Replies: 3 comments
-
I don't see that this is an upstream issue, should I move this to a discussion? |
Beta Was this translation helpful? Give feedback.
-
If that is the case, we can! |
Beta Was this translation helpful? Give feedback.
-
How do you run this? podman exec? This would spawn a new process tree basically and not use your hook to overwrite the profile as that one is only execute for the container creation. If Second do you actually need a hook you can set |
Beta Was this translation helpful? Give feedback.
-
Issue Description
I am trying to load an AppArmor profile using OCI hooks and without passing the
--security-opt
flag. But it is causing some issues.Steps to reproduce the issue
Steps to reproduce the issue
appArmorProfile
to an already loaded profileYou will see it will show your custom app-armor profile name
Now exec into your container and try to violate the profile, you will find that it is not blocking anything
Now exec into the container and run
You will observe that it also shows the correct profile name
You will observe it is showing the default app-armor profile not the custom
Describe the results you received
Results are stated above
Describe the results you expected
I have written the expectations in the description itself
podman info output
Podman in a container
No
Privileged Or Rootless
None
Upstream Latest Release
Yes
Additional environment details
Additional environment details
Additional information
Additional information like issue happens only occasionally or issue happens with a particular architecture or on a particular setting
Beta Was this translation helpful? Give feedback.
All reactions