2018-03-18 17:50:57 +01:00
|
|
|
[Unit]
|
|
|
|
Description=Load AppArmor profiles
|
|
|
|
DefaultDependencies=no
|
|
|
|
Before=sysinit.target
|
|
|
|
After=systemd-journald-audit.socket
|
2018-06-16 23:14:19 +02:00
|
|
|
# profile cache: /var/cache/apparmor/ and /usr/share/apparmor/cache/
|
|
|
|
After=var.mount var-cache.mount usr.mount usr-share.mount
|
2018-03-18 17:50:57 +01:00
|
|
|
ConditionSecurity=apparmor
|
2023-10-29 10:49:33 +01:00
|
|
|
Documentation=man:apparmor(7)
|
|
|
|
Documentation=https://gitlab.com/apparmor/apparmor/wikis/home/
|
2018-03-18 17:50:57 +01:00
|
|
|
|
|
|
|
[Service]
|
|
|
|
Type=oneshot
|
|
|
|
ExecStart=/lib/apparmor/apparmor.systemd reload
|
|
|
|
ExecReload=/lib/apparmor/apparmor.systemd reload
|
|
|
|
|
|
|
|
# systemd maps 'restart' to 'stop; start' which means removing AppArmor confinement
|
|
|
|
# from running processes (and not being able to re-apply it later).
|
|
|
|
# Upstream systemd developers refused to implement an option that allows overriding
|
|
|
|
# this behaviour, therefore we have to make ExecStop a no-op to error out on the
|
|
|
|
# safe side.
|
|
|
|
#
|
|
|
|
# If you really want to unload all AppArmor profiles, run aa-teardown
|
|
|
|
ExecStop=/bin/true
|
|
|
|
RemainAfterExit=yes
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|