From: Daan De Meyer Date: Fri, 7 Jun 2024 18:01:59 +0000 (+0200) Subject: action: Disable apparmor completely X-Git-Tag: v23.1~11 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=2484c85f5c95117a8b41d73f5997fd2ea59fbcdd;p=thirdparty%2Fmkosi.git action: Disable apparmor completely These are ephemeral CI machines with full root access without password, there's really no point in running apparmor in the first place so instead of trying to work around broken apparmor policies, just disable apparmor completely. --- diff --git a/action.yaml b/action.yaml index 4445ba233..a9dd29f6a 100644 --- a/action.yaml +++ b/action.yaml @@ -38,13 +38,14 @@ runs: sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_unconfined=0 sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_userns=0 - - name: Remove and disable unix-chkpwd apparmor profile + # Both the unix-chkpwd and swtpm profiles are broken (https://gitlab.com/apparmor/apparmor/-/issues/402) so let's + # just disable apparmor completely. It's not relevant in this context anyway. + # TODO: Remove if https://github.com/actions/runner-images/issues/10015 is ever fixed. + - name: Disable and mask apparmor service shell: bash run: | - if [[ -f /etc/apparmor.d/unix-chkpwd ]]; then - sudo ln --symbolic /etc/apparmor.d/unix-chkpwd /etc/apparmor.d/disable/ - sudo apparmor_parser --remove /etc/apparmor.d/unix-chkpwd - fi + sudo systemctl disable --now apparmor + sudo systemctl mask apparmor - name: Dependencies shell: bash