Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package container-selinux for 
openSUSE:Factory checked in at 2026-03-17 19:02:42
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/container-selinux (Old)
 and      /work/SRC/openSUSE:Factory/.container-selinux.new.8177 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "container-selinux"

Tue Mar 17 19:02:42 2026 rev:37 rq:1339329 version:2.247.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/container-selinux/container-selinux.changes      
2026-02-21 21:01:28.991715699 +0100
+++ 
/work/SRC/openSUSE:Factory/.container-selinux.new.8177/container-selinux.changes
    2026-03-17 19:03:57.811343855 +0100
@@ -0,0 +1,9 @@
+Mon Mar 16 09:20:21 UTC 2026 - Johannes Segitz <[email protected]>
+
+- Update to version 2.247.0:
+  * Allow user_u users to run podman containers
+  * Allow staff_t and user_t to start podman.socket via systemd
+  * Add missing type transitions for overlay-containers directories
+  * container_t: allow listen on smc_socket
+  * Condition ptrace permission on deny_ptrace boolean
+

Old:
----
  container-selinux-2.246.0.tar.xz

New:
----
  container-selinux-2.247.0.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ container-selinux.spec ++++++
--- /var/tmp/diff_new_pack.Z8aUMb/_old  2026-03-17 19:03:58.287363581 +0100
+++ /var/tmp/diff_new_pack.Z8aUMb/_new  2026-03-17 19:03:58.287363581 +0100
@@ -26,7 +26,7 @@
 # Version of SELinux we were using
 %define selinux_policyver %(rpm -q selinux-policy --qf '%%{version}')
 Name:           container-selinux
-Version:        2.246.0
+Version:        2.247.0
 Release:        0
 Summary:        SELinux policies for container runtimes
 License:        GPL-2.0-only

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.Z8aUMb/_old  2026-03-17 19:03:58.347366068 +0100
+++ /var/tmp/diff_new_pack.Z8aUMb/_new  2026-03-17 19:03:58.351366234 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/containers/container-selinux.git</param>
-              <param 
name="changesrevision">521cf8c56e8df7cd6809571ed9e796b495ceaa71</param></service></servicedata>
+              <param 
name="changesrevision">f336064bb5a086cab121c02acf285a68fa4b8352</param></service></servicedata>
 (No newline at EOF)
 

++++++ container-selinux-2.246.0.tar.xz -> container-selinux-2.247.0.tar.xz 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/container-selinux-2.246.0/SECURITY.md 
new/container-selinux-2.247.0/SECURITY.md
--- old/container-selinux-2.246.0/SECURITY.md   2026-02-19 13:11:16.000000000 
+0100
+++ new/container-selinux-2.247.0/SECURITY.md   2026-03-13 14:58:55.000000000 
+0100
@@ -1,4 +1,3 @@
 ## Security and Disclosure Information Policy for the container-selinux Project
 
-The container-selinux Project follows the [Security and Disclosure Information 
Policy](https://github.com/containers/common/blob/master/SECURITY.md) for the 
Containers Projects.
-
+The container-selinux Project follows the [Security and Disclosure Information 
Policy](https://github.com/containers/container-libs/blob/main/SECURITY.md) for 
the Containers Projects.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/container-selinux-2.246.0/container.if 
new/container-selinux-2.247.0/container.if
--- old/container-selinux-2.246.0/container.if  2026-02-19 13:11:16.000000000 
+0100
+++ new/container-selinux-2.247.0/container.if  2026-03-13 14:58:55.000000000 
+0100
@@ -607,9 +607,11 @@
     filetrans_pattern($1, data_home_t, container_ro_file_t, dir, "overlay")
     filetrans_pattern($1, data_home_t, container_ro_file_t, dir, 
"overlay-images")
     filetrans_pattern($1, data_home_t, container_ro_file_t, dir, 
"overlay-layers")
+    filetrans_pattern($1, data_home_t, container_ro_file_t, dir, 
"overlay-containers")
     filetrans_pattern($1, data_home_t, container_ro_file_t, dir, "overlay2")
     filetrans_pattern($1, data_home_t, container_ro_file_t, dir, 
"overlay2-images")
     filetrans_pattern($1, data_home_t, container_ro_file_t, dir, 
"overlay2-layers")
+    filetrans_pattern($1, data_home_t, container_ro_file_t, dir, 
"overlay2-containers")
 
     filetrans_pattern($1, container_var_lib_t, container_ro_file_t, dir, 
"atomic")
     userdom_admin_home_dir_filetrans($1, container_home_t, dir, ".container")
@@ -681,7 +683,10 @@
                type container_file_t;
        ')
 
