1
- policy_module(container, 2 .167 .0 )
1
+ policy_module(container, 2 .168 .0 )
2
2
3
3
gen_require(`
4
4
class passwd rootok;
@@ -600,7 +600,6 @@ optional_policy(`
600
600
allow container_runtime_t unconfined_t:process transition;
601
601
allow unconfined_domain_type { container_var_lib_t container_ro_file_t }:file entrypoint;
602
602
fs_fusefs_entrypoint(unconfined_domain_type)
603
- allow container_domain unconfined_t:unix_stream_socket { accept ioctl read getattr lock write append getopt };
604
603
')
605
604
606
605
optional_policy(`
@@ -1034,6 +1033,7 @@ gen_require(`
1034
1033
container_read_pid_files(iptables_t)
1035
1034
container_read_state(iptables_t)
1036
1035
container_append_file(iptables_t)
1036
+ allow iptables_t container_runtime_domain:fifo_file rw_fifo_file_perms;
1037
1037
1038
1038
optional_policy(`
1039
1039
gen_require(`
@@ -1127,6 +1127,7 @@ optional_policy(`
1127
1127
gen_require(`
1128
1128
type sysadm_t, staff_t, user_t;
1129
1129
role sysadm_r, staff_r, user_r;
1130
+ attribute userdomain;
1130
1131
')
1131
1132
1132
1133
container_runtime_run(sysadm_t, sysadm_r)
@@ -1143,6 +1144,7 @@ optional_policy(`
1143
1144
1144
1145
allow staff_t container_runtime_t:process signal_perms;
1145
1146
allow staff_t container_domain:process signal_perms;
1147
+ allow container_domain userdomain:unix_stream_socket { accept ioctl read getattr lock write append getopt };
1146
1148
')
1147
1149
1148
1150
gen_require(`
0 commit comments