Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package container-selinux for
openSUSE:Factory checked in at 2026-02-21 21:01:02
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/container-selinux (Old)
and /work/SRC/openSUSE:Factory/.container-selinux.new.1977 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "container-selinux"
Sat Feb 21 21:01:02 2026 rev:36 rq:1333998 version:2.246.0
Changes:
--------
--- /work/SRC/openSUSE:Factory/container-selinux/container-selinux.changes
2025-12-17 17:34:10.854134591 +0100
+++
/work/SRC/openSUSE:Factory/.container-selinux.new.1977/container-selinux.changes
2026-02-21 21:01:28.991715699 +0100
@@ -1,0 +2,9 @@
+Thu Feb 19 15:14:17 UTC 2026 - Johannes Segitz <[email protected]>
+
+- Update to version 2.246.0:
+ * Allow containers to mount on container_var_run_t directories
+ * Allow container_runtime_domain runtime fifo_files transition
+ * Allow TUN/TAP device access for container_engine_t
+ * Add the container_signull() interface
+
+-------------------------------------------------------------------
Old:
----
container-selinux-2.245.0.tar.xz
New:
----
container-selinux-2.246.0.tar.xz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ container-selinux.spec ++++++
--- /var/tmp/diff_new_pack.6iYAWI/_old 2026-02-21 21:01:30.731787036 +0100
+++ /var/tmp/diff_new_pack.6iYAWI/_new 2026-02-21 21:01:30.731787036 +0100
@@ -26,7 +26,7 @@
# Version of SELinux we were using
%define selinux_policyver %(rpm -q selinux-policy --qf '%%{version}')
Name: container-selinux
-Version: 2.245.0
+Version: 2.246.0
Release: 0
Summary: SELinux policies for container runtimes
License: GPL-2.0-only
++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.6iYAWI/_old 2026-02-21 21:01:30.787789332 +0100
+++ /var/tmp/diff_new_pack.6iYAWI/_new 2026-02-21 21:01:30.791789496 +0100
@@ -1,6 +1,6 @@
<servicedata>
<service name="tar_scm">
<param
name="url">https://github.com/containers/container-selinux.git</param>
- <param
name="changesrevision">3f7c37e93e172f531de233f40a58a1b8ec6ff17d</param></service></servicedata>
+ <param
name="changesrevision">521cf8c56e8df7cd6809571ed9e796b495ceaa71</param></service></servicedata>
(No newline at EOF)
++++++ container-selinux-2.245.0.tar.xz -> container-selinux-2.246.0.tar.xz
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/container-selinux-2.245.0/.packit.yaml
new/container-selinux-2.246.0/.packit.yaml
--- old/container-selinux-2.245.0/.packit.yaml 2025-12-15 16:33:19.000000000
+0100
+++ new/container-selinux-2.246.0/.packit.yaml 2026-02-19 13:11:16.000000000
+0100
@@ -74,9 +74,6 @@
- job: copr_build
trigger: commit
packages: [container-selinux-fedora]
- notifications:
- failure_comment:
- message: "podman-next COPR build failed. @containers/packit-build
please check."
branch: main
owner: rhcontainerbot
project: podman-next
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/container-selinux-2.245.0/Makefile
new/container-selinux-2.246.0/Makefile
--- old/container-selinux-2.245.0/Makefile 2025-12-15 16:33:19.000000000
+0100
+++ new/container-selinux-2.246.0/Makefile 2026-02-19 13:11:16.000000000
+0100
@@ -37,3 +37,16 @@
install.udica-templates:
install -dp $(DESTDIR)$(SHAREDIR)/udica/templates
install -pm 644 udica-templates/*.cil
$(DESTDIR)$(SHAREDIR)/udica/templates
+
+.PHONY: validate-xml
+validate-xml:
+ @echo "Validating XML in policy files..."
+ @hash xmllint 2>/dev/null || { echo "Error: xmllint not found. Please
install libxml2." >&2; exit 1; }
+ @test -d $(SHAREDIR)/selinux/devel/include/support || { echo "Error:
selinux-policy-devel not properly installed." >&2; exit 1; }
+ @tmpdir=$$(mktemp -d) && \
+ echo "Generating XML from policy files..." && \
+ python3 $(SHAREDIR)/selinux/devel/include/support/segenxml.py -w -m
./$(TARGETS) > "$$tmpdir/$(TARGETS).xml" || { echo "Error: Failed to generate
XML." >&2; rm -rf "$$tmpdir"; exit 1; } && \
+ echo "Validating generated XML..." && \
+ xmllint --noout "$$tmpdir/$(TARGETS).xml" || { echo "Error: XML
validation failed." >&2; rm -rf "$$tmpdir"; exit 1; } && \
+ echo "XML validation successful." && \
+ rm -rf "$$tmpdir"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/container-selinux-2.245.0/OWNERS
new/container-selinux-2.246.0/OWNERS
--- old/container-selinux-2.245.0/OWNERS 2025-12-15 16:33:19.000000000
+0100
+++ new/container-selinux-2.246.0/OWNERS 2026-02-19 13:11:16.000000000
+0100
@@ -1,5 +1,6 @@
approvers:
- - haircommander
+ - haircommander
+ - jankaluza
- lsm5
- rhatdan
- wrabcak
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/container-selinux-2.245.0/container.if
new/container-selinux-2.246.0/container.if
--- old/container-selinux-2.245.0/container.if 2025-12-15 16:33:19.000000000
+0100
+++ new/container-selinux-2.246.0/container.if 2026-02-19 13:11:16.000000000
+0100
@@ -418,6 +418,25 @@
########################################
## <summary>
+## Write container PID fifo files.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`container_write_pid_fifo_files',`
+ gen_require(`
+ type container_var_run_t;
+ ')
+
+ files_search_pids($1)
+ write_fifo_files_pattern($1, container_var_run_t, container_var_run_t)
+')
