aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorKenton Groombridge <me@concord.sh>2022-03-31 15:09:25 -0400
committerJason Zaman <perfinion@gentoo.org>2022-04-09 12:28:30 -0700
commitdd3730338d07fb8b8a96350f84148eb07ab40769 (patch)
tree1dcf4f3934e2c00eadd5477ffb65a214aca45cf0 /policy/modules/services/container.te
parentcontainer: allow generic containers to read the vm_overcommit sysctl (diff)
downloadhardened-refpolicy-dd3730338d07fb8b8a96350f84148eb07ab40769.tar.gz
hardened-refpolicy-dd3730338d07fb8b8a96350f84148eb07ab40769.tar.bz2
hardened-refpolicy-dd3730338d07fb8b8a96350f84148eb07ab40769.zip
container: add tunables to allow containers to access public content
Note that container engines only need read access to these files even if manage access is enabled. Signed-off-by: Kenton Groombridge <me@concord.sh> Signed-off-by: Jason Zaman <perfinion@gentoo.org>
Diffstat (limited to 'policy/modules/services/container.te')
-rw-r--r--policy/modules/services/container.te30
1 files changed, 30 insertions, 0 deletions
diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te
index d7d27d7cf..fa4145e3d 100644
--- a/policy/modules/services/container.te
+++ b/policy/modules/services/container.te
@@ -18,6 +18,20 @@ gen_tunable(container_mounton_non_security, false)
## <desc>
## <p>
+## Allow containers to manage all read-writable public content.
+## </p>
+## </desc>
+gen_tunable(container_manage_public_content, false)
+
+## <desc>
+## <p>
+## Allow containers to read all public content.
+## </p>
+## </desc>
+gen_tunable(container_read_public_content, false)
+
+## <desc>
+## <p>
## Allow containers to use NFS filesystems.
## </p>
## </desc>
@@ -232,6 +246,14 @@ tunable_policy(`container_manage_cgroup',`
fs_manage_cgroup_files(container_domain)
')
+tunable_policy(`container_manage_public_content',`
+ miscfiles_manage_public_files(container_domain)
+')
+
+tunable_policy(`container_read_public_content',`
+ miscfiles_read_public_files(container_domain)
+')
+
tunable_policy(`container_use_nfs',`
fs_manage_nfs_dirs(container_domain)
fs_manage_nfs_files(container_domain)
@@ -515,6 +537,14 @@ ifdef(`init_systemd',`
init_run_bpf(container_engine_domain)
')
+tunable_policy(`container_manage_public_content',`
+ miscfiles_read_public_files(container_engine_domain)
+')
+
+tunable_policy(`container_read_public_content',`
+ miscfiles_read_public_files(container_engine_domain)
+')
+
tunable_policy(`container_mounton_non_security',`
files_mounton_non_security(container_engine_domain)
')