Skip to content

Commit c990e3f

Browse files
committed
contrib/apparmor: remove version-dependent rules
These conditions were added in docker in moby/moby@8cf8924 to account for old versions of debian/ubuntu (apparmor_parser < 2.8.95) that lacked some options; > This allows us to use the apparmor profile we have in contrib/apparmor/ > and solves the problems where certain functions are not apparent on older > versions of apparmor_parser on debian/ubuntu. Those patches were from 2015/2016, and all currently supported distro versions should now have more current versions than that. Looking at the oldest supported versions; Ubuntu 18.04 "Bionic": apparmor_parser --version AppArmor parser version 2.12 Copyright (C) 1999-2008 Novell Inc. Copyright 2009-2012 Canonical Ltd. Debian 10 "Buster" apparmor_parser --version AppArmor parser version 2.13.2 Copyright (C) 1999-2008 Novell Inc. Copyright 2009-2018 Canonical Ltd. This patch removes the version-dependent rules. Signed-off-by: Sebastiaan van Stijn <[email protected]>
1 parent 4c44ec7 commit c990e3f

1 file changed

Lines changed: 0 additions & 4 deletions

File tree

contrib/apparmor/template.go

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,12 @@ profile {{.Name}} flags=(attach_disconnected,mediate_deleted) {
5353
capability,
5454
file,
5555
umount,
56-
{{if ge .Version 208096}}
5756
# Host (privileged) processes may send signals to container processes.
5857
signal (receive) peer=unconfined,
5958
# Manager may send signals to container processes.
6059
signal (receive) peer={{.DaemonProfile}},
6160
# Container processes may send signals amongst themselves.
6261
signal (send,receive) peer={{.Name}},
63-
{{end}}
6462
6563
deny @{PROC}/* w, # deny write for all files directly in /proc (not in a subdir)
6664
# deny write to files not in /proc/<number>/** or /proc/sys/**
@@ -82,11 +80,9 @@ profile {{.Name}} flags=(attach_disconnected,mediate_deleted) {
8280
deny /sys/firmware/** rwklx,
8381
deny /sys/kernel/security/** rwklx,
8482
85-
{{if ge .Version 208095}}
8683
# allow processes within the container to trace each other,
8784
# provided all other LSM and yama setting allow it.
8885
ptrace (trace,tracedby,read,readby) peer={{.Name}},
89-
{{end}}
9086
}
9187
`
9288

0 commit comments

Comments
 (0)