MAAS rack server triggers Apparmor denial on virsh KVM SSH host interactions

Bug #2009876 reported by Adam Vest
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
MAAS
Triaged
Low
Unassigned
3.4
Won't Fix
Low
Unassigned

Bug Description

Hello,

I'm just opening this bug to report an Apparmor denial that a MAAS rackd server is triggering:
---
Mar 09 17:12:24 host audit[3206]: AVC apparmor="DENIED" operation="open" profile="snap.maas.supervisor" name="/etc/ssh/ssh_config" pid=3206 comm="ssh" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
Mar 09 17:12:24 host kernel: audit: type=1400 audit(1678381944.845:60): apparmor="DENIED" operation="open" profile="snap.maas.supervisor" name="/etc/ssh/ssh_config" pid=3206 comm="ssh" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
---

This happens (at least) when:
1. A new KVM SSH virsh host is added
2. An existing KVM SSH virsh host is refreshed
3. Composing a new machine on a KVM SSH virsh host

As far as I can tell, this doesn't appear to be negatively impacting MAAS functionality. Recommend evaluating if MAAS should have read access to that file (probably should?), and if so, correcting the Apparmor profile accordingly, or if not, adjusting MAAS to stop trying to access it?

Thanks for your time!

Running:
root # snap list maas
Name Version Rev Tracking Publisher Notes
maas 3.3.0-13159-g.1c22f7beb 25850 3.3/stable canonical✓ -

description: updated
Changed in maas:
status: New → Triaged
importance: Undecided → Low
Changed in maas:
milestone: none → 3.4.0
Alberto Donato (ack)
Changed in maas:
milestone: 3.4.0 → 3.4.x
Changed in maas:
milestone: 3.4.x → 3.5.x
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.