-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Formally add support for SELinux (Enforced mode) #1372
Comments
@ShylajaDevadiga I have assigned this issue to you for now. This will require some testing and discovery. We need to identify any/all SELinux CentOS issues that prevent us from formally supporting CentOS with SELinux support in our next release. Work with me as needed. |
As a reminder we must support IPv6 as well. |
Is this more complicated than running tests in permissive mode, running audit2allow, and reviewing the generated policy for what needs to be relabled so that k3s will run with selinux in enforcing mode?
|
|
@westurner the main bit of work involves getting MCS label support into containerd (k3s's embedded contianer runtime): See this WIP PR from @ibuildthecloud: |
Merged #1448 |
Closing this issue in favor of #533 |
We need to expand our testing and identify any issues that prevent us from formally supporting SELinux (in enforced mode) on CentOS. Please note that SELinux is expected to work -- this issue is for tracking testing effort so we can formally support it.
We should review existing GitHub issues, but we need to execute some testing and identify any other issues. As needed, we'll need to resolve these issues so we may fully support SELinux on CentOS.
Formal CentOS (general OS) support is also needed, which is tracked separately here: #1371
The text was updated successfully, but these errors were encountered: