-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refined SELinux policy #935
Conversation
36d3fc7
to
d21913b
Compare
6ea2179
to
6b59efe
Compare
6b59efe
to
dd462cc
Compare
@rhatdan @alexlarsson @dougsland PTAL |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Small request if possible but LGTM, as always, would be nice to have @rhatdan bless when selinux is involved.
dd462cc
to
223bd9b
Compare
/packit test |
223bd9b
to
fb380e6
Compare
Relates to: eclipse-bluechi#883 When enforcing the SELinux policy of BlueChi, the calls from bluechi-agent to systemd are blocked. The missing privileges of bluechi_agent_t (source context) on the systemd types (e.g. systemd_unit_file_t) and init type have been added. Signed-off-by: Michael Engel <[email protected]>
Signed-off-by: Michael Engel <[email protected]>
fb380e6
to
a175616
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Lets merge this and run some multihost tests to verify nothing broke. |
Relates to: #883
When enforcing the SELinux policy of BlueChi, the calls from bluechi-agent to systemd are blocked. The missing privileges of bluechi_agent_t (source context) on the systemd types (e.g. systemd_unit_file_t) and init type have been added.
The integration tests in multi-host mode could verify that these new rules work as expected and cover all functions of BlueChi. However, at the moment we'd need to merge this PR so we can use the rpms from COPR for it (see #884).
Updated the readthedocs page in order to show how to add new allow rules for restricted units like httpd.service: