14.2. Types
The main permission control method used in SELinux targeted policy to provide advanced process isolation is Type Enforcement. All files and processes are labeled with a type: types define a SELinux domain for processes and a SELinux type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with OpenShift. Different types allow you to configure flexible access:
Process types
openshift_t- The OpenShift process is associated with the
openshift_tSELinux type.
Types on executables
openshift_cgroup_read_exec_t- SELinux allows files with this type to transition an executable to the
openshift_cgroup_read_tdomain. openshift_cron_exec_t- SELinux allows files with this type to transition an executable to the
openshift_cron_tdomain. openshift_initrc_exec_t- SELinux allows files with this type to transition an executable to the
openshift_initrc_tdomain.
Writable types
openshift_cgroup_read_tmp_t- This type allows OpenShift control groups (cgroup) read and access temporary files in the
/tmp/directory. openshift_cron_tmp_t- This type allows storing temporary files of the OpenShift cron jobs in
/tmp/. openshift_initrc_tmp_t- This type allows storing the OpenShift
initrctemporary files in/tmp/. openshift_log_t- Files with this type are treated as OpenShift log data, usually stored under the
/var/log/directory. openshift_rw_file_t- OpenShift have permission to read and to write to files labeled with this type.
openshift_tmp_t- This type is used for storing the OpenShift temporary files in
/tmp/. openshift_tmpfs_t- This type allows storing the OpenShift data on a tmpfs file system.
openshift_var_lib_t- This type allows storing the OpenShift files in the
/var/lib/directory. openshift_var_run_t- This type allows storing the OpenShift files in the
/run/or/var/run/directory.