-
Notifications
You must be signed in to change notification settings - Fork 106
bootc/install_t: allow transition to container_runtime_t #370
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Reviewer's Guide by SourceryThis pull request adds SELinux policy rules to allow processes running with the No diagrams generated as the changes look simple and do not need a visual representation. File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @lsm5 - I've reviewed your changes - here's some feedback:
Overall Comments:
- It would be helpful to understand why
bootc
needs to transition tocontainer_runtime_t
.
Here's what I looked at during the review
- 🟢 General issues: all looks good
- 🟢 Security: all looks good
- 🟢 Testing: all looks good
- 🟢 Complexity: all looks good
- 🟢 Documentation: all looks good
Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: lsm5, sourcery-ai[bot] The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/lgtm |
Doesn't look like this will merge unless rebased. Rebasing might remove the lgtm label, so I'll take the liberty to re-add it. |
Generation of bootc compatible disk images is done via the command: ``` sudo podman run --rm -it --privileged \ --pull=newer \ --security-opt label=type:unconfined_t \ -v ./config.toml:/config.toml:ro \ -v ./output:/output \ -v /var/lib/containers/storage/:/var/lib/containers/storage/ \ quay.io/centos-bootc/bootc-image-builder:latest \ --type qcow2 \ quay.io/centos-bootc/centos-bootc:stream9 ``` Ref: https://github.com/osbuild/bootc-image-builder?tab=readme-ov-file#-examples And this currently results in an apparently harmless AVC denial: ``` avc: denied { nnp_transition nosuid_transition } for pid=40081 comm="bootc" \ scontext=system_u:system_r:install_t:s0:c68,c235 \ tcontext=system_u:system_r:container_runtime_t:s0:c68,c235 \ tclass=process2 permissive=0 ``` This commit adds allow rules for processes with install_t type, like bootc, to silence the AVCs. Ref: https://issues.redhat.com/browse/RHEL-85671 Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
New changes are detected. LGTM label has been removed. |
/cherrypick rhaos-maint |
@lsm5: new pull request created: #371 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Generation of bootc compatible disk images is done via the command:
Ref: https://github.com/osbuild/bootc-image-builder?tab=readme-ov-file#-examples
And this currently results in an apparently harmless AVC denial:
This commit adds allow rules for processes with install_t type, like bootc, to silence the AVCs.
Ref: https://issues.redhat.com/browse/RHEL-85671
Summary by Sourcery
Bug Fixes: