Skip to content
This repository was archived by the owner on Aug 14, 2020. It is now read-only.

spec: add os/linux/selinux-context isolator #673

Merged
merged 1 commit into from
Nov 15, 2016

Conversation

lucab
Copy link
Contributor

@lucab lucab commented Nov 14, 2016

This commit introduces an "os/linux/selinux-context" isolator, which
can be applied at both app and pod scope.

@lucab
Copy link
Contributor Author

lucab commented Nov 14, 2016

@jonboulle @squeed PTAL.

* **level** case-sensitive string containing the level portion of the SELinux security context to be used to label the current pod or application.

**Notes:**
1. Only a single `os/linux/selinux-context` isolator can be specified per-pod.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If a context is applied to a pod, does this just mean it's for all apps (unless they have overrides), or also for any executor processes involved in running the pod? (i.e. stage1 for rkt)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It also applies to other processes in the pod context. Thanks for highlighting this, I'll make it explicit in the spec.

@jonboulle
Copy link
Contributor

LGTM modulo clarification on pod thing

This commit introduces an "os/linux/selinux-context" isolator, which
can be applied at both app and pod scope.
@lucab lucab force-pushed the to-upstream/selinux-context branch from 3724998 to 34360b3 Compare November 15, 2016 09:59
@lucab
Copy link
Contributor Author

lucab commented Nov 15, 2016

Amended with the clarification regarding pod-context.

@squeed
Copy link
Contributor

squeed commented Nov 15, 2016

👍

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants