policy_module(openshift,1.0.0) gen_require(` role system_r; ') ## ##

## Allow openshift to access nfs file systems without labels ##

##
gen_tunable(openshift_use_nfs, false) ######################################## # # Declarations # # openshift applications that can use the network. attribute openshift_net_domain; # Attribute representing all openshift user processes (excludes apache processes) attribute openshift_user_domain; # Attribute representing all openshift processes attribute openshift_domain; # Attribute for all openshift content attribute openshift_file_type; # Type of openshift init script type openshift_initrc_t; type openshift_initrc_exec_t; init_daemon_domain(openshift_initrc_t, openshift_initrc_exec_t) init_ranged_daemon_domain(openshift_initrc_t, openshift_initrc_exec_t, s0 - mcs_systemhigh) domain_obj_id_change_exemption(openshift_initrc_t) optional_policy(` oddjob_ranged_domain(openshift_initrc_t, openshift_initrc_exec_t, s0 - mcs_systemhigh) ') type openshift_initrc_tmp_t; files_tmp_file(openshift_initrc_tmp_t) type openshift_tmpfs_t; files_tmpfs_file(openshift_tmpfs_t) type openshift_tmp_t, openshift_file_type; files_tmp_file(openshift_tmp_t) files_mountpoint(openshift_tmp_t) files_poly(openshift_tmp_t) files_poly_parent(openshift_tmp_t) type openshift_app_tmp_t, openshift_file_type; files_tmp_file(openshift_app_tmp_t) files_mountpoint(openshift_app_tmp_t) files_poly(openshift_app_tmp_t) files_poly_parent(openshift_app_tmp_t) type openshift_var_run_t; files_pid_file(openshift_var_run_t) type openshift_var_lib_t, openshift_file_type; userdom_user_home_content(openshift_var_lib_t) files_poly(openshift_var_lib_t) files_poly_parent(openshift_var_lib_t) files_mountpoint(openshift_var_lib_t) type openshift_rw_file_t, openshift_file_type; files_poly(openshift_rw_file_t) files_poly_parent(openshift_rw_file_t) type openshift_log_t; logging_log_file(openshift_log_t) type openshift_port_t; corenet_port(openshift_port_t) corenet_reserved_port(openshift_port_t) type openshift_cgroup_read_t; type openshift_cgroup_read_exec_t; application_domain(openshift_cgroup_read_t, openshift_cgroup_read_exec_t) type openshift_net_read_t; type openshift_net_read_exec_t; application_domain(openshift_net_read_t, openshift_net_read_exec_t) type openshift_cgroup_read_tmp_t, openshift_file_type; files_tmp_file(openshift_cgroup_read_tmp_t) type openshift_cron_t; type openshift_cron_exec_t; domain_type(openshift_cron_t) domain_entry_file(openshift_cron_t, openshift_cron_exec_t) role system_r types openshift_cron_t; optional_policy(` cron_system_entry(openshift_cron_t, openshift_cron_exec_t) ') type openshift_cron_tmp_t, openshift_file_type; files_tmp_file(openshift_cron_tmp_t) ######################################## # # Template to create openshift_t and openshift_app_t # openshift_service_domain_template(openshift) ######################################## # # openshift initrc local policy # unconfined_domain_noaudit(openshift_initrc_t) mcs_process_set_categories(openshift_initrc_t) virt_sandbox_domain(openshift_initrc_t) systemd_dbus_chat_logind(openshift_initrc_t) manage_dirs_pattern(openshift_initrc_t, openshift_initrc_tmp_t, openshift_initrc_tmp_t) manage_files_pattern(openshift_initrc_t, openshift_initrc_tmp_t, openshift_initrc_tmp_t) manage_lnk_files_pattern(openshift_initrc_t, openshift_initrc_tmp_t, openshift_initrc_tmp_t) files_tmp_filetrans(openshift_initrc_t, openshift_initrc_tmp_t, { file dir }) manage_dirs_pattern(openshift_initrc_t, openshift_var_run_t, openshift_var_run_t) manage_files_pattern(openshift_initrc_t, openshift_var_run_t, openshift_var_run_t) manage_lnk_files_pattern(openshift_initrc_t, openshift_var_run_t, openshift_var_run_t) files_pid_filetrans(openshift_initrc_t, openshift_var_run_t, { file dir }) manage_dirs_pattern(openshift_initrc_t, openshift_log_t, openshift_log_t) manage_files_pattern(openshift_initrc_t, openshift_log_t, openshift_log_t) logging_log_filetrans(openshift_initrc_t, openshift_log_t, { file dir }) allow openshift_initrc_t openshift_domain:process { getattr getsched setsched transition signal signull sigkill }; allow openshift_domain openshift_initrc_t:fd use; allow openshift_domain openshift_initrc_t:fifo_file rw_inherited_fifo_file_perms; allow openshift_domain openshift_initrc_t:process sigchld; dontaudit openshift_domain openshift_initrc_t:key view; dontaudit openshift_domain openshift_initrc_t:process signull; dontaudit openshift_domain openshift_initrc_t:socket_class_set { read write }; init_domtrans_script(openshift_initrc_t) init_initrc_domain(openshift_initrc_t) optional_policy(` firewalld_dbus_chat(openshift_initrc_t) ') ####################################################### # # Policy for all openshift domains # allow openshift_domain self:process ~ptrace; tunable_policy(`deny_ptrace',`',` allow openshift_domain self:process ptrace; ') allow openshift_domain self:msg all_msg_perms; allow openshift_domain self:msgq create_msgq_perms; allow openshift_domain self:shm create_shm_perms; allow openshift_domain self:sem create_sem_perms; dontaudit openshift_domain self:dir write; dontaudit openshift_domain self:rawip_socket create_socket_perms; dontaudit openshift_t self:unix_stream_socket recvfrom; dontaudit openshift_domain self:netlink_tcpdiag_socket create; dontaudit openshift_domain self:netlink_route_socket nlmsg_write; allow openshift_domain self:tcp_socket create_stream_socket_perms; allow openshift_domain self:fifo_file manage_fifo_file_perms; allow openshift_domain self:unix_stream_socket { create_stream_socket_perms connectto }; allow openshift_domain self:unix_dgram_socket { create_socket_perms sendto }; dontaudit openshift_domain self:netlink_audit_socket { create_socket_perms nlmsg_relay }; manage_dirs_pattern(openshift_domain, openshift_rw_file_t, openshift_rw_file_t) manage_files_pattern(openshift_domain, openshift_rw_file_t, openshift_rw_file_t) manage_fifo_files_pattern(openshift_domain, openshift_rw_file_t, openshift_rw_file_t) manage_sock_files_pattern(openshift_domain, openshift_rw_file_t, openshift_rw_file_t) manage_lnk_files_pattern(openshift_domain, openshift_rw_file_t, openshift_rw_file_t) allow openshift_domain openshift_rw_file_t:dir_file_class_set { relabelfrom relabelto }; list_dirs_pattern(openshift_domain, openshift_file_type, openshift_file_type) read_files_pattern(openshift_domain, openshift_file_type, openshift_file_type) rw_fifo_files_pattern(openshift_domain, openshift_file_type, openshift_file_type) rw_sock_files_pattern(openshift_domain, openshift_file_type, openshift_file_type) read_lnk_files_pattern(openshift_domain, openshift_file_type, openshift_file_type) allow openshift_domain openshift_file_type:file execmod; can_exec(openshift_domain, openshift_file_type) allow openshift_domain openshift_file_type:file entrypoint; # Allow users to execute files in their home dir allow openshift_domain openshift_file_type:file { execute execute_no_trans }; # Dontaudit openshift domains trying to search other openshift domains directories, # this happens just when users are probing the system dontaudit openshift_domain openshift_file_type:dir search_dir_perms ; manage_dirs_pattern(openshift_domain, openshift_tmpfs_t, openshift_tmpfs_t) manage_files_pattern(openshift_domain, openshift_tmpfs_t, openshift_tmpfs_t) manage_lnk_files_pattern(openshift_domain, openshift_tmpfs_t, openshift_tmpfs_t) manage_sock_files_pattern(openshift_domain, openshift_tmpfs_t, openshift_tmpfs_t) manage_fifo_files_pattern(openshift_domain, openshift_tmpfs_t, openshift_tmpfs_t) fs_tmpfs_filetrans(openshift_domain, openshift_tmpfs_t, { dir file sock_file lnk_file fifo_file }) can_exec(openshift_domain, openshift_tmpfs_t) manage_dirs_pattern(openshift_domain, openshift_tmp_t, openshift_tmp_t) manage_fifo_files_pattern(openshift_domain, openshift_tmp_t, openshift_tmp_t) manage_files_pattern(openshift_domain, openshift_tmp_t, openshift_tmp_t) manage_lnk_files_pattern(openshift_domain, openshift_tmp_t, openshift_tmp_t) manage_sock_files_pattern(openshift_domain, openshift_tmp_t, openshift_tmp_t) files_tmp_filetrans(openshift_domain, openshift_tmp_t, { lnk_file file dir sock_file fifo_file }) allow openshift_domain openshift_tmp_t:dir_file_class_set { relabelfrom relabelto }; allow openshift_domain openshift_log_t:file { getattr append lock ioctl }; #lsof allow openshift_domain openshift_initrc_t:tcp_socket getattr; dontaudit openshift_domain openshift_initrc_tmp_t:file append; dontaudit openshift_domain openshift_var_run_t:file append; dontaudit openshift_domain openshift_file_type:sock_file execute; kernel_dontaudit_search_network_state(openshift_domain) kernel_dontaudit_list_all_proc(openshift_domain) kernel_dontaudit_list_all_sysctls(openshift_domain) kernel_dontaudit_request_load_module(openshift_domain) kernel_get_sysvipc_info(openshift_domain) corecmd_shell_entry_type(openshift_domain) corecmd_bin_entry_type(openshift_domain) corecmd_exec_all_executables(openshift_domain) dev_read_sysfs(openshift_domain) dev_read_rand(openshift_domain) dev_read_urand(openshift_domain) dev_dontaudit_append_rand(openshift_domain) dev_dontaudit_write_urand(openshift_domain) dev_dontaudit_getattr_all_blk_files(openshift_domain) dev_dontaudit_getattr_all_chr_files(openshift_domain) dev_dontaudit_all_access_check(openshift_domain) domain_use_interactive_fds(openshift_domain) domain_dontaudit_read_all_domains_state(openshift_domain) files_read_var_lib_symlinks(openshift_domain) fs_rw_hugetlbfs_files(openshift_domain) fs_search_tmpfs(openshift_domain) fs_getattr_all_fs(openshift_domain) fs_dontaudit_getattr_all_fs(openshift_domain) fs_dontaudit_list_auto_mountpoints(openshift_domain) fs_dontaudit_list_tmpfs(openshift_domain) storage_dontaudit_getattr_fixed_disk_dev(openshift_domain) storage_getattr_fixed_disk_dev(openshift_domain) fs_get_xattr_fs_quotas(openshift_domain) fs_rw_inherited_tmpfs_files(openshift_domain) dontaudit openshift_domain file_type:dir read; files_dontaudit_list_home(openshift_domain) files_dontaudit_search_all_pids(openshift_domain) files_dontaudit_getattr_all_dirs(openshift_domain) files_dontaudit_getattr_all_files(openshift_domain) files_dontaudit_list_mnt(openshift_domain) files_dontaudit_list_var(openshift_domain) files_dontaudit_getattr_lost_found_dirs(openshift_domain) files_dontaudit_search_all_mountpoints(openshift_domain) files_dontaudit_search_spool(openshift_domain) files_dontaudit_search_all_dirs(openshift_domain) files_exec_etc_files(openshift_domain) files_exec_usr_files(openshift_domain) files_dontaudit_getattr_non_security_sockets(openshift_domain) files_dontaudit_setattr_non_security_dirs(openshift_domain) files_dontaudit_setattr_non_security_files(openshift_domain) files_dontaudit_rw_inherited_locks(openshift_domain) libs_exec_lib_files(openshift_domain) libs_exec_ld_so(openshift_domain) selinux_validate_context(openshift_domain) logging_inherit_append_all_logs(openshift_domain) init_dontaudit_read_utmp(openshift_domain) miscfiles_read_fonts(openshift_domain) miscfiles_dontaudit_setattr_fonts_cache_dirs(openshift_domain) mta_dontaudit_read_spool_symlinks(openshift_domain) term_dontaudit_search_ptys(openshift_domain) term_use_generic_ptys(openshift_domain) term_dontaudit_getattr_generic_ptys(openshift_domain) term_use_ptmx(openshift_domain) userdom_use_inherited_user_ptys(openshift_domain) userdom_dontaudit_search_admin_dir(openshift_domain) application_exec(openshift_domain) optional_policy(` apache_exec_modules(openshift_domain) apache_list_modules(openshift_domain) apache_read_config(openshift_domain) apache_search_config(openshift_domain) apache_read_sys_content(openshift_domain) apache_exec_sys_script(openshift_domain) apache_entrypoint(openshift_domain) apache_dontaudit_read_log(openshift_domain) ') optional_policy(` ############################################# # # openshift