1openshift_app_selinux(8) SELinux Policy openshift_app openshift_app_selinux(8)
2
3
4

NAME

6       openshift_app_selinux  -  Security  Enhanced Linux Policy for the open‐
7       shift_app processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the openshift_app processes via  flexi‐
11       ble mandatory access control.
12
13       The  openshift_app  processes  execute with the openshift_app_t SELinux
14       type. You can check if you have these processes  running  by  executing
15       the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep openshift_app_t
20
21
22

ENTRYPOINTS

24       The  openshift_app_t  SELinux type can be entered via the shell_exec_t,
25       bin_t,   openshift_file_type,    usr_t,    gpg_exec_t,    httpd_exec_t,
26       user_cron_spool_t file types.
27
28       The  default  entrypoint  paths  for the openshift_app_t domain are the
29       following:
30
31       All executeables with the default executable label, usually  stored  in
32       /usr/bin    and   /usr/sbin.    /bin/d?ash,   /bin/zsh.*,   /bin/ksh.*,
33       /usr/bin/d?ash, /usr/bin/ksh.*,  /usr/bin/zsh.*,  /bin/esh,  /bin/mksh,
34       /bin/sash,  /bin/tcsh,  /bin/yash,  /bin/bash,  /bin/fish,  /bin/bash2,
35       /usr/bin/esh,     /usr/bin/sash,     /usr/bin/tcsh,      /usr/bin/yash,
36       /usr/bin/mksh,     /usr/bin/fish,     /usr/bin/bash,     /sbin/nologin,
37       /usr/sbin/sesh,  /usr/bin/bash2,   /usr/sbin/smrsh,   /usr/bin/scponly,
38       /usr/sbin/nologin, /usr/libexec/sesh, /usr/sbin/scponlyc, /usr/bin/git-
39       shell,         /usr/libexec/sudo/sesh,         /usr/bin/cockpit-bridge,
40       /usr/libexec/cockpit-agent,  /usr/libexec/git-core/git-shell,  /usr/.*,
41       /opt/.*,        /emul/.*,         /ostree(/.*)?,         /export(/.*)?,
42       /usr/doc(/.*)?/lib(/.*)?,                           /usr/inclu.e(/.*)?,
43       /usr/share/doc(/.*)?/README.*,  /usr,  /opt,  /emul,  /usr/bin/gpg(2)?,
44       /usr/lib/gnupg/.*,      /usr/bin/gpgsm,      /usr/sbin/httpd(.worker)?,
45       /usr/sbin/apache(2)?, /usr/lib/apache-ssl/.+, /usr/sbin/apache-ssl(2)?,
46       /usr/share/jetty/bin/jetty.sh,    /usr/sbin/nginx,    /usr/sbin/thttpd,
47       /usr/sbin/php-fpm,       /usr/sbin/cherokee,        /usr/sbin/lighttpd,
48       /usr/sbin/httpd.event,  /usr/bin/mongrel_rails, /usr/sbin/htcacheclean,
49       /var/spool/at(/.*)?, /var/spool/cron
50

PROCESS TYPES

52       SELinux defines process types (domains) for each process running on the
53       system
54
55       You can see the context of a process using the -Z option to ps
56
57       Policy  governs  the  access confined processes have to files.  SELinux
58       openshift_app policy is very flexible allowing  users  to  setup  their
59       openshift_app processes in as secure a method as possible.
60
61       The following process types are defined for openshift_app:
62
63       openshift_app_t
64
65       Note:  semanage  permissive  -a openshift_app_t can be used to make the
66       process type openshift_app_t permissive. SELinux does not  deny  access
67       to permissive process types, but the AVC (SELinux denials) messages are
68       still generated.
69
70

MCS Constrained

72       The SELinux process type openshift_app_t  is  an  MCS  (Multi  Category
73       Security)  constrained  type.  Sometimes this separation is referred to
74       as sVirt. These types are usually used for securing multi-tenant  envi‐
75       ronments,  such  as  virtualization, containers or separation of users.
76       The tools used to launch MCS types, pick out a different MCS label  for
77       each process group.
78
79       For    example    one    process   might   be   launched   with   open‐
80       shift_app_t:s0:c1,c2,  and  another   process   launched   with   open‐
81       shift_app_t:s0:c3,c4.  The  SELinux  kernel only allows these processes
82       can only write to content with a matching MCS label, or a MCS Label  of
83       s0.  A process running with the MCS level of s0:c1,c2 is not allowed to
84       write to content with the MCS label of s0:c3,c4
85
86

