-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add new incus module, add required rules to other modules #6
base: master
Are you sure you want to change the base?
Conversation
systemd-network-generator.service unit fails without: fs_list_tmpfs(systemd_networkd_t) allow rw to /sys/fs/cgroup/system.slice/systemd-networkd.service/memory.pressure fs_rw_cgroup_files(systemd_networkd_t) Signed-off-by: Marc Schiffbauer <[email protected]>
for reading compatibility file /usr/share/zfs/compatibility.d/openzfs-2.2 -rw-r--r--. 1 root root system_u:object_r:usr_t:s0 584 30. Aug 01:15 /usr/share/zfs/compatibility.d/openzfs-2.2 files_read_usr_files(zfs_t) files_mmap_read_usr_files(zfs_t) auto-snapshots through systemd-timer not working without this: scontext="system_u:system_r:zfs_t:s0" tcontext="system_u:object_r:zfs_exec_t:s0" class="file" perms="execute_no_trans" comm="env" exe="" path="" message="type=AVC msg=audit(1726998333.913:106): avc: denied { execute_no_trans } for pid=1708 comm="env" path="/usr/bin/zpool" dev="zfs" ino=405615 scontext=system_u:system_r:zfs_t:s0 tcontext=system_u:object_r:zfs_exec_t:s0 tclass=file permissive=0 " allow zfs_t zfs_exec_t:file execute_no_trans; Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
and add rule to other modules taht need to talk to incusd Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
Signed-off-by: Marc Schiffbauer <[email protected]>
One note regarding MCS: LXC containers currently need to use
|
This PR adds a new incus module I have developed. It is a first version, which is working for me so far with my current test set which creates, uses and manages (start,stop, restart, destroy) VMs and LXC containers.
The system I use to develop and test the changes is running with profile default/linux/amd64/23.0/hardened/selinux/systemd
As this test set does not cover every feature it is likely that more tweaks and changes need to be added in the future as issues may show up.
If you have comments and recommondations on further edits I am happy to update that PR.