-
Notifications
You must be signed in to change notification settings - Fork 549
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: SELinux bring-up #9127
Draft
dsseng
wants to merge
5
commits into
siderolabs:main
Choose a base branch
from
dsseng:selinux
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Draft
feat: SELinux bring-up #9127
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
dsseng
force-pushed
the
selinux
branch
2 times, most recently
from
August 11, 2024 19:31
ec1b0f7
to
80fbde2
Compare
dsseng
force-pushed
the
selinux
branch
2 times, most recently
from
September 2, 2024 17:37
ce5d242
to
9d40335
Compare
Current AVC denials: ;============= pod_containerd_t ==============
; audit(1729973459.178:75):
; scontext="client_u:client_r:pod_containerd_t:s0" tcontext="system_u:object_r:bin_t:s0"
; class="file" perms="execute_no_trans"
; comm="portmap" exe="" path=""
; message="[ 8.620880] audit: type=1400 audit(1729973459.178:75): avc:
; denied { execute_no_trans } for pid=2217 comm="portmap"
; path="/sbin/xtables-legacy-multi" dev="loop0" ino=580
; scontext=client_u:client_r:pod_containerd_t:s0
; tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 "
; audit(1729973494.435:94):
; scontext="client_u:client_r:pod_containerd_t:s0" tcontext="system_u:object_r:bin_t:s0"
; class="file" perms="execute_no_trans"
; comm="portmap" exe="" path=""
; message="[ 43.805129] audit: type=1400 audit(1729973494.435:94): avc:
; denied { execute_no_trans } for pid=2504 comm="portmap"
; path="/sbin/xtables-legacy-multi" dev="loop0" ino=580
; scontext=client_u:client_r:pod_containerd_t:s0
; tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 "
(allow pod_containerd_t bin_t (file (execute_no_trans)))
;============= udev_rules_t ==============
; audit(1729973454.016:47):
; scontext="system_u:object_r:udev_rules_t:s0" tcontext="system_u:object_r:fs_t:s0"
; class="filesystem" perms="associate"
; comm="init" exe="" path=""
; message="[ 3.464284] audit: type=1400 audit(1729973454.016:47): avc:
; denied { associate } for pid=1 comm="init" name="99-talos.rules"
; scontext=system_u:object_r:udev_rules_t:s0 tcontext=system_u:object_r:fs_t:s0
; tclass=filesystem permissive=1 "
(allow udev_rules_t fs_t (filesystem (associate)))
; audit(1729973454.016:47):
; scontext="system_u:object_r:udev_rules_t:s0" tcontext="system_u:object_r:tmpfs_t:s0"
; class="filesystem" perms="associate"
; comm="init" exe="" path=""
; message="[ 3.465198] audit: type=1400 audit(1729973454.016:47): avc:
; denied { associate } for pid=1 comm="init" name="#b"
; scontext=system_u:object_r:udev_rules_t:s0
; tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 "
(allow udev_rules_t tmpfs_t (filesystem (associate)))
;============= udev_t ==============
; audit(1729973451.628:43):
; scontext="system_u:system_r:udev_t:s0" tcontext="system_u:object_r:udevadm_exec_t:s0"
; class="file" perms="entrypoint"
; comm="wrapperd" exe="" path=""
; message="[ 1.068557] audit: type=1400 audit(1729973451.628:43): avc:
; denied { entrypoint } for pid=1059 comm="wrapperd" path="/usr/bin/udevadm"
; dev="loop0" ino=587 scontext=system_u:system_r:udev_t:s0
; tcontext=system_u:object_r:udevadm_exec_t:s0 tclass=file permissive=1 "
(allow udev_t udevadm_exec_t (file (entrypoint))) |
dsseng
force-pushed
the
selinux
branch
2 times, most recently
from
October 28, 2024 18:39
75b4274
to
07a989f
Compare
This comment was marked as resolved.
This comment was marked as resolved.
dsseng
force-pushed
the
selinux
branch
5 times, most recently
from
October 30, 2024 08:14
13e9c1d
to
9950176
Compare
dsseng
force-pushed
the
selinux
branch
7 times, most recently
from
October 31, 2024 15:38
43dbed6
to
00d40bb
Compare
dsseng
added a commit
to dsseng/talos
that referenced
this pull request
Oct 31, 2024
Part of: siderolabs#9127 Label executables and processes, build, load and manage SELinux policy, enable audit support. Labeling filesystems, devices and runtime files will be done in further changes, see the full PR. TODO: label static pods Signed-off-by: Dmitry Sharshakov <[email protected]>
dsseng
added a commit
to dsseng/talos
that referenced
this pull request
Oct 31, 2024
Part of: siderolabs#9127 Label executables and processes, build, load and manage SELinux policy, enable audit support. Labeling filesystems, devices and runtime files will be done in further changes, see the full PR. TODO: label static pods Signed-off-by: Dmitry Sharshakov <[email protected]>
dsseng
added a commit
to dsseng/talos
that referenced
this pull request
Oct 31, 2024
Part of: siderolabs#9127 Label executables and processes, build, load and manage SELinux policy, enable audit support. Labeling filesystems, devices and runtime files will be done in further changes, see the full PR. TODO: label static pods Signed-off-by: Dmitry Sharshakov <[email protected]>
dsseng
added a commit
to dsseng/talos
that referenced
this pull request
Nov 1, 2024
Part of: siderolabs#9127 Label executables and processes, build, load and manage SELinux policy, enable audit support. Labeling filesystems, devices and runtime files will be done in further changes, see the full PR. TODO: label static pods Signed-off-by: Dmitry Sharshakov <[email protected]>
dsseng
added a commit
to dsseng/talos
that referenced
this pull request
Nov 2, 2024
Part of: siderolabs#9127 Label executables and processes, build, load and manage SELinux policy, enable audit support. Labeling filesystems, devices and runtime files will be done in further changes, see the full PR. TODO: label static pods Signed-off-by: Dmitry Sharshakov <[email protected]>
TODO: label static pods |
dsseng
added a commit
to dsseng/talos
that referenced
this pull request
Nov 4, 2024
Part of: siderolabs#9127 Label executables and processes, build, load and manage SELinux policy, enable audit support. Labeling filesystems, devices and runtime files will be done in further changes, see the full PR. Signed-off-by: Dmitry Sharshakov <[email protected]>
dsseng
added a commit
to dsseng/talos
that referenced
this pull request
Nov 4, 2024
Part of: siderolabs#9127 Label executables and processes, build, load and manage SELinux policy, enable audit support. Labeling filesystems, devices and runtime files will be done in further changes, see the full PR. Signed-off-by: Dmitry Sharshakov <[email protected]>
dsseng
added a commit
to dsseng/talos
that referenced
this pull request
Nov 4, 2024
Part of: siderolabs#9127 Label executables and processes, build, load and manage SELinux policy, enable audit support. Labeling filesystems, devices and runtime files will be done in further changes, see the full PR. Signed-off-by: Dmitry Sharshakov <[email protected]>
Label mounted filesystems like ephemeral Signed-off-by: Dmitry Sharshakov <[email protected]>
Use udev rules to assign basic device file labels based on their subsystem Signed-off-by: Dmitry Sharshakov <[email protected]>
Implement SELinux labeling support in EtcFileController. Signed-off-by: Dmitry Sharshakov <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pull Request
What? (description)
Initial SELinux support
Why? (reasoning)
Improve security, #8016
Acceptance
Please use the following checklist:
make conformance
)make fmt
)make lint
)make docs
)make unit-tests
)Tip: to debug denials in QEMU: