Replies: 3 comments 1 reply
-
|
One thing that seems to work is just copying |
Beta Was this translation helpful? Give feedback.
-
|
There are implementation aspects that make downstream customization hard. Bottlerocket's policy is currently written to adds sets of permissions to sets of types, and also to deny sets of permissions to other sets of types. These sets can't be changed downstream and the deny rules can't be relaxed. The easier case would be to support file labeling only - e.g. a variant could express that One of the motivations for #128 was to support Kata as a runtime, and there we concluded that it'd be simpler to add support for Kata to the core kit policy. Ideally we'd just upstream the changes needed for criu to work. If it's invoked via a containerd shim, it should be keeping In lieu of that, the safest way in terms of alerting you to changes would be a downstream package with: Then copy the CIL files from where they're installed, apply a patch, rebuild the policy, and install the new policy and modules to the build root. After that you should only need to revisit it when the patch fails to apply because context has changed. |
Beta Was this translation helpful? Give feedback.
-
|
@ctrox , see #4731 (comment) for the current thoughts on superpowered bootstrap containers. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi, I'm trying to get zeropod or more specifically
criuto run on bottlerocket and I'm running into some selinux denials. Is it possible to create a package that adds selinux policies? I managed to get everything running by forkingbottlerocket-core-kitand adding my policy topackages/selinux-policy/but I don't really want to maintain that as even just building the core kit is quite heavy.I found this issue which lead me to believe that it might not be possible but maybe something changed in the meantime?
Beta Was this translation helpful? Give feedback.
All reactions