Skip to content

Commit

Permalink
Merge pull request #229 from rhatdan/dbus
Browse files Browse the repository at this point in the history
Allow daemon to send dbus messages to spc_t
  • Loading branch information
rhatdan authored Apr 22, 2023
2 parents f4f8294 + 3a34da7 commit 53e7362
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 3 deletions.
1 change: 0 additions & 1 deletion container.if
Original file line number Diff line number Diff line change
Expand Up @@ -997,7 +997,6 @@ interface(`container_kubelet_domtrans',`
interface(`container_kubelet_run',`
gen_require(`
type kubelet_t;
class dbus send_msg;
')

container_kubelet_domtrans($1)
Expand Down
4 changes: 2 additions & 2 deletions container.te
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
policy_module(container, 2.210.0)
policy_module(container, 2.211.0)

gen_require(`
class passwd rootok;
Expand Down Expand Up @@ -731,6 +731,7 @@ optional_policy(`
# This should eventually be in upstream policy.
# https://github.com/fedora-selinux/selinux-policy/pull/806
allow spc_t domain:bpf { map_create map_read map_write prog_load prog_run };
allow daemon spc_t:dbus send_msg;
')

optional_policy(`
Expand Down Expand Up @@ -999,7 +1000,6 @@ allow container_net_domain self:rawip_socket create_stream_socket_perms;
allow container_net_domain self:netlink_kobject_uevent_socket create_socket_perms;
allow container_net_domain self:netlink_xfrm_socket create_netlink_socket_perms;


kernel_unlabeled_domtrans(container_runtime_domain, spc_t)
kernel_unlabeled_entry_type(spc_t)
allow container_runtime_domain unlabeled_t:key manage_key_perms;
Expand Down

0 comments on commit 53e7362

Please sign in to comment.