Commit Graph

174 Commits

Author SHA1 Message Date
Daniel J Walsh
590defb1b5 Revert change to run the container_runtime as ranged 2017-06-05 20:10:25 +00:00
Daniel J Walsh
4868764a43 Add default labeling for cri-o in /etc/crio directories 2017-06-01 21:47:32 +00:00
Daniel J Walsh
379ddc4b04 Allow container types to read/write container_runtime fifo files
Allow a container runtime to mount on top of its own /proc
2017-05-31 12:28:03 +00:00
Dan Walsh
1b640cb851 Add labels for crio rename
Break container_t rules out to use a separate container_domain
Allow containers to be able to set namespaced SYCTLS
Allow sandbox containers manage fuse files.
Fixes to make container_runtimes work on MLS machines
Bump version to allow handling of container_file_t filesystems
Allow containers to mount, remount and umount container_file_t file systems
Fixes to handle cap_userns
Give container_t access to XFRM sockets
Allow spc_t to dbus chat with init system
Allow spc_t to dbus chat with init system
Add rules to allow container runtimes to run with unconfined disabled
Add rules to support cgroup file systems mounted into container.
Fix typebounds entrypoint problems
Fix typebounds problems
Add typebounds statement for container_t from container_runtime_t
We should only label runc not runc*
2017-05-19 07:21:02 -04:00
Dan Walsh
ed21ef74dc Add labels for crio rename
Break container_t rules out to use a separate container_domain
Allow containers to be able to set namespaced SYCTLS
Allow sandbox containers manage fuse files.
Fixes to make container_runtimes work on MLS machines
Bump version to allow handling of container_file_t filesystems
Allow containers to mount, remount and umount container_file_t file systems
Fixes to handle cap_userns
Give container_t access to XFRM sockets
Allow spc_t to dbus chat with init system
Allow spc_t to dbus chat with init system
Add rules to allow container runtimes to run with unconfined disabled
Add rules to support cgroup file systems mounted into container.
Fix typebounds entrypoint problems
Fix typebounds problems
Add typebounds statement for container_t from container_runtime_t
We should only label runc not runc*
2017-05-19 07:19:44 -04:00
Daniel J Walsh
d6c9f15f16 Add rules to allow container runtimes to run with unconfined disabled
Add rules to support cgroup file systems mounted into container.
2017-02-28 13:47:46 -05:00
Daniel J Walsh
068028a20c Add rules to allow container_runtimes to run with unconfined disabled 2017-02-13 06:36:05 -08:00
Daniel J Walsh
4e04f9adef Add rules to allow container_runtimes to run with unconfined disabled 2017-02-13 05:33:06 -08:00
Daniel J Walsh
e6af9053a7 Allow container_file_t to be stored on cgroup_t file systems 2017-02-09 08:59:37 -05:00
Daniel J Walsh
afcdd30e26 Fix type in container interface file 2017-02-07 09:24:46 -05:00
Daniel J Walsh
761ca4f112 Fix typebounds entrypoint problems 2017-02-06 10:28:33 -05:00
Daniel J Walsh
a2fe41cd44 Fix typebounds problems 2017-01-27 13:15:25 +01:00
Daniel J Walsh
3fcf74cdce Fix typebounds problems 2017-01-27 13:14:10 +01:00
Daniel J Walsh
c06c926b64 Add typebounds statement for container_t from container_runtime_t
We should only label runc not runc*
2017-01-19 12:00:49 -05:00
Daniel J Walsh
6c8c18196a Fix labeling on /usr/bin/runc.*
Add sandbox_net_domain access to container.te
Remove containers ability to look at /etc content
2017-01-18 08:20:57 -05:00
Daniel J Walsh
c8e82ceefa Fix labeling on /usr/bin/runc.*
Add sandbox_net_domain access to container.te
Remove containers ability to look at /etc content
2017-01-17 17:10:15 -05:00
Lokesh Mandvekar
dc5c3985ab container-selinux-2:2.2-4
- use upstream's RHEL-1.12 branch, commit 56c32da for CentOS 7

Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
2017-01-11 12:13:04 -05:00
Jonathan Lebon
6028ccc721 container-selinux-2:2.2-3 2017-01-10 13:39:03 -05:00
Lokesh Mandvekar
8602eba442 container-selinux-2:2.2-2
- depend on selinux-policy-targeted
- relabel docker-latest* files as well

Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
2017-01-07 14:34:01 -05:00
Lokesh Mandvekar
98c88e3954 container-selinux-2:2.2-1
- bump to v2.2
- additional labeling for ocid

Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
2017-01-06 16:29:04 -05:00
Lokesh Mandvekar
57ea4c4351 container-selinux-2:2.0-2
- install policy at level 200

From: Dan Walsh <dwalsh@redhat.com>
Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
2017-01-06 15:41:09 -05:00
Daniel J Walsh
85f5b33ced Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a
standalone package)
include projectatomic/RHEL-1.12 branch commit for building on centos/rhel
2017-01-06 15:21:04 -05:00
Lokesh Mandvekar
7fa12a4c94 container-selinux-2:2.0-1
- Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a
standalone package)
- include projectatomic/RHEL-1.12 branch commit for building on centos/rhel

Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
2017-01-06 14:34:31 -05:00
Fedora Release Engineering
3dde170592 Initial setup of the repo 2017-01-06 15:04:16 +00:00