Commit Graph

134 Commits

Author SHA1 Message Date
Daniel J Walsh
b74f4a298b Allow container runtimes to create sockets in tmp dirs 2017-09-07 08:43:48 +00:00
Daniel J Walsh
1aad223080 Add additonal support for crio labeling. 2017-09-05 20:40:09 +00:00
Troy Dawson
9a3633bb6b Fixup spec file conditionals 2017-08-14 13:16:08 -07:00
Fedora Release Engineering
5cb66e7ed3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild 2017-07-26 05:26:19 +00:00
Daniel J Walsh
bb6875d358 Allow containers to execmod on container_share_t files. 2017-07-11 17:36:41 +00:00
Daniel J Walsh
852a09a52f Relabel runc and crio executables 2017-07-06 10:47:14 +00:00
Daniel J Walsh
ef7772c664 Allow container processes to getsession 2017-06-30 15:53:25 +00:00
Daniel J Walsh
fbb3cfcf9a Allow containers to create tun sockets 2017-06-12 18:13:46 +00:00
Daniel J Walsh
f7112ead8f Fix labeling for CRI-O files in overlay subdirs 2017-06-06 19:46:53 +00:00
Daniel J Walsh
35b5399d15 Fix labeling for CRI-O files in overlay subdirs 2017-06-06 19:28:56 +00:00
Daniel J Walsh
590defb1b5 Revert change to run the container_runtime as ranged 2017-06-05 20:10:25 +00:00
Daniel J Walsh
4868764a43 Add default labeling for cri-o in /etc/crio directories 2017-06-01 21:47:32 +00:00
Daniel J Walsh
379ddc4b04 Allow container types to read/write container_runtime fifo files
Allow a container runtime to mount on top of its own /proc
2017-05-31 12:28:03 +00:00
Dan Walsh
1b640cb851 Add labels for crio rename
Break container_t rules out to use a separate container_domain
Allow containers to be able to set namespaced SYCTLS
Allow sandbox containers manage fuse files.
Fixes to make container_runtimes work on MLS machines
Bump version to allow handling of container_file_t filesystems
Allow containers to mount, remount and umount container_file_t file systems
Fixes to handle cap_userns
Give container_t access to XFRM sockets
Allow spc_t to dbus chat with init system
Allow spc_t to dbus chat with init system
Add rules to allow container runtimes to run with unconfined disabled
Add rules to support cgroup file systems mounted into container.
Fix typebounds entrypoint problems
Fix typebounds problems
Add typebounds statement for container_t from container_runtime_t
We should only label runc not runc*
2017-05-19 07:21:02 -04:00
Dan Walsh
ed21ef74dc Add labels for crio rename
Break container_t rules out to use a separate container_domain
Allow containers to be able to set namespaced SYCTLS
Allow sandbox containers manage fuse files.
Fixes to make container_runtimes work on MLS machines
Bump version to allow handling of container_file_t filesystems
Allow containers to mount, remount and umount container_file_t file systems
Fixes to handle cap_userns
Give container_t access to XFRM sockets
Allow spc_t to dbus chat with init system
Allow spc_t to dbus chat with init system
Add rules to allow container runtimes to run with unconfined disabled
Add rules to support cgroup file systems mounted into container.
Fix typebounds entrypoint problems
Fix typebounds problems
Add typebounds statement for container_t from container_runtime_t
We should only label runc not runc*
2017-05-19 07:19:44 -04:00
Daniel J Walsh
d6c9f15f16 Add rules to allow container runtimes to run with unconfined disabled
Add rules to support cgroup file systems mounted into container.
2017-02-28 13:47:46 -05:00
Daniel J Walsh
068028a20c Add rules to allow container_runtimes to run with unconfined disabled 2017-02-13 06:36:05 -08:00
Daniel J Walsh
4e04f9adef Add rules to allow container_runtimes to run with unconfined disabled 2017-02-13 05:33:06 -08:00
Daniel J Walsh
e6af9053a7 Allow container_file_t to be stored on cgroup_t file systems 2017-02-09 08:59:37 -05:00
Daniel J Walsh
afcdd30e26 Fix type in container interface file 2017-02-07 09:24:46 -05:00
Daniel J Walsh
761ca4f112 Fix typebounds entrypoint problems 2017-02-06 10:28:33 -05:00
Daniel J Walsh
a2fe41cd44 Fix typebounds problems 2017-01-27 13:15:25 +01:00
Daniel J Walsh
3fcf74cdce Fix typebounds problems 2017-01-27 13:14:10 +01:00
Daniel J Walsh
c06c926b64 Add typebounds statement for container_t from container_runtime_t
We should only label runc not runc*
2017-01-19 12:00:49 -05:00
Daniel J Walsh
6c8c18196a Fix labeling on /usr/bin/runc.*
Add sandbox_net_domain access to container.te
Remove containers ability to look at /etc content
2017-01-18 08:20:57 -05:00
Daniel J Walsh
c8e82ceefa Fix labeling on /usr/bin/runc.*
Add sandbox_net_domain access to container.te
Remove containers ability to look at /etc content
2017-01-17 17:10:15 -05:00
Lokesh Mandvekar
dc5c3985ab container-selinux-2:2.2-4
- use upstream's RHEL-1.12 branch, commit 56c32da for CentOS 7

Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
2017-01-11 12:13:04 -05:00
Jonathan Lebon
6028ccc721 container-selinux-2:2.2-3 2017-01-10 13:39:03 -05:00
Lokesh Mandvekar
8602eba442 container-selinux-2:2.2-2
- depend on selinux-policy-targeted
- relabel docker-latest* files as well

Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
2017-01-07 14:34:01 -05:00
Lokesh Mandvekar
98c88e3954 container-selinux-2:2.2-1
- bump to v2.2
- additional labeling for ocid

Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
2017-01-06 16:29:04 -05:00
Lokesh Mandvekar
57ea4c4351 container-selinux-2:2.0-2
- install policy at level 200

From: Dan Walsh <dwalsh@redhat.com>
Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
2017-01-06 15:41:09 -05:00
Daniel J Walsh
85f5b33ced Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a
standalone package)
include projectatomic/RHEL-1.12 branch commit for building on centos/rhel
2017-01-06 15:21:04 -05:00
Lokesh Mandvekar
7fa12a4c94 container-selinux-2:2.0-1
- Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a
standalone package)
- include projectatomic/RHEL-1.12 branch commit for building on centos/rhel

Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
2017-01-06 14:34:31 -05:00
Fedora Release Engineering
3dde170592 Initial setup of the repo 2017-01-06 15:04:16 +00:00