Some tests need to mount /proc (like pbuilder) or do bind mounts (like
nested LXC), so we need to relax the restrictions. As lxd containers are
unprivileged, the extra apparmor profile is merely a fallback security
layer; users should not be able to do any harm to the host in an unpriv
container.

Create profile without AppArmor:

  lxc profile create autopkgtest
  lxc profile show default | sed '/^name:/ s/default/autopkgtest/' | lxc 
profile edit autopkgtest
  lxc profile set autopkgtest raw.lxc lxc.aa_profile=unconfined

Start containers with:

   lxc launch images:ubuntu/xenial/amd64 x1 --profile autopkgtest

In that container bind mounts and mounting proc etc. works.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1519677

Title:
  add lxd backend

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/autopkgtest/+bug/1519677/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to