-       allow $1 container_runtime_t:process { ptrace signal_perms };
+       allow $1 container_runtime_t:process signal_perms;
+       tunable_policy(`deny_ptrace',`',`
+               allow $1 container_runtime_t:process ptrace;
+       ')
        ps_process_pattern($1, container_runtime_t)
 
        admin_pattern($1, container_config_t)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/container-selinux-2.246.0/container.te 
new/container-selinux-2.247.0/container.te
--- old/container-selinux-2.246.0/container.te  2026-02-19 13:11:16.000000000 
+0100
+++ new/container-selinux-2.247.0/container.te  2026-03-13 14:58:55.000000000 
+0100
@@ -1,4 +1,4 @@
-policy_module(container, 2.246.0)
+policy_module(container, 2.247.0)
 
 gen_require(`
        class passwd rootok;
@@ -99,6 +99,15 @@
 ## </desc>
 gen_tunable(container_manage_public_content, false)
 
+## <desc>
+##  <p>
+##  Allow user_t confined users to run podman containers.
+##  Disabled by default since user_t is the most restricted
+##  confined user type.
+##  </p>
+## </desc>
+gen_tunable(user_t_run_containers, false)
+
 attribute container_runtime_domain;
 container_runtime_domain_template(container_runtime)
 typealias container_runtime_t alias docker_t;
@@ -838,7 +847,9 @@
 
 optional_policy(`
        unconfined_domain_noaudit(spc_t)
-       domain_ptrace_all_domains(spc_t)
+       tunable_policy(`deny_ptrace',`',`
+               domain_ptrace_all_domains(spc_t)
+       ')
        # This should eventually be in upstream policy.
        # https://github.com/fedora-selinux/selinux-policy/pull/806
        allow spc_t domain:bpf { map_create map_read map_write prog_load 
prog_run };
@@ -1135,6 +1146,7 @@
 allow container_net_domain self:sctp_socket listen;
 allow container_net_domain self:packet_socket create_socket_perms;
 allow container_net_domain self:socket create_socket_perms;
+allow container_net_domain self:smc_socket listen;
 allow container_net_domain self:rawip_socket create_stream_socket_perms;
 allow container_net_domain self:netlink_kobject_uevent_socket 
create_socket_perms;
 allow container_net_domain self:netlink_tcpdiag_socket nlmsg_read;
@@ -1333,13 +1345,26 @@
        allow userdomain self:cap_userns ~{ sys_module };
        container_read_state(userdomain)
        allow userdomain container_runtime_t:process { noatsecure rlimitinh 
siginh };
-       container_runtime_run(user_t, user_r)
+       role user_r types container_runtime_t;
        role user_r types container_user_domain;
 
        staff_role_change_to(system_r)
+       unprivuser_role_change_to(system_r)
 
        allow staff_t container_runtime_t:process signal_perms;
        allow staff_t container_domain:process signal_perms;
+
+       # Allow confined user systemd instances to create and manage sockets
+       # for podman.socket activation (user-level systemd pre-labels the
+       # socket as container_runtime_t via setsockcreatecon)
+       allow { staff_t user_t } container_runtime_t:unix_stream_socket { 
create bind listen getattr setopt };
+
+       tunable_policy(`user_t_run_containers',`
+               container_runtime_domtrans(user_t)
+               allow user_t container_runtime_t:process signal_perms;
+               allow user_t container_domain:process signal_perms;
+       ')
+
        allow container_domain userdomain:socket_class_set { accept ioctl read 
getattr lock write append getopt shutdown setopt };
 ')
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/container-selinux-2.246.0/plans/main.fmf 
new/container-selinux-2.247.0/plans/main.fmf
--- old/container-selinux-2.246.0/plans/main.fmf        2026-02-19 
13:11:16.000000000 +0100
+++ new/container-selinux-2.247.0/plans/main.fmf        2026-03-13 
14:58:55.000000000 +0100
@@ -22,6 +22,10 @@
         test: /test/basic_check
 
 /xmllint_validation:
+    enabled: false
+    adjust:
+        - when: initiator == packit
+          enabled: true
     discover+:
         test: /test/xmllint_validation
 

Reply via email to