1
0
Fork 0
mirror of https://github.com/containers/youki synced 2024-05-08 16:46:17 +02:00
youki/crates/container/src/apparmor.rs

38 lines
1.1 KiB
Rust

use anyhow::{Context, Result};
use std::{
fs::{self},
path::Path,
};
use crate::utils;
const ENABLED_PARAMETER_PATH: &str = "/sys/module/apparmor/parameters/enabled";
/// Checks if AppArmor has been enabled on the system.
pub fn is_enabled() -> Result<bool> {
let aa_enabled = fs::read_to_string(ENABLED_PARAMETER_PATH)
.with_context(|| format!("could not read {}", ENABLED_PARAMETER_PATH))?;
Ok(aa_enabled.starts_with('Y'))
}
/// Applies an AppArmor profile to the container.
pub fn apply_profile(profile: &str) -> Result<()> {
if profile.is_empty() {
return Ok(());
}
// Try the module specific subdirectory. This is the recommended way to configure
// LSMs since Linux 5.1. AppArmor has such a directory since Linux 5.8.
if activate_profile(Path::new("/proc/self/attr/apparmor/exec"), profile).is_ok() {
return Ok(());
}
// try the legacy interface
activate_profile(Path::new("/proc/self/attr/exec"), profile)
}
fn activate_profile(path: &Path, profile: &str) -> Result<()> {
utils::ensure_procfs(path)?;
utils::write_file(path, format!("exec {}", profile))
}