Skip to content

Commit

Permalink
Add support for lockdown:confidentiality to container_runtime
Browse files Browse the repository at this point in the history
Signed-off-by: Daniel J Walsh <[email protected]>
  • Loading branch information
rhatdan committed May 5, 2021
1 parent 266203e commit 9b1ebb6
Showing 1 changed file with 2 additions and 1 deletion.
3 changes: 2 additions & 1 deletion container.te
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
policy_module(container, 2.160.2)
policy_module(container, 2.161.0)
gen_require(`
class passwd rootok;
')
Expand Down Expand Up @@ -114,6 +114,7 @@ mls_trusted_object(container_runtime_t)
#
allow container_runtime_domain self:capability { chown kill fowner fsetid mknod net_admin net_bind_service net_raw setfcap sys_resource };
allow container_runtime_domain self:tun_socket { create_socket_perms relabelto };
allow container_runtime_domain self:lockdown { confidentiality integrity };
allow container_runtime_domain self:process ~setcurrent;
allow container_runtime_domain self:passwd rootok;
allow container_runtime_domain self:fd use;
Expand Down

0 comments on commit 9b1ebb6

Please sign in to comment.