commit: dd3730338d07fb8b8a96350f84148eb07ab40769
Author: Kenton Groombridge <me <AT> concord <DOT> sh>
AuthorDate: Thu Mar 31 19:09:25 2022 +0000
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Sat Apr 9 19:28:30 2022 +0000
URL:
https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=dd373033
container: add tunables to allow containers to access public content
Note that container engines only need read access to these files even if
manage access is enabled.
Signed-off-by: Kenton Groombridge <me <AT> concord.sh>
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
policy/modules/services/container.te | 30 ++++++++++++++++++++++++++++++
1 file changed, 30 insertions(+)
diff --git a/policy/modules/services/container.te
b/policy/modules/services/container.te
index d7d27d7c..fa4145e3 100644
--- a/policy/modules/services/container.te
+++ b/policy/modules/services/container.te
@@ -16,6 +16,20 @@ gen_tunable(container_manage_cgroup, false)
## </desc>
gen_tunable(container_mounton_non_security, false)
+## <desc>
+## <p>
+## Allow containers to manage all read-writable public content.
+## </p>
+## </desc>
+gen_tunable(container_manage_public_content, false)
+
+## <desc>
+## <p>
+## Allow containers to read all public content.
+## </p>
+## </desc>
+gen_tunable(container_read_public_content, false)
+
## <desc>
## <p>
## Allow containers to use NFS filesystems.
@@ -232,6 +246,14 @@ tunable_policy(`container_manage_cgroup',`
fs_manage_cgroup_files(container_domain)
')
+tunable_policy(`container_manage_public_content',`
+ miscfiles_manage_public_files(container_domain)
+')
+
+tunable_policy(`container_read_public_content',`
+ miscfiles_read_public_files(container_domain)
+')
+
tunable_policy(`container_use_nfs',`
fs_manage_nfs_dirs(container_domain)
fs_manage_nfs_files(container_domain)
@@ -515,6 +537,14 @@ ifdef(`init_systemd',`
init_run_bpf(container_engine_domain)
')
+tunable_policy(`container_manage_public_content',`
+ miscfiles_read_public_files(container_engine_domain)
+')
+
+tunable_policy(`container_read_public_content',`
+ miscfiles_read_public_files(container_engine_domain)
+')
+
tunable_policy(`container_mounton_non_security',`
files_mounton_non_security(container_engine_domain)
')