Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
    • Switch to GitLab Next
  • Sign in / Register
apparmor
apparmor
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Locked Files
  • Issues 61
    • Issues 61
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
    • Iterations
  • Merge Requests 24
    • Merge Requests 24
  • Requirements
    • Requirements
    • List
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
    • Test Cases
  • Security & Compliance
    • Security & Compliance
    • Dependency List
    • License Compliance
  • Operations
    • Operations
    • Incidents
    • Environments
  • Packages & Registries
    • Packages & Registries
    • Container Registry
  • Analytics
    • Analytics
    • CI / CD
    • Code Review
    • Insights
    • Issue
    • Repository
    • Value Stream
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
  • AppArmor
  • apparmorapparmor
  • Issues
  • #50

Closed
Open
Opened Aug 14, 2019 by Patrick Schleizer@adrelanos

allow adding permissions globally using drop-in .d folder

A software package that uses pam_exec was developed by me. Now, unrelated packages using sudo are denied from using the pam_exec that was implemented. That same is happening when slotting in wrappers in between.

Currently we are (ab)using /etc/apparmor.d/abstractions/base to add permissions to apparmor profiles which cannot know about our modifications. Profile local files aren't suitable either since it cannot be expected with which applications that would happen and local profiles files are for local administrators, not linux distributions.

I don't think there is currently a way to express add "/usr/lib/security-misc/permission-lockdown rix," to all profiles globally?

Therefore, could you please implement /etc/apparmor.d/abstractions/base.d or /etc/apparmor.d/turntables/base.d or so?

Assignee
Assign to
None
Milestone
None
Assign milestone
Time tracking
None
Due date
None
Reference: apparmor/apparmor#50