Ubuntu's default (since 23.10) AppArmor rules break some tests #545
Labels
No labels
Affects/CppNix
Affects/Nightly
Affects/Only nightly
Affects/Stable
Area/build-packaging
Area/cli
Area/evaluator
Area/fetching
Area/flakes
Area/language
Area/lix ci
Area/nix-eval-jobs
Area/profiles
Area/protocol
Area/releng
Area/remote-builds
Area/repl
Area/repl/debugger
Area/store
bug
Context
contributors
Context
drive-by
Context
maintainers
Context
RFD
crash 💥
Cross Compilation
devx
docs
Downstream Dependents
E/easy
E/hard
E/help wanted
E/reproducible
E/requires rearchitecture
imported
Language/Bash
Language/C++
Language/NixLang
Language/Python
Language/Rust
Needs Langver
OS/Linux
OS/macOS
performance
regression
release-blocker
stability
Status
blocked
Status
invalid
Status
postponed
Status
wontfix
testing
testing/flakey
Topic/Large Scale Installations
ux
No milestone
No project
No assignees
3 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: lix-project/lix#545
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Describe the bug
Ubuntu now restricts unprivileged user namespaces:
https://ubuntu.com/blog/ubuntu-23-10-restricted-unprivileged-user-namespaces
Which breaks these tests:
Steps To Reproduce
With AppArmor installed, set
And run the test suite. Observe that the above tests fail with confusing output like
Expected behavior
The tests should at least error out immediately when this incompatibility is noticed
I hit this issue on the default GHA runners when trying to build
lix
from main.Adding the below lines (from the link included above) to my workflow prior to building
lix
resolved the issue:I am wondering if one possible solution to this is to implement deliberate apparmor confinement inside the sandbox to allow it. I did some research on apparmor which I believe is documented here: https://hackmd.io/03UGerewRcy3db44JQoWvw
My memory is that we didn't much want to deal with it because the userspace tools make a bunch of annoying assumptions and require putting stuff in the filesystem. Or at least that's how docker implemented it in their containers. But this might be tolerable or we might be able to do it nicely, or maybe we can bypass the normal userspace tooling completely.