mirror of https://github.com/ansible/ansible.git
Add a custom policy for hackers using ansible-test (#68535)
Signed-off-by: Rick Elrod <rick@elrod.me>pull/68539/head
parent
7777189954
commit
bd9e31fcb0
@ -0,0 +1,22 @@
|
|||||||
|
# ansible-podman selinux module
|
||||||
|
|
||||||
|
On Fedora-derived systems (and possibly others), selinux can prevent podman
|
||||||
|
from running the way we need it to for our tests to work.
|
||||||
|
|
||||||
|
Loading this module (hopefully) allows you to
|
||||||
|
[keep selinux enabled](https://stopdisablingselinux.com/) and still be able to
|
||||||
|
run our tests.
|
||||||
|
|
||||||
|
To use it, just run:
|
||||||
|
|
||||||
|
```
|
||||||
|
./build.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
...which will build the module. Then run:
|
||||||
|
|
||||||
|
```
|
||||||
|
sudo semodule -i ansible-podman.pp
|
||||||
|
```
|
||||||
|
|
||||||
|
to insert and enable the module.
|
||||||
@ -0,0 +1,17 @@
|
|||||||
|
module ansible-podman 1.0;
|
||||||
|
|
||||||
|
require {
|
||||||
|
type container_t;
|
||||||
|
type cgroup_t;
|
||||||
|
type fusefs_t;
|
||||||
|
class dir { add_name create remove_name rmdir write };
|
||||||
|
class file { create relabelto write };
|
||||||
|
class bpf map_create;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
allow container_t cgroup_t:dir { add_name create remove_name rmdir write };
|
||||||
|
|
||||||
|
allow container_t cgroup_t:file { create write };
|
||||||
|
allow container_t fusefs_t:file relabelto;
|
||||||
|
allow container_t self:bpf map_create;
|
||||||
@ -0,0 +1,9 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
set -x
|
||||||
|
set -e
|
||||||
|
checkmodule -Mmo ansible-podman.mod ansible-podman.te
|
||||||
|
semodule_package -o ansible-podman.pp -m ansible-podman.mod
|
||||||
|
|
||||||
|
set +x
|
||||||
|
echo "Module built. Now run this as root:"
|
||||||
|
echo "semodule -i $(pwd)/ansible-podman.pp"
|
||||||
Loading…
Reference in New Issue