_MAC_ADMIN can't load policy in the root apparmor namespace or create namespaces (though if a namespace exists, unprivileged users can load policy there if they have CAP_MAC_ADMIN in the userns that owns the AA ns). We could fix this by allowing unprivileged userns creation: tych0/linux@b6e0913
right now, we depend on some external entity (packaging, aliens) to distribute an apparmor profile called lxc-container-default-cgns, and we hope that profile is reasonable. we should really have some way for stacker to generate that profile, perhaps using lxd's apparmor library:
https://github.com/lxc/lxd/tree/master/lxd/apparmor
which was written for this purpose, but has a lot of lxd-specific code.
The text was updated successfully, but these errors were encountered: