-
Notifications
You must be signed in to change notification settings - Fork 933
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Instance: Allow nosymfollow mount flag for container apparmor profile #13681
Conversation
cc @enr0n |
b940de9
to
24dcedb
Compare
@mihalicyn please can you add what this fix resolves in terms of which ubuntu version we can now run as containers? |
24dcedb
to
b7e13e8
Compare
I'm not sure, because if I understand correcly this issue is only reproducible with some experimental systemd versions and with Oracular. I wasn't able to reproduce any issues locally. I hope @enr0n will help us with testing/validation of this. |
b7e13e8
to
42a75bc
Compare
Add some infastructure to check AppArmor features availability, as version checks can not be reliable because of backports of different features between branches. Signed-off-by: Alexander Mikhalitsyn <[email protected]>
See also: canonical#12698 Thanks-to: Nick Rosbrook <[email protected]> Signed-off-by: Alexander Mikhalitsyn <[email protected]>
42a75bc
to
b5a4a65
Compare
@@ -69,6 +75,7 @@ type OS struct { | |||
AppArmorConfined bool | |||
AppArmorStacked bool | |||
AppArmorStacking bool | |||
AppArmorFeatures AppArmorFeaturesInfo |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we make AppArmor
a field with its own struct and internal mutex and then Features
a map type, so we access it using OS.AppArmor.Features, rather than OS.AppArmorFeatures.Map which seems rather unusual (to have a field named after a data type) or OS.AppArmorFeatures.Features (which stutters)?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We'd need to move the other AppArmor* fields into this new sub-struct.
@mihalicyn @enr0n has advised:
Please can you test this PR with that to check it resolves it. Ta |
Tested and it does not work. Looks like we need something else in addition to this change. |
Lets move this back to draft. |
canonical/lxd#13681 canonical/lxd#13820 Signed-off-by: Thomas Parrott <[email protected]>
Closes #12698