-
Notifications
You must be signed in to change notification settings - Fork 139
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal: add an attribute for application execute and transition permissions #365
Comments
I agree that something is needed to solve this issue, and I think the Fedora policy has this type of attribute for a long time, but I've resisted it for a long time. I think this is finally a reason to do it. |
Looking at Fedora's policy, they create a |
I am anticipating getting to this soon, but I already worry that this might end up in needing to change the signatures of the interfaces for things like |
This issue has not had any recent activity. It will be closed in 7 days if it makes no further progress. |
Was kinda hoping that linking this issue in the PR would not cause the bot to get upset, so here's an explicit activity bump. |
This issue has not had any recent activity. It will be closed in 7 days if it makes no further progress. |
Not stale, waiting review on #412 |
With the introduction of systemd user support, access needs to be added to
$1_systemd_t
for various applications if we want these to be run and transitioned properly. Other applications normally run by users such as window managers may also require such access. Instead of adding calls tomyapp_run()
for each of these applications, I think an attribute for this kind of access may be more suitable.Such an attribute,
staff_app_runner_domain
for example, would have all the necessary access granted by interface calls likechromium_run()
, and all that would be needed to ensure some domain has the same access to run applications would be to associate thestaff_app_runner_domain
to it, such asstaff_systemd_t
. That way, any application that can normally be run bystaff_t
can also be run bystaff_systemd_t
. Of course, explicitly allowing access tostaff_t
orstaff_systemd_t
can be used where appropriate.I feel that this also has the advantage of making local policy development significantly easier to do, as one would not need to call the appropriate interfaces for every application that
staff_t
can normally run to whatever local policy module is being written. On the contrary, as pointed out in earlier discussion, this may overcomplicate refpolicy somewhat.The text was updated successfully, but these errors were encountered: