Changelog for
container-selinux-2.211.0-2.100.noarch.rpm :
* Mon Apr 24 2023 jsegitzAATTsuse.com- Update to version 2.211.0:
* Don\'t transition to initrc_t domains from spc_t
* Add tunable to allow sshd_t to launch container engines
* Allow syslogd_t gettatr on inheritited runtime tmpfs files
* Add container_file_t and container_ro_file_t as user_home_type
* Set default context for local-path-provisioner
* Allow daemon to send dbus messages to spc_t by
* Wed Mar 29 2023 jsegitzAATTsuse.com- Update to version 2.206.0:
* Allow unconfined domains to transition to container_runtime_t
* Allow container domains to transition to install_t
* Allow avirt_sandbox_domain to manage container_file_t types
* Allow containers to watch sysfs_t directories
* Allow spc_t to transption to rpm_script_t
* Add support to new user_namespace access check
* Smaller permission changes for container_init_t- Drop spc.patch, is now included
* Mon Jan 16 2023 fcrozatAATTsuse.com- Update to version 2.198.0:
* Fix spc_t transition rules on tmpfs_t- Changes from 2.197.0:
* Add boolean containers_use_ecryptfs policy- Changes from 2.195.1:
* Readd missing allow rules for container_t- Changes from 2.194.0:
* Allow syslogd_t to use tmpfs files created by container runtime- Changes from 2.193.0:
* Allow containers to mount tmpfs_t file systems
* Label spc_t as a init initrc daemon
* Allow userdomains to run containers- Changes from 2.191.0:
* Create container_logwriter_t type- Changes from 2.190.1:
* Support BuildKit
* container.fc: Set label for kata-agent
* support nerdctl- Changes from 2.190.0:
* Packit: initial enablement
* Allow iptables to list directories labeled as container_file_t- Changes from 2.189.0:
* Dont audit searching other processes in /proc.
* Thu Jan 12 2023 jsegitzAATTsuse.com- Rename spc_timedated.patch to spc.patch- Update spc.patch to allow privileged containers to use localectl (bsc#1207077)
* Wed Jan 11 2023 jsegitzAATTsuse.com- Add spc_timedated.patch to allow privileged containers to use timedatectl (bsc#1207054)
* Thu Jul 14 2022 jsegitzAATTsuse.com- Update to version 2.188.0:
* Allow confined containers to mount overlay filesystems Fixed bsc#1201348
* Wed Jun 22 2022 fcrozatAATTsuse.com- Update to version 2.187.0:
* Allow container domains to use /dev/zero- Changes from 2.186.0:
* Create policy for a container_device_t
* Allow containers to shutdown & setopt userdomain:sockets- Changes from 2.183.0:
* Allow containers to inherit all socket classes from container runtimes.- Changes from 2.182.0:
* Allow containers to inherit all socket classes- Changes from 2.181.0:
* Allow socket activated domains for tcp sockets from init_t and userdomains.
* Tue Mar 22 2022 jsegitzAATTsuse.com- Add udica templates to the package
* Fri Mar 18 2022 jsegitzAATTsuse.com- Update to version 2.180.0
* Allow container domains to read/write kvm_device_t
* Update kublet mappings to inlcude /usr/local/
*
* Allow container domains to use container runtime tcp and udp sockets
* Alow containers to use unix_stream_sockets leaked from container runtimes
* Allow userdomains to execute conmon_exec_t and use it as an entrypoint
* Allow conmon_exec_t as an entrypoint
* Add container_use_devices boolean to allow containers to use any device
* Add explicit range transition for conmon
* Add missing dbus class declaration into container_runtime_run()
* Remove lockdown allow rules
* Remove k3s fcontexts
* Allow container domains to be used by user roles- Changed source url to allow for download via source service
* Fri Nov 12 2021 rbrownAATTsuse.com- Update to version 2.171.0
* Define kubernetes_file_t as a config_type
* Allow containers to be socket activated by user domains and by systemd.
* Allow iptables to use fifo files of a container runtime
* Allow container_runtime create all tmpfs content as container_runtime_tmpfs_t
* Allow containers to create lnk_file on tmpfs_t directories.
* Mon Aug 09 2021 jsegitzAATTsuse.com- Update to version 2.164.2
* Don\'t setup users for writing to pid_sockets
* Allow container engines to be started from the staff user.
* Allow spc_t domains to set bpf rules on any domain
* Add support for k3s
* Fri Apr 23 2021 jsegitzAATTsuse.com- Fix container runtime binary labels (bsc#1185030). You need to relable at least /usr/sbin if you\'re affected
* Tue Feb 23 2021 kukukAATTsuse.com- Update to version 2.158.0 - Add nfs remount support - Allow containers to execmod on nfs, samba and cephs remote shares - Allow confined users to send dbus messages to container_runtime
* Mon Jan 11 2021 kukukAATTsuse.com- Update to version 2.154.0 - Allow confined user domains to run confined container domains. - Allow all containers to use nfs shares, iff virt_use_nfs boolean is enabled. - Allow containers to read nsfs file systems. - KVM Container need to use tunnel sockets created by runtime.
* Tue Nov 03 2020 lnusselAATTsuse.de- Don\'t use BuildRequires based on shell script output. OBS can\'t evaluate that.
* Thu Oct 29 2020 kukukAATTsuse.com- Update to version 2.150.0 - Add additional allow rules for kvm based containers using virtiofsd.
* Wed Oct 14 2020 kukukAATTsuse.com- Update to version 2.145.0 - Add support for kubernetes_file_t - Allow container_t to open existing tun/tap
* Wed Aug 12 2020 kukukAATTsuse.com- Minimize BuildRequires
* Mon Aug 10 2020 kukukAATTsuse.com- Update to version 2.143.0 - support containerd/cri
* Wed Aug 05 2020 kukukAATTsuse.com- Initial version