2834f842ee
The runc/libcontainer apparmor package on master no longer checks if apparmor_parser is enabled, or if we are running docker-in-docker. While those checks are not relevant to runc (as it doesn't load the profile), these checks _are_ relevant to us (and containerd). So switching to use the containerd apparmor package, which does include the needed checks. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
45 lines
1.1 KiB
Go
45 lines
1.1 KiB
Go
// +build linux
|
|
|
|
package daemon // import "github.com/docker/docker/daemon"
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/containerd/containerd/pkg/apparmor"
|
|
aaprofile "github.com/docker/docker/profiles/apparmor"
|
|
)
|
|
|
|
// Define constants for native driver
|
|
const (
|
|
unconfinedAppArmorProfile = "unconfined"
|
|
defaultAppArmorProfile = "docker-default"
|
|
)
|
|
|
|
// DefaultApparmorProfile returns the name of the default apparmor profile
|
|
func DefaultApparmorProfile() string {
|
|
if apparmor.HostSupports() {
|
|
return defaultAppArmorProfile
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func ensureDefaultAppArmorProfile() error {
|
|
if apparmor.HostSupports() {
|
|
loaded, err := aaprofile.IsLoaded(defaultAppArmorProfile)
|
|
if err != nil {
|
|
return fmt.Errorf("Could not check if %s AppArmor profile was loaded: %s", defaultAppArmorProfile, err)
|
|
}
|
|
|
|
// Nothing to do.
|
|
if loaded {
|
|
return nil
|
|
}
|
|
|
|
// Load the profile.
|
|
if err := aaprofile.InstallDefault(defaultAppArmorProfile); err != nil {
|
|
return fmt.Errorf("AppArmor enabled on system but the %s profile could not be loaded: %s", defaultAppArmorProfile, err)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|