1
- policy_module(container, 2 .153 .0 )
1
+ policy_module(container, 2 .154 .0 )
2
2
gen_require(`
3
3
class passwd rootok;
4
4
')
@@ -37,6 +37,7 @@ typealias container_runtime_t alias docker_t;
37
37
type container_runtime_exec_t alias docker_exec_t;
38
38
can_exec(container_runtime_t,container_runtime_exec_t)
39
39
attribute container_domain;
40
+ attribute container_user_domain;
40
41
attribute container_net_domain;
41
42
allow container_runtime_domain container_domain:process { dyntransition transition };
42
43
allow container_domain container_runtime_domain:process sigchld;
@@ -570,13 +571,6 @@ optional_policy(`
570
571
udev_read_db(container_runtime_domain)
571
572
')
572
573
573
- optional_policy(`
574
- gen_require(`
575
- role staff_r;
576
- ')
577
- role_transition staff_r container_runtime_exec_t system_r;
578
- ')
579
-
580
574
optional_policy(`
581
575
unconfined_stub_role()
582
576
unconfined_domain(container_runtime_t)
@@ -733,7 +727,7 @@ sysnet_dns_name_resolve(container_auth_t)
733
727
gen_require(`
734
728
type container_t;
735
729
')
736
- typeattribute container_t container_domain, container_net_domain;
730
+ typeattribute container_t container_domain, container_net_domain, container_user_domain ;
737
731
allow container_domain { container_var_lib_t container_ro_file_t container_file_t }:file entrypoint;
738
732
allow container_runtime_domain container_domain:fifo_file rw_fifo_file_perms;
739
733
allow container_domain container_runtime_domain:fifo_file { rw_fifo_file_perms map };
@@ -1044,7 +1038,7 @@ optional_policy(`
1044
1038
#
1045
1039
container_domain_template(container_userns)
1046
1040
1047
- typeattribute container_userns_t sandbox_net_domain;
1041
+ typeattribute container_userns_t sandbox_net_domain, container_user_domain ;
1048
1042
dev_mount_sysfs_fs(container_userns_t)
1049
1043
dev_mounton_sysfs(container_userns_t)
1050
1044
@@ -1112,10 +1106,10 @@ optional_policy(`
1112
1106
role sysadm_r types spc_t;
1113
1107
1114
1108
container_runtime_run(staff_t, staff_r)
1115
- role staff_r types container_domain ;
1109
+ role staff_r types container_user_domain ;
1116
1110
1117
1111
container_runtime_run(user_t, user_r)
1118
- role user_r types container_domain ;
1112
+ role user_r types container_user_domain ;
1119
1113
')
1120
1114
1121
1115
gen_require(`
@@ -1139,7 +1133,7 @@ allow container_t proc_t:filesystem remount;
1139
1133
1140
1134
# Container kvm - Policy for running kata containers
1141
1135
container_domain_template(container_kvm)
1142
- typeattribute container_kvm_t container_net_domain;
1136
+ typeattribute container_kvm_t container_net_domain, container_user_domain ;
1143
1137
1144
1138
type container_kvm_var_run_t;
1145
1139
files_pid_file(container_kvm_var_run_t)
@@ -1192,7 +1186,7 @@ sssd_read_public_files(container_kvm_t)
1192
1186
1193
1187
# Container init - Policy for running systemd based containers
1194
1188
container_domain_template(container_init)
1195
- typeattribute container_init_t container_net_domain;
1189
+ typeattribute container_init_t container_net_domain, container_user_domain ;
1196
1190
1197
1191
corenet_unconfined(container_init_t)
1198
1192
0 commit comments