Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix for image volumes under selinux #10

Merged

Conversation

dweomer
Copy link

@dweomer dweomer commented Mar 9, 2021

Pull in a fix for containerd/cri that pulls in a fix for containerd/continuity: when copying directories for image volumes we should filter out the security.selinux xattr key because the target has been correctly relabeled already (and image volumes are copying from layer storage which has a read-only selinux context).

Upstream PR(s) for 1.5.x:

Addresses:

Pull in a fix for containerd/cri that pulls in a fix for
containerd/continuity: when copying directories for image volumes we
should filter out the security.selinux xattr key because the target has
been correctly relabeled already (and image volumes are copying from
layer storage which has a read-only selinux context).

- addresses rancher/rke2#690

Signed-off-by: Jacob Blain Christen <jacob@rancher.com>
@dweomer dweomer force-pushed the rke2-690-selinux-image-volume-copy branch from f65eb60 to 6b6d9c9 Compare March 9, 2021 19:27
@dweomer dweomer merged commit 53d5833 into k3s-io:k3s-release/1.4 Mar 9, 2021
@dweomer dweomer deleted the rke2-690-selinux-image-volume-copy branch March 9, 2021 19:36
dweomer added a commit that referenced this pull request Mar 16, 2021
Pull in a fix for containerd/cri that pulls in a fix for containerd/continuity: when copying directories for image volumes we should filter out the security.selinux xattr key because the target has been correctly relabeled already (and image volumes are copying from layer storage which has a read-only selinux context).

Upstream PR(s) for 1.5.x:
- containerd/continuity#178
- containerd#5104

Addresses:
- rancher/rke2#690

Signed-off-by: Jacob Blain Christen <jacob@rancher.com>
brandond pushed a commit that referenced this pull request Jul 20, 2021
Pull in a fix for containerd/cri that pulls in a fix for containerd/continuity: when copying directories for image volumes we should filter out the security.selinux xattr key because the target has been correctly relabeled already (and image volumes are copying from layer storage which has a read-only selinux context).

Upstream PR(s) for 1.5.x:
- containerd/continuity#178
- containerd#5104

Addresses:
- rancher/rke2#690

Signed-off-by: Jacob Blain Christen <jacob@rancher.com>
brandond pushed a commit that referenced this pull request Aug 13, 2021
Pull in a fix for containerd/cri that pulls in a fix for containerd/continuity: when copying directories for image volumes we should filter out the security.selinux xattr key because the target has been correctly relabeled already (and image volumes are copying from layer storage which has a read-only selinux context).

Upstream PR(s) for 1.5.x:
- containerd/continuity#178
- containerd#5104

Addresses:
- rancher/rke2#690

Signed-off-by: Jacob Blain Christen <jacob@rancher.com>
brandond pushed a commit that referenced this pull request Oct 4, 2021
Pull in a fix for containerd/cri that pulls in a fix for containerd/continuity: when copying directories for image volumes we should filter out the security.selinux xattr key because the target has been correctly relabeled already (and image volumes are copying from layer storage which has a read-only selinux context).

Upstream PR(s) for 1.5.x:
- containerd/continuity#178
- containerd#5104

Addresses:
- rancher/rke2#690

Signed-off-by: Jacob Blain Christen <jacob@rancher.com>
brandond pushed a commit that referenced this pull request Nov 18, 2021
Pull in a fix for containerd/cri that pulls in a fix for containerd/continuity: when copying directories for image volumes we should filter out the security.selinux xattr key because the target has been correctly relabeled already (and image volumes are copying from layer storage which has a read-only selinux context).

Upstream PR(s) for 1.5.x:
- containerd/continuity#178
- containerd#5104

Addresses:
- rancher/rke2#690

Signed-off-by: Jacob Blain Christen <jacob@rancher.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
1 participant