commit:     dd3730338d07fb8b8a96350f84148eb07ab40769
Author:     Kenton Groombridge <me <AT> concord <DOT> sh>
AuthorDate: Thu Mar 31 19:09:25 2022 +0000
Commit:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Sat Apr  9 19:28:30 2022 +0000
URL:        
https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=dd373033

container: add tunables to allow containers to access public content

Note that container engines only need read access to these files even if
manage access is enabled.

Signed-off-by: Kenton Groombridge <me <AT> concord.sh>
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>

 policy/modules/services/container.te | 30 ++++++++++++++++++++++++++++++
 1 file changed, 30 insertions(+)

diff --git a/policy/modules/services/container.te 
b/policy/modules/services/container.te
index d7d27d7c..fa4145e3 100644
--- a/policy/modules/services/container.te
+++ b/policy/modules/services/container.te
@@ -16,6 +16,20 @@ gen_tunable(container_manage_cgroup, false)
 ## </desc>
 gen_tunable(container_mounton_non_security, false)
 
+## <desc>
+##     <p>
+##     Allow containers to manage all read-writable public content.
+##     </p>
+## </desc>
+gen_tunable(container_manage_public_content, false)
+
+## <desc>
+##     <p>
+##     Allow containers to read all public content.
+##     </p>
+## </desc>
+gen_tunable(container_read_public_content, false)
+
 ## <desc>
 ##     <p>
 ##     Allow containers to use NFS filesystems.
@@ -232,6 +246,14 @@ tunable_policy(`container_manage_cgroup',`
        fs_manage_cgroup_files(container_domain)
 ')
 
+tunable_policy(`container_manage_public_content',`
+       miscfiles_manage_public_files(container_domain)
+')
+
+tunable_policy(`container_read_public_content',`
+       miscfiles_read_public_files(container_domain)
+')
+
 tunable_policy(`container_use_nfs',`
        fs_manage_nfs_dirs(container_domain)
        fs_manage_nfs_files(container_domain)
@@ -515,6 +537,14 @@ ifdef(`init_systemd',`
        init_run_bpf(container_engine_domain)
 ')
 
+tunable_policy(`container_manage_public_content',`
+       miscfiles_read_public_files(container_engine_domain)
+')
+
+tunable_policy(`container_read_public_content',`
+       miscfiles_read_public_files(container_engine_domain)
+')
+
 tunable_policy(`container_mounton_non_security',`
        files_mounton_non_security(container_engine_domain)
 ')

Reply via email to