1. 31 Jan, 2020 1 commit
    • container.conf: Add option to set keyring SELinux context · 4fef78bc
      Maximilian Blenk authored
      lxc set's up a new session keyring for every container by default.
      If executed on an SELinux enabled system, by default, the keyring
      inherits the label of the creating process. If executed with the
      currently available SELinux policy, this means that the keyring
      is labeled with the lxc_t type. Applications inside the container,
      however, might expect that the keyring is labeled with a certain
      context (and will fail to access the keyring if it's not explicitly
      allowed in the global policy). This patch introduces the config
      option lxc.selinux.context.keyring which enables to specify the
      label of the newly created keyring. That is, the keyring can be
      labeled with the label expected by the started application.
      Signed-off-by: 's avatarMaximilian Blenk <Maximilian.Blenk@bmw.de>
  2. 27 Jan, 2020 2 commits
  3. 17 Jan, 2020 1 commit
  4. 16 Jan, 2020 1 commit
  5. 15 Jan, 2020 2 commits
  6. 14 Jan, 2020 4 commits
  7. 10 Jan, 2020 2 commits
  8. 09 Jan, 2020 8 commits
  9. 08 Jan, 2020 1 commit
  10. 04 Jan, 2020 1 commit
  11. 03 Jan, 2020 1 commit
  12. 27 Dec, 2019 3 commits
  13. 26 Dec, 2019 2 commits
  14. 25 Dec, 2019 1 commit
  15. 23 Dec, 2019 5 commits
  16. 17 Dec, 2019 3 commits
  17. 16 Dec, 2019 1 commit
  18. 12 Dec, 2019 1 commit