Skip to content

Commit 56fe16a

Browse files
committed
Allow container domains to use container_runtime_tmpfs_t as an entrypoint
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
1 parent 969dd5a commit 56fe16a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

container.te

+2-2
Original file line numberDiff line numberDiff line change
@@ -751,7 +751,7 @@ tunable_policy(`container_connect_any',`
751751
#
752752
# spc local policy
753753
#
754-
allow spc_t { container_file_t container_var_lib_t container_ro_file_t }:file entrypoint;
754+
allow spc_t { container_file_t container_var_lib_t container_ro_file_t container_runtime_tmpfs_t}:file entrypoint;
755755
role system_r types spc_t;
756756

757757
domtrans_pattern(container_runtime_domain, container_ro_file_t, spc_t)
@@ -884,7 +884,7 @@ container_manage_files_template(container, container)
884884
typeattribute container_file_t container_file_type, user_home_type;
885885
typeattribute container_t container_domain, container_net_domain, container_user_domain;
886886
allow container_user_domain self:process getattr;
887-
allow container_domain { container_var_lib_t container_ro_file_t container_file_t }:file entrypoint;
887+
allow container_domain { container_var_lib_t container_ro_file_t container_file_t container_runtime_tmpfs_t}:file entrypoint;
888888
allow container_runtime_domain container_domain:fifo_file rw_fifo_file_perms;
889889
allow container_domain container_runtime_domain:fifo_file { rw_fifo_file_perms map };
890890
allow container_domain container_runtime_t:unix_dgram_socket sendto;

0 commit comments

Comments
 (0)