Tighten the security on the podman varlink socket

We only want root to be allowed to access this socket.
Also move socket to /run/podman directory.  This requires
us to drop a podman.conf tmpfiles.d file.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>

Closes: #806
Approved by: mheon
This commit is contained in:
Daniel J Walsh
2018-05-18 16:28:51 -04:00
committed by Atomic Bot
parent 4b804e8516
commit 9d7c50aa03
6 changed files with 20 additions and 5 deletions

View File

@ -31,8 +31,16 @@ More will go here as the docs and api firm up.
as well.
-->
## CONFIGURATION
Users of the podman varlink service should enable the io.projectatomic.podman.socket and io.projectatomic.podman.service.
You can do this via systemctl
systemctl enable --now io.projectatomic.podman.socket
## SEE ALSO
podman(1)
podman(1), systemctl(1)
## HISTORY
April 2018, Originally compiled by Brent Baude<bbaude@redhat.com>