364d8e1505
Allowing mounts in containers is dangerous. Bugs in mount namespaces or quirks of the container configuration could allow for various breakouts. By default, processes in containers will not be able to mount anyway, rendering the allowances in the default AppArmor profile nearly useless. Manually created sub-containers were able to mount, but were yet restricted from performing most of the mounts flags indicated in the profile. Signed-off-by: Eric Windisch <eric@windisch.us> |
||
---|---|---|
.. | ||
apparmor.go | ||
apparmor_disabled.go | ||
gen.go | ||
setup.go |