diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te index 0e29369e8..0b798993c 100644 --- a/policy/modules/services/container.te +++ b/policy/modules/services/container.te @@ -1145,6 +1145,7 @@ optional_policy(` kubernetes_manage_runtime_dirs(spc_t) kubernetes_mounton_runtime_dirs(spc_t) kubernetes_manage_runtime_files(spc_t) + kubernetes_map_runtime_files(spc_t) kubernetes_watch_runtime_files(spc_t) kubernetes_manage_runtime_symlinks(spc_t) kubernetes_manage_runtime_sock_files(spc_t) diff --git a/policy/modules/services/kubernetes.if b/policy/modules/services/kubernetes.if index ea6ecd1d5..de14a7b61 100644 --- a/policy/modules/services/kubernetes.if +++ b/policy/modules/services/kubernetes.if @@ -641,6 +641,24 @@ interface(`kubernetes_manage_runtime_files',` allow $1 kubernetes_runtime_t:file manage_file_perms; ') +######################################## +## +## Memory map kubernetes runtime files. +## +## +## +## Domain allowed access. +## +## +# +interface(`kubernetes_map_runtime_files',` + gen_require(` + type kubernetes_runtime_t; + ') + + allow $1 kubernetes_runtime_t:file map; +') + ######################################## ## ## Watch kubernetes runtime files.