Mon, 16 Sep 2019 06:18:19 UTC | login

Information for build container-selinux-2.21-1.el7

ID17695
Package Namecontainer-selinux
Version2.21
Release1.el7
Epoch2
SummarySELinux policies for container runtimes
DescriptionSELinux policy modules for use with container runtimes.
Built bylsm5
State complete
StartedMon, 24 Jul 2017 19:03:01 UTC
CompletedMon, 24 Jul 2017 19:05:34 UTC
Taskbuild (virt7-container-common-el7, container-selinux-2.21-1.el7.src.rpm)
Tags
virt7-container-common-candidate
RPMs
src
container-selinux-2.21-1.el7.src.rpm (info) (download)
noarch (build logs)
container-selinux-2.21-1.el7.noarch.rpm (info) (download)
Changelog * Thu Jul 06 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.21-1 - Allow containers to execmod on container_share_t files. * Thu Jul 06 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.20-2 - Relabel runc and crio executables * Fri Jun 30 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.20-1 - Allow container processes to getsession * Mon Jun 12 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.19-1 - Allow containers to create tun sockets * Tue Jun 06 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.18-1 - Fix labeling for CRI-O files in overlay subdirs * Mon Jun 05 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.17-1 - Revert change to run the container_runtime as ranged * Thu Jun 01 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.16-1 - Add default labeling for cri-o in /etc/crio directories * Wed May 31 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.15-1 - Allow container types to read/write container_runtime fifo files - Allow a container runtime to mount on top of its own /proc * Fri May 19 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.14-1 - Add labels for crio rename - Break container_t rules out to use a separate container_domain - Allow containers to be able to set namespaced SYCTLS - Allow sandbox containers manage fuse files. - Fixes to make container_runtimes work on MLS machines - Bump version to allow handling of container_file_t filesystems - Allow containers to mount, remount and umount container_file_t file systems - Fixes to handle cap_userns - Give container_t access to XFRM sockets - Allow spc_t to dbus chat with init system - Allow spc_t to dbus chat with init system - Add rules to allow container runtimes to run with unconfined disabled - Add rules to support cgroup file systems mounted into container. - Fix typebounds entrypoint problems - Fix typebounds problems - Add typebounds statement for container_t from container_runtime_t - We should only label runc not runc* * Tue Feb 28 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.10-1 - Add rules to allow container runtimes to run with unconfined disabled - Add rules to support cgroup file systems mounted into container. * Mon Feb 13 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2.9-1 - Add rules to allow container_runtimes to run with unconfined disabled * Thu Feb 09 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2:8.1-1 - Allow container_file_t to be stored on cgroup_t file systems * Tue Feb 07 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2:7.1-1 - Fix type in container interface file * Mon Feb 06 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2:6.1-1 - Fix typebounds entrypoint problems * Fri Jan 27 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2:5.1-1 - Fix typebounds problems * Thu Jan 19 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2:4.1-1 - Add typebounds statement for container_t from container_runtime_t - We should only label runc not runc* * Tue Jan 17 2017 Dan Walsh <dwalsh@fedoraproject.org> - 2:3.1-1 - Fix labeling on /usr/bin/runc.* - Add sandbox_net_domain access to container.te - Remove containers ability to look at /etc content * Wed Jan 11 2017 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:2.2-4 - use upstream's RHEL-1.12 branch, commit 56c32da for CentOS 7 * Tue Jan 10 2017 Jonathan Lebon <jlebon@redhat.com> - 2:2.2-3 - properly disable docker module in %post * Sat Jan 07 2017 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:2.2-2 - depend on selinux-policy-targeted - relabel docker-latest* files as well * Fri Jan 06 2017 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:2.2-1 - bump to v2.2 - additional labeling for ocid * Fri Jan 06 2017 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:2.0-2 - install policy at level 200 - From: Dan Walsh <dwalsh@redhat.com> * Fri Jan 06 2017 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:2.0-1 - Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a standalone package) - include projectatomic/RHEL-1.12 branch commit for building on centos/rhel * Mon Dec 19 2016 Lokesh Mandvekar <lsm5@fedoraproject.org> - 2:1.12.4-29 - new package (separated from docker)