mirror_lxc/config/selinux
Maximilian Blenk 4fef78bc33 container.conf: Add option to set keyring SELinux context
lxc set's up a new session keyring for every container by default.
If executed on an SELinux enabled system, by default, the keyring
inherits the label of the creating process. If executed with the
currently available SELinux policy, this means that the keyring
is labeled with the lxc_t type. Applications inside the container,
however, might expect that the keyring is labeled with a certain
context (and will fail to access the keyring if it's not explicitly
allowed in the global policy). This patch introduces the config
option lxc.selinux.context.keyring which enables to specify the
label of the newly created keyring. That is, the keyring can be
labeled with the label expected by the started application.

Signed-off-by: Maximilian Blenk <Maximilian.Blenk@bmw.de>
2020-01-31 14:33:01 +01:00
..
lxc.if provide an example SELinux policy for older releases 2014-07-31 14:12:25 -04:00
lxc.te container.conf: Add option to set keyring SELinux context 2020-01-31 14:33:01 +01:00
Makefile.am provide an example SELinux policy for older releases 2014-07-31 14:12:25 -04:00