+
+########################################
+## <summary>
## Execute container server in the container domain.
## </summary>
## <param name="domain">
@@ -1066,3 +1085,21 @@
files_type($1)
files_mountpoint($1)
')
+
+#######################################
+## <summary>
+## Send null signals to container.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access
+## </summary>
+## </param>
+#
+interface(`container_signull',`
+ gen_require(`
+ type container_t;
+ ')
+
+ allow $1 container_t:process signull;
+')
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/container-selinux-2.245.0/container.te
new/container-selinux-2.246.0/container.te
--- old/container-selinux-2.245.0/container.te 2025-12-15 16:33:19.000000000
+0100
+++ new/container-selinux-2.246.0/container.te 2026-02-19 13:11:16.000000000
+0100
@@ -1,4 +1,4 @@
-policy_module(container, 2.245.0)
+policy_module(container, 2.246.0)
gen_require(`
class passwd rootok;
@@ -86,7 +86,7 @@
## <desc>
## <p>
## Allow containers to read shared public files
-## (public_content_t & public_content_rw_t)
+## (public_content_t & public_content_rw_t)
## </p>
## </desc>
gen_tunable(container_read_public_content, false)
@@ -337,7 +337,7 @@
manage_sock_files_pattern(container_runtime_domain, container_var_run_t,
container_var_run_t)
manage_lnk_files_pattern(container_runtime_domain, container_var_run_t,
container_var_run_t)
files_pid_filetrans(container_runtime_domain, container_var_run_t, { dir file
lnk_file sock_file })
-files_tmp_filetrans(container_runtime_domain, container_var_run_t, { dir file
lnk_file sock_file })
+files_tmp_filetrans(container_runtime_domain, container_var_run_t, { dir
fifo_file file lnk_file sock_file })
allow container_runtime_domain container_var_run_t:dir_file_class_set
relabelfrom;
allow container_runtime_domain container_devpts_t:chr_file { relabelfrom
rw_chr_file_perms setattr_chr_file_perms };
@@ -1365,8 +1365,8 @@
allow container_t proc_t:filesystem remount;
-# Allow containers to access shared runtime directories for OCI runtime
optimizations
-allow container_t container_var_run_t:dir list_dir_perms;
+# Allow containers to access and mount on shared runtime directories for OCI
runtime optimizations
+allow container_t container_var_run_t:dir { list_dir_perms mounton };
# Container kvm - Policy for running kata containers
container_domain_template(container_kvm, container)
@@ -1500,6 +1500,8 @@
term_mount_pty_fs(container_engine_t)
term_use_generic_ptys(container_engine_t)
+corenet_rw_tun_tap_dev(container_engine_t)
+
allow container_engine_t container_file_t:chr_file mounton;
allow container_engine_t filesystem_type:{dir file} mounton;
allow container_engine_t proc_kcore_t:file mounton;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/container-selinux-2.245.0/plans/main.fmf
new/container-selinux-2.246.0/plans/main.fmf
--- old/container-selinux-2.245.0/plans/main.fmf 2025-12-15
16:33:19.000000000 +0100
+++ new/container-selinux-2.246.0/plans/main.fmf 2026-02-19
13:11:16.000000000 +0100
@@ -21,6 +21,10 @@
discover+:
test: /test/basic_check
+/xmllint_validation:
+ discover+:
+ test: /test/xmllint_validation
+
/podman_rootful_system:
discover+:
test: /test/podman_rootful_system
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/container-selinux-2.245.0/test/main.fmf
new/container-selinux-2.246.0/test/main.fmf
--- old/container-selinux-2.245.0/test/main.fmf 2025-12-15 16:33:19.000000000
+0100
+++ new/container-selinux-2.246.0/test/main.fmf 2026-02-19 13:11:16.000000000
+0100
@@ -13,6 +13,13 @@
semodule -B
rpm -Vqf /var/lib/selinux/*/active/modules/200/container
+/xmllint_validation:
+ summary: Validate XML in SELinux policy files
+ require+:
+ - libxml2
+ - selinux-policy-devel
+ test: make -C .. validate-xml
+
/podman_rootful_system:
summary: Run SELinux specific Podman system tests
test: bash ./podman-rootful-tests.sh