BOOLEANS

88       SELinux policy is customizable based on least access  required.   open‐
89       shift_app  policy  is  extremely flexible and has several booleans that
90       allow you to manipulate the  policy  and  run  openshift_app  with  the
91       tightest access possible.
92
93
94
95       If you want to allow users to resolve user passwd entries directly from
96       ldap rather then using a sssd server, you  must  turn  on  the  authlo‐
97       gin_nsswitch_use_ldap boolean. Disabled by default.
98
99       setsebool -P authlogin_nsswitch_use_ldap 1
100
101
102
103       If  you  want  to  determine whether crond can execute jobs in the user
104       domain as opposed to the the generic cronjob domain, you must  turn  on
105       the cron_userdomain_transition boolean. Enabled by default.
106
107       setsebool -P cron_userdomain_transition 1
108
109
110
111       If  you  want  to deny any process from ptracing or debugging any other
112       processes, you  must  turn  on  the  deny_ptrace  boolean.  Enabled  by
113       default.
114
115       setsebool -P deny_ptrace 1
116
117
118
119       If  you  want  to  allow  any  process  to mmap any file on system with
120       attribute file_type, you must turn on the  domain_can_mmap_files  bool‐
121       ean. Enabled by default.
122
123       setsebool -P domain_can_mmap_files 1
124
125
126
127       If  you want to allow all domains write to kmsg_device, while kernel is
128       executed with systemd.log_target=kmsg parameter, you must turn  on  the
129       domain_can_write_kmsg boolean. Disabled by default.
130
131       setsebool -P domain_can_write_kmsg 1
132
133
134
135       If you want to allow all domains to use other domains file descriptors,
136       you must turn on the domain_fd_use boolean. Enabled by default.
137
138       setsebool -P domain_fd_use 1
139
140
141
142       If you want to allow all domains to have the kernel load  modules,  you
143       must  turn  on  the  domain_kernel_load_modules  boolean.  Disabled  by
144       default.
145
146       setsebool -P domain_kernel_load_modules 1
147
148
149
150       If you want to allow all domains to execute in fips_mode, you must turn
151       on the fips_mode boolean. Enabled by default.
152
153       setsebool -P fips_mode 1
154
155
156
157       If you want to enable reading of urandom for all domains, you must turn
158       on the global_ssp boolean. Disabled by default.
159
160       setsebool -P global_ssp 1
161
162
163
164       If you want to allow confined applications to run  with  kerberos,  you
165       must turn on the kerberos_enabled boolean. Enabled by default.
166
167       setsebool -P kerberos_enabled 1
168
169
170
171       If  you  want  to  allow  system  to run with NIS, you must turn on the
172       nis_enabled boolean. Disabled by default.
173
174       setsebool -P nis_enabled 1
175
176
177
178       If you want to allow confined applications to use nscd  shared  memory,
179       you must turn on the nscd_use_shm boolean. Disabled by default.
180
181       setsebool -P nscd_use_shm 1
182
183
184
185       If  you  want  to  allow  openshift  to access nfs file systems without
186       labels, you must turn on the  openshift_use_nfs  boolean.  Disabled  by
187       default.
188
189       setsebool -P openshift_use_nfs 1
190
191
192

MANAGED FILES

194       The  SELinux process type openshift_app_t can manage files labeled with
195       the following file types.  The paths listed are the default  paths  for
196       these  file  types.  Note the processes UID still need to have DAC per‐
197       missions.
198
199       anon_inodefs_t
200
201
202       hugetlbfs_t
203
204            /dev/hugepages
205            /usr/lib/udev/devices/hugepages
206
207       nfs_t
208
209
210       openshift_rw_file_t
211
212            /var/lib/openshift/.*/data(/.*)?
213            /var/lib/stickshift/.*/data(/.*)?
214
215       openshift_tmp_t
216
217            /var/lib/openshift/.*/.tmp(/.*)?
218            /var/lib/openshift/.*/.sandbox(/.*)?
219            /var/lib/stickshift/.*/.tmp(/.*)?
220            /var/lib/stickshift/.*/.sandbox(/.*)?
221
222       openshift_tmpfs_t
223
224
225       security_t
226
227            /selinux
228
229

COMMANDS

231       semanage fcontext can also be used to manipulate default  file  context
232       mappings.
233
234       semanage  permissive  can  also  be used to manipulate whether or not a
235       process type is permissive.
236
237       semanage module can also be used to enable/disable/install/remove  pol‐
238       icy modules.
239
240       semanage boolean can also be used to manipulate the booleans
241
242
243       system-config-selinux is a GUI tool available to customize SELinux pol‐
244       icy settings.
245
246

AUTHOR

248       This manual page was auto-generated using sepolicy manpage .
249
250

SEE ALSO

252       selinux(8),  openshift_app(8),  semanage(8),  restorecon(8),  chcon(1),
253       sepolicy(8) , setsebool(8)
254
255
256
257openshift_app                      19-04-25           openshift_app_selinux(8)
Impressum