cgi script policy # apache_content_template(openshift) apache_content_alias_template(openshift, openshift) domtrans_pattern(openshift_script_t, openshift_initrc_exec_t, openshift_initrc_t) optional_policy(` dbus_system_bus_client(openshift_script_t) optional_policy(` oddjob_dbus_chat(openshift_script_t) oddjob_dontaudit_rw_fifo_file(openshift_domain) ') ') ') optional_policy(` gpg_entry_type(openshift_domain) ') optional_policy(` mysql_search_db(openshift_domain) ') optional_policy(` screen_exec(openshift_domain) ') optional_policy(` ssh_use_ptys(openshift_domain) ssh_getattr_user_home_dir(openshift_domain) ssh_dontaudit_search_user_home_dir(openshift_domain) ') optional_policy(` udev_read_pid_files(openshift_domain) ') ####################################################### # # Policy for openshift user domain process # manage_dirs_pattern(openshift_user_domain, openshift_file_type, openshift_file_type) manage_files_pattern(openshift_user_domain, openshift_file_type, openshift_file_type) manage_fifo_files_pattern(openshift_user_domain, openshift_file_type, openshift_file_type) manage_sock_files_pattern(openshift_user_domain, openshift_file_type, openshift_file_type) manage_lnk_files_pattern(openshift_user_domain, openshift_file_type, openshift_file_type) allow openshift_user_domain openshift_file_type:dir_file_class_set { relabelfrom relabelto }; allow openshift_user_domain openshift_domain:process transition; allow openshift_domain openshift_user_domain:fd use; allow openshift_domain openshift_user_domain:fifo_file rw_inherited_fifo_file_perms; allow openshift_domain openshift_user_domain:process sigchld; dontaudit openshift_domain openshift_user_domain:key view; dontaudit openshift_domain openshift_user_domain:process signull; dontaudit openshift_domain openshift_user_domain:socket_class_set { read write }; tunable_policy(`deny_ptrace',`',` allow openshift_user_domain openshift_domain:process ptrace; ') mta_signal_user_agent(openshift_user_domain) optional_policy(` ssh_rw_tcp_sockets(openshift_user_domain) ') ############################################################################ # # Rules specific to openshift_net_domains # allow openshift_net_domain openshift_port_t:tcp_socket { name_connect name_bind }; allow openshift_net_domain openshift_port_t:udp_socket name_bind; corenet_tcp_connect_mssql_port(openshift_net_domain) corenet_tcp_connect_mysqld_port(openshift_net_domain) corenet_tcp_connect_postgresql_port(openshift_net_domain) corenet_tcp_connect_git_port(openshift_net_domain) corenet_tcp_connect_oracle_port(openshift_net_domain) corenet_tcp_connect_flash_port(openshift_net_domain) corenet_tcp_connect_http_port(openshift_net_domain) corenet_tcp_connect_ftp_port(openshift_net_domain) #/* These ports are the ephemeral ports needed for ftp */ corenet_tcp_connect_virt_migration_port(openshift_net_domain) corenet_tcp_connect_ssh_port(openshift_net_domain) corenet_tcp_connect_jacorb_port(openshift_net_domain) corenet_tcp_connect_jboss_management_port(openshift_net_domain) corenet_tcp_connect_jboss_debug_port(openshift_net_domain) corenet_tcp_connect_jboss_messaging_port(openshift_net_domain) corenet_tcp_connect_memcache_port(openshift_net_domain) corenet_tcp_connect_http_cache_port(openshift_net_domain) corenet_tcp_connect_amqp_port(openshift_net_domain) corenet_tcp_connect_generic_port(openshift_net_domain) corenet_tcp_connect_mongod_port(openshift_net_domain) corenet_tcp_connect_munin_port(openshift_net_domain) corenet_tcp_connect_pop_port(openshift_net_domain) corenet_tcp_connect_pulseaudio_port(openshift_net_domain) corenet_tcp_connect_smtp_port(openshift_net_domain) corenet_tcp_connect_whois_port(openshift_net_domain) corenet_udp_bind_generic_port(openshift_net_domain) corenet_tcp_bind_http_cache_port(openshift_domain) corenet_tcp_bind_jacorb_port(openshift_net_domain) corenet_tcp_bind_jboss_management_port(openshift_net_domain) corenet_tcp_bind_jboss_messaging_port(openshift_net_domain) corenet_tcp_bind_jboss_debug_port(openshift_net_domain) corenet_tcp_bind_mongod_port(openshift_net_domain) corenet_tcp_bind_mysqld_port(openshift_domain) corenet_tcp_bind_pulseaudio_port(openshift_net_domain) corenet_tcp_bind_postgresql_port(openshift_net_domain) ############################################################################ # # Rules specific to openshift and openshift_app_t # kernel_read_vm_sysctls(openshift_t) kernel_read_vm_sysctls(openshift_app_t) kernel_search_vm_sysctl(openshift_t) kernel_search_vm_sysctl(openshift_app_t) netutils_domtrans_ping(openshift_t) netutils_kill_ping(openshift_t) netutils_signal_ping(openshift_t) openshift_net_type(openshift_app_t) openshift_net_type(openshift_t) optional_policy(` cron_role(system_r, openshift) cron_role(system_r, openshift_app) ') optional_policy(` postfix_rw_public_pipes(openshift_t) postfix_manage_spool_maildrop_files(openshift_t) ') ######################################## # # openshift_cgroup_read local policy # allow openshift_cgroup_read_t self:process { getattr signal_perms }; allow openshift_cgroup_read_t self:fifo_file rw_fifo_file_perms; allow openshift_cgroup_read_t self:unix_stream_socket create_stream_socket_perms; allow openshift_cgroup_read_t openshift_initrc_t:fifo_file rw_inherited_fifo_file_perms; allow openshift_cgroup_read_t openshift_file_type:file rw_inherited_file_perms; manage_dirs_pattern(openshift_cgroup_read_t, openshift_cgroup_read_tmp_t, openshift_cgroup_read_tmp_t) manage_files_pattern(openshift_cgroup_read_t, openshift_cgroup_read_tmp_t, openshift_cgroup_read_tmp_t) files_tmp_filetrans(openshift_cgroup_read_t, openshift_cgroup_read_tmp_t, { file dir }) kernel_read_system_state(openshift_cgroup_read_t) term_dontaudit_use_generic_ptys(openshift_cgroup_read_t) auth_read_passwd(openshift_cgroup_read_t) miscfiles_read_localization(openshift_cgroup_read_t) optional_policy(` ssh_use_ptys(openshift_cgroup_read_t) ') corecmd_exec_bin(openshift_cgroup_read_t) corecmd_exec_shell(openshift_cgroup_read_t) dev_read_urand(openshift_cgroup_read_t) domain_use_interactive_fds(openshift_cgroup_read_t) userdom_use_inherited_user_ptys(openshift_cgroup_read_t) miscfiles_read_generic_certs(openshift_cgroup_read_t) domtrans_pattern(openshift_domain, openshift_cgroup_read_exec_t, openshift_cgroup_read_t) role system_r types openshift_cgroup_read_t; allow openshift_domain openshift_cgroup_read_t:process { getattr signal signull sigkill }; fs_list_cgroup_dirs(openshift_cgroup_read_t) fs_read_cgroup_files(openshift_cgroup_read_t) allow openshift_cgroup_read_t openshift_var_lib_t:dir list_dir_perms; manage_files_pattern(openshift_cgroup_read_t, openshift_var_lib_t, openshift_var_lib_t) allow openshift_cgroup_read_t openshift_file_type:file rw_inherited_file_perms; ######################################## # # openshift_net_read local policy # allow openshift_net_read_t self:process { getattr signal_perms }; allow openshift_net_read_t self:fifo_file rw_fifo_file_perms; allow openshift_net_read_t self:unix_stream_socket create_stream_socket_perms; allow openshift_net_read_t openshift_initrc_t:fifo_file rw_inherited_fifo_file_perms; allow openshift_net_read_t openshift_file_type:file rw_inherited_file_perms; kernel_read_network_state(openshift_net_read_t) kernel_read_system_state(openshift_net_read_t) corecmd_exec_bin(openshift_net_read_t) corecmd_exec_shell(openshift_net_read_t) dev_read_urand(openshift_net_read_t) domain_use_interactive_fds(openshift_net_read_t) term_dontaudit_use_generic_ptys(openshift_net_read_t) auth_read_passwd(openshift_net_read_t) userdom_use_inherited_user_ptys(openshift_net_read_t) miscfiles_read_generic_certs(openshift_net_read_t) miscfiles_read_localization(openshift_net_read_t) optional_policy(` ssh_use_ptys(openshift_net_read_t) ') domtrans_pattern(openshift_domain, openshift_net_read_exec_t, openshift_net_read_t) role system_r types openshift_net_read_t; allow openshift_domain openshift_net_read_t:process { getattr signal signull sigkill }; allow openshift_net_read_t openshift_var_lib_t:dir list_dir_perms; manage_files_pattern(openshift_net_read_t, openshift_var_lib_t, openshift_var_lib_t) allow openshift_net_read_t openshift_file_type:file rw_inherited_file_perms; ######################################## # # openshift_cron local policy # allow openshift_cron_t self:capability { dac_read_search net_admin sys_admin }; allow openshift_cron_t self:process signal_perms; allow openshift_cron_t self:tcp_socket create_stream_socket_perms; allow openshift_cron_t self:udp_socket create_socket_perms; allow openshift_cron_t self:unix_dgram_socket create_socket_perms; allow openshift_cron_t self:netlink_route_socket rw_netlink_socket_perms; append_files_pattern(openshift_cron_t, openshift_log_t, openshift_log_t) manage_dirs_pattern(openshift_cron_t, openshift_cron_tmp_t, openshift_cron_tmp_t) manage_fifo_files_pattern(openshift_cron_t, openshift_cron_tmp_t, openshift_cron_tmp_t) manage_files_pattern(openshift_cron_t, openshift_cron_tmp_t, openshift_cron_tmp_t) manage_lnk_files_pattern(openshift_cron_t, openshift_cron_tmp_t, openshift_cron_tmp_t) manage_sock_files_pattern(openshift_cron_t, openshift_cron_tmp_t, openshift_cron_tmp_t) files_tmp_filetrans(openshift_cron_t, openshift_cron_tmp_t, { lnk_file file dir sock_file fifo_file }) openshift_manage_lib_dirs(openshift_cron_t) openshift_manage_lib_files(openshift_cron_t) kernel_search_network_sysctl(openshift_cron_t) kernel_read_network_state(openshift_cron_t) kernel_read_system_state(openshift_cron_t) files_dontaudit_search_all_mountpoints(openshift_cron_t) corecmd_exec_bin(openshift_cron_t) corecmd_exec_shell(openshift_cron_t) dev_read_raw_memory(openshift_cron_t) dev_read_urand(openshift_cron_t) corenet_udp_bind_generic_node(openshift_cron_t) corenet_udp_bind_generic_port(openshift_cron_t) dev_getattr_fs(openshift_cron_t) dev_list_sysfs(openshift_cron_t) dev_read_sysfs(openshift_cron_t) files_getattr_home_dir(openshift_cron_t) files_manage_etc_files(openshift_cron_t) fs_getattr_tmpfs_dirs(openshift_cron_t) fs_getattr_all_fs(openshift_cron_t) fs_list_hugetlbfs(openshift_cron_t) fs_search_cgroup_dirs(openshift_cron_t) seutil_domtrans_setfiles(openshift_cron_t) term_getattr_pty_fs(openshift_cron_t) term_search_ptys(openshift_cron_t) auth_use_nsswitch(openshift_cron_t) miscfiles_read_generic_certs(openshift_cron_t) miscfiles_read_hwdata(openshift_cron_t) sysnet_exec_ifconfig(openshift_cron_t) sysnet_read_config(openshift_cron_t) optional_policy(` dmidecode_exec(openshift_cron_t) ') optional_policy(` hostname_exec(openshift_cron_t) ') optional_policy(` quota_read_db(openshift_cron_t) ') optional_policy(` ssh_domtrans_keygen(openshift_cron_t) ssh_dontaudit_read_server_keys(openshift_cron_t) ') tunable_policy(`openshift_use_nfs',` fs_list_auto_mountpoints(openshift_domain) fs_manage_nfs_dirs(openshift_domain) fs_manage_nfs_files(openshift_domain) fs_manage_nfs_symlinks(openshift_domain) fs_exec_nfs_files(openshift_domain) ')