We must not disable selinux
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Magnum |
In Progress
|
Critical
|
Jason Dunsmore |
Bug Description
In November, we merged this commit:
https:/
In doing so, we renamed a file to:
https:/
The script has been moved three times, so I don't have a history of who originally wrote it, but here is my objection:
We must not disable key security features of the Linux kernel. This particular feature is critically important to the security isolation of containers, and must remain enabled. Instead of disabling selinux, we must find out why the code does not work without it, and add the necessary labels to allow it to function while selinux is enabled.
Please find all places in Magnum where selinux is disabled, and eliminate them.
Changed in magnum: | |
milestone: | mitaka-3 → none |
assignee: | Corey O'Brien (coreypobrien) → nobody |
Changed in magnum: | |
assignee: | nobody → rajiv (rajiv-kumar) |
magnum/ templates/ swarm/fragments /disable- selinux. sh templates/ kubernetes/ fragments/ disable- selinux. sh
magnum/