You could add a policy module with transition rule that states
=================================
policy_module(mydocker,1.0)
gen_require(`
type unconfined_t;
role unconfined_r, system_r;
type docker_exec_t;
')
docker_domtrans(unconfined_t)
role_transition unconfined_r docker_exec_t system_r;
=================================
This will get you running docker as
unconfined_u:system_r:docker_t:s0-s0:c0.c1023
Which should get you most of the way there.
On 08/20/2016 10:43 AM, Kashif ali
wrote:
i want to change it because of docker_t label of
docker daemon when root user run in the following context
"unconfined_u:unconfined_r:unconfined_t:", when i run
docker daemon on network with the following command
=> docker daemon -H localhost:2376 --selinux-enabled &
then docker daemon have unconfined_t label on it and as it is
described unconfined domain have access to all process in the
system and i have read unconfined_t have no domain transition
in selinux so
* but when i run root user in the following context
"system_u:system_r:initrc_t:", and when i run docker daemon in
this context then docker daemon have docker_t label on it
so is there anyway to solve this problem or anyway that should
assign correct docker_t label on docker daemon
_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.
|
_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.