mirror of
https://github.com/containers/podman.git
synced 2025-05-31 15:42:48 +08:00
Tighten the security on the podman varlink socket
We only want root to be allowed to access this socket. Also move socket to /run/podman directory. This requires us to drop a podman.conf tmpfiles.d file. Signed-off-by: Daniel J Walsh <dwalsh@redhat.com> Closes: #806 Approved by: mheon
This commit is contained in:

committed by
Atomic Bot

parent
4b804e8516
commit
9d7c50aa03
@ -31,8 +31,16 @@ More will go here as the docs and api firm up.
|
||||
as well.
|
||||
-->
|
||||
|
||||
## CONFIGURATION
|
||||
|
||||
Users of the podman varlink service should enable the io.projectatomic.podman.socket and io.projectatomic.podman.service.
|
||||
|
||||
You can do this via systemctl
|
||||
|
||||
systemctl enable --now io.projectatomic.podman.socket
|
||||
|
||||
## SEE ALSO
|
||||
podman(1)
|
||||
podman(1), systemctl(1)
|
||||
|
||||
## HISTORY
|
||||
April 2018, Originally compiled by Brent Baude<bbaude@redhat.com>
|
||||
|
Reference in New Issue
Block a user