a5c28c86f56835fa3e0915558e05390dd0a79580 |
|
25-Mar-2016 |
Aleksandr Mezin <mezin.alexander@gmail.com> |
Fix installation of out-of-tree (VPATH) builds
Signed-off-by: Aleksandr Mezin <mezin.alexander@gmail.com> |
dc76ac7ab5295b8ad40ac57c51e03da4dbd28479 |
|
22-Feb-2016 |
Serge Hallyn <serge.hallyn@ubuntu.com> |
add lxc-default-cgns profile
This isn't safe for privileged containers which do not use cgroup
namespaces, but is required for systemd containers with cgroup
namespaces. So create a new profile for it which lxc will use as
the default when it knows it can.
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> |
198b363fff1de9afcee2f26b9aa847316f589afe |
|
01-Apr-2014 |
Serge Hallyn <serge.hallyn@ubuntu.com> |
apparmor: auto-generate the blacklist rules
This uses the generate-apparmor-rules.py script I sent out some time
ago to auto-generate apparmor rules based on a higher level set of
block/allow rules.
Add apparmor policy testcase to make sure that some of the paths we
expect to be denied (and allowed) write access to are in fact in
effect in the final policy.
With this policy, libvirt in a container is able to start its
default network, which previously it could not.
v2: address feedback from stgraber
put lxc-generate-aa-rules.py into EXTRA_DIST
add lxc-test-apparmor, container-base and container-rules to .gitignore
take lxc-test-apparmor out of EXTRA_DIST
make lxc-generate-aa-rules.py pep8-compliant
don't automatically generate apparmor rules
This is only bc we can't be guaranteed that python3 will be
available.
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com> |
8da250dad4b11c4983031742a83fb8f358044fe0 |
|
16-Jan-2014 |
Stéphane Graber <stgraber@ubuntu.com> |
apparmor: Add profiles
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com> |