diff options
author | Kenton Groombridge <me@concord.sh> | 2022-04-29 21:38:53 -0400 |
---|---|---|
committer | Jason Zaman <perfinion@gentoo.org> | 2022-09-03 11:41:55 -0700 |
commit | 31f53036b53e062550260d6da598fe58ca5dd63c (patch) | |
tree | da87eff6498454a2ff3bbd070df2f848a98d9755 /policy/modules/services/container.te | |
parent | container: allow containers to manipulate own fds (diff) | |
download | hardened-refpolicy-31f53036b53e062550260d6da598fe58ca5dd63c.tar.gz hardened-refpolicy-31f53036b53e062550260d6da598fe58ca5dd63c.tar.bz2 hardened-refpolicy-31f53036b53e062550260d6da598fe58ca5dd63c.zip |
container: allow container engines to manage tmp symlinks
Signed-off-by: Kenton Groombridge <me@concord.sh>
Signed-off-by: Jason Zaman <perfinion@gentoo.org>
Diffstat (limited to 'policy/modules/services/container.te')
-rw-r--r-- | policy/modules/services/container.te | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te index 36a7163ab..166a42ae9 100644 --- a/policy/modules/services/container.te +++ b/policy/modules/services/container.te @@ -509,6 +509,8 @@ read_lnk_files_pattern(container_engine_domain, container_config_t, container_co allow container_engine_domain container_engine_tmp_t:dir manage_dir_perms; allow container_engine_domain container_engine_tmp_t:file manage_file_perms; allow container_engine_domain container_engine_tmp_t:fifo_file manage_fifo_file_perms; +# podman uses temporary symlinks when loading container images +allow container_engine_domain container_engine_tmp_t:lnk_file manage_lnk_file_perms; # needed when manually spawning processes inside containers allow container_engine_domain container_engine_tmp_t:sock_file manage_sock_file_perms; files_tmp_filetrans(container_engine_domain, container_engine_tmp_t, { dir file sock_file }) |