Control: tag -1 + wontfix Hi,
Jarl Gullberg (2025-05-06): > That's correct - it ships unconfined, but when set to complain or enforce > crun is unusable. Thank you for confirming. IMO this profile behaves as intended and the comment it includes seems sufficient to me to discourage most users from setting it to anything but unconfined, so I'm going to mark this bug wontfix. It's not super actionable anyway, even if one disagrees with my assessment, so whether we keep this open or wontfix or close probably won't matter in practice. > It's fairly common to require all installed apparmor profiles to be set as > enforcing when doing security audits / certifications (or have a damn good > documented reason why it's not), which is how I stumbled over this. Wow, this feels like a very simplistic guideline to me. I'm not particularly motivated to spend any time facilitating its implementation, but still, my last 2 cents on this topic: I would hope a "damn good documented reason why it's not" can be "upstream and the distro maintainers have decided to ship a profile in non-enforcing mode and we trust that they know what they're doing, so perhaps we should not blindly override their decision *by default*". If not, I hope the comment on top of those files will be sufficient to satisfy the needs of anyone who has to comply with the aforementioned rule: # This profile allows everything and only exists to give the # application a name instead of having the label "unconfined" Cheers, -- intrigeri