From 31f53036b53e062550260d6da598fe58ca5dd63c Mon Sep 17 00:00:00 2001 From: Kenton Groombridge Date: Fri, 29 Apr 2022 21:38:53 -0400 Subject: container: allow container engines to manage tmp symlinks Signed-off-by: Kenton Groombridge Signed-off-by: Jason Zaman --- policy/modules/services/container.te | 2 ++ 1 file changed, 2 insertions(+) (limited to 'policy/modules/services/container.te') diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te index 36a7163a..166a42ae 100644 --- a/policy/modules/services/container.te +++ b/policy/modules/services/container.te @@ -509,6 +509,8 @@ read_lnk_files_pattern(container_engine_domain, container_config_t, container_co allow container_engine_domain container_engine_tmp_t:dir manage_dir_perms; allow container_engine_domain container_engine_tmp_t:file manage_file_perms; allow container_engine_domain container_engine_tmp_t:fifo_file manage_fifo_file_perms; +# podman uses temporary symlinks when loading container images +allow container_engine_domain container_engine_tmp_t:lnk_file manage_lnk_file_perms; # needed when manually spawning processes inside containers allow container_engine_domain container_engine_tmp_t:sock_file manage_sock_file_perms; files_tmp_filetrans(container_engine_domain, container_engine_tmp_t, { dir file sock_file }) -- cgit v1.2.3-65-gdbad