Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

container_user_u issues related to podmansh #293

Open
bachradsusi opened this issue Jan 8, 2024 · 2 comments
Open

container_user_u issues related to podmansh #293

bachradsusi opened this issue Jan 8, 2024 · 2 comments

Comments

@bachradsusi
Copy link

  • podmansh(1) mentions label=user:container_user_u which is defined in this policy. This repository ships container_u file to assign correct context during login - it should follow seuser_id so the right file should be container_user_u and it's probably not necessary at all unless it's expected that container_user_u would be used for users who log in.

  • In order to make container_user_u available for this use case, it's necessary to run semanage user -a -r s0-s0:c0.c1023 -R "container_user_r" container_user_u or use gen_user() macro

  • there are few missing rules to make it work with unconfined_t:

(roleallow unconfined_r container_user_r)

(allow container_runtime_t container_user_t ( process ( transition )))
(allow container_runtime_t container_user_t ( process2 ( nnp_transition )))

(allow container_user_t container_file_t ( chr_file ( ioctl read write )))
(allow container_user_t container_file_t ( file ( entrypoint )))
(allow container_user_t container_runtime_t ( fifo_file ( write )))
@rhatdan
Copy link
Member

rhatdan commented Jan 17, 2024

How can I do
(roleallow unconfined_r container_user_r)
Using traditional container.te rules?

@zpytela
Copy link
Contributor

zpytela commented Jan 19, 2024

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants