Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: container-selinux | Distribution: SUSE Linux Framework One |
Version: 2.211.0 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: slfo.1.1.25 | Build date: Mon Apr 24 09:24:46 2023 |
Group: Unspecified | Build host: reproducible |
Size: 81780 | Source RPM: container-selinux-2.211.0-slfo.1.1.25.src.rpm |
Packager: https://www.suse.com/ | |
Url: https://github.com/containers/container-selinux | |
Summary: SELinux policies for container runtimes |
SELinux policy modules for use with container runtimes.
GPL-2.0-only
* Mon Apr 24 2023 jsegitz@suse.com - Update to version 2.211.0: * Don't transition to initrc_t domains from spc_t * Add tunable to allow sshd_t to launch container engines * Allow syslogd_t gettatr on inheritited runtime tmpfs files * Add container_file_t and container_ro_file_t as user_home_type * Set default context for local-path-provisioner * Allow daemon to send dbus messages to spc_t by * Wed Mar 29 2023 jsegitz@suse.com - Update to version 2.206.0: * Allow unconfined domains to transition to container_runtime_t * Allow container domains to transition to install_t * Allow avirt_sandbox_domain to manage container_file_t types * Allow containers to watch sysfs_t directories * Allow spc_t to transption to rpm_script_t * Add support to new user_namespace access check * Smaller permission changes for container_init_t - Drop spc.patch, is now included * Mon Jan 16 2023 fcrozat@suse.com - Update to version 2.198.0: * Fix spc_t transition rules on tmpfs_t - Changes from 2.197.0: * Add boolean containers_use_ecryptfs policy - Changes from 2.195.1: * Readd missing allow rules for container_t - Changes from 2.194.0: * Allow syslogd_t to use tmpfs files created by container runtime - Changes from 2.193.0: * Allow containers to mount tmpfs_t file systems * Label spc_t as a init initrc daemon * Allow userdomains to run containers - Changes from 2.191.0: * Create container_logwriter_t type - Changes from 2.190.1: * Support BuildKit * container.fc: Set label for kata-agent * support nerdctl - Changes from 2.190.0: * Packit: initial enablement * Allow iptables to list directories labeled as container_file_t - Changes from 2.189.0: * Dont audit searching other processes in /proc. * Thu Jan 12 2023 jsegitz@suse.com - Rename spc_timedated.patch to spc.patch - Update spc.patch to allow privileged containers to use localectl (bsc#1207077) * Wed Jan 11 2023 jsegitz@suse.com - Add spc_timedated.patch to allow privileged containers to use timedatectl (bsc#1207054) * Thu Jul 14 2022 jsegitz@suse.com - Update to version 2.188.0: * Allow confined containers to mount overlay filesystems Fixed bsc#1201348 * Wed Jun 22 2022 fcrozat@suse.com - Update to version 2.187.0: * Allow container domains to use /dev/zero - Changes from 2.186.0: * Create policy for a container_device_t * Allow containers to shutdown & setopt userdomain:sockets - Changes from 2.183.0: * Allow containers to inherit all socket classes from container runtimes. - Changes from 2.182.0: * Allow containers to inherit all socket classes - Changes from 2.181.0: * Allow socket activated domains for tcp sockets from init_t and userdomains. * Tue Mar 22 2022 jsegitz@suse.com - Add udica templates to the package * Fri Mar 18 2022 jsegitz@suse.com - Update to version 2.180.0 * Allow container domains to read/write kvm_device_t * Update kublet mappings to inlcude /usr/local/* * Allow container domains to use container runtime tcp and udp sockets * Alow containers to use unix_stream_sockets leaked from container runtimes * Allow userdomains to execute conmon_exec_t and use it as an entrypoint * Allow conmon_exec_t as an entrypoint * Add container_use_devices boolean to allow containers to use any device * Add explicit range transition for conmon * Add missing dbus class declaration into container_runtime_run() * Remove lockdown allow rules * Remove k3s fcontexts * Allow container domains to be used by user roles - Changed source url to allow for download via source service * Fri Nov 12 2021 rbrown@suse.com - Update to version 2.171.0 * Define kubernetes_file_t as a config_type * Allow containers to be socket activated by user domains and by systemd. * Allow iptables to use fifo files of a container runtime * Allow container_runtime create all tmpfs content as container_runtime_tmpfs_t * Allow containers to create lnk_file on tmpfs_t directories. * Mon Aug 09 2021 jsegitz@suse.com - Update to version 2.164.2 * Don't setup users for writing to pid_sockets * Allow container engines to be started from the staff user. * Allow spc_t domains to set bpf rules on any domain * Add support for k3s * Fri Apr 23 2021 jsegitz@suse.com - Fix container runtime binary labels (bsc#1185030). You need to relable at least /usr/sbin if you're affected * Tue Feb 23 2021 kukuk@suse.com - Update to version 2.158.0 - Add nfs remount support - Allow containers to execmod on nfs, samba and cephs remote shares - Allow confined users to send dbus messages to container_runtime * Mon Jan 11 2021 kukuk@suse.com - Update to version 2.154.0 - Allow confined user domains to run confined container domains. - Allow all containers to use nfs shares, iff virt_use_nfs boolean is enabled. - Allow containers to read nsfs file systems. - KVM Container need to use tunnel sockets created by runtime. * Tue Nov 03 2020 lnussel@suse.de - Don't use BuildRequires based on shell script output. OBS can't evaluate that. * Thu Oct 29 2020 kukuk@suse.com - Update to version 2.150.0 - Add additional allow rules for kvm based containers using virtiofsd. * Wed Oct 14 2020 kukuk@suse.com - Update to version 2.145.0 - Add support for kubernetes_file_t - Allow container_t to open existing tun/tap * Wed Aug 12 2020 kukuk@suse.com - Minimize BuildRequires * Mon Aug 10 2020 kukuk@suse.com - Update to version 2.143.0 - support containerd/cri * Wed Aug 05 2020 kukuk@suse.com - Initial version
/usr/share/containers /usr/share/containers/selinux /usr/share/containers/selinux/contexts /usr/share/doc/packages/container-selinux /usr/share/doc/packages/container-selinux/README.md /usr/share/licenses/container-selinux /usr/share/licenses/container-selinux/LICENSE /usr/share/selinux/devel /usr/share/selinux/devel/include /usr/share/selinux/devel/include/services /usr/share/selinux/devel/include/services/container.if /usr/share/selinux/packages /usr/share/selinux/packages/container.pp.bz2 /usr/share/udica /usr/share/udica/templates /usr/share/udica/templates/base_container.cil /usr/share/udica/templates/config_container.cil /usr/share/udica/templates/home_container.cil /usr/share/udica/templates/log_container.cil /usr/share/udica/templates/net_container.cil /usr/share/udica/templates/tmp_container.cil /usr/share/udica/templates/tty_container.cil /usr/share/udica/templates/virt_container.cil /usr/share/udica/templates/x_container.cil
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Oct 26 23:59:49 2024