@@ -113,7 +113,7 @@ enforced/disallowed:
113
113
</td>
114
114
</tr>
115
115
<tr>
116
- <td>AppArmor <em>(optional)</em> </td>
116
+ <td>AppArmor</td>
117
117
<td>
118
118
On supported hosts, the 'runtime/default' AppArmor profile is applied by default.
119
119
The baseline policy should prevent overriding or disabling the default AppArmor
@@ -124,14 +124,26 @@ enforced/disallowed:
124
124
</td>
125
125
</tr>
126
126
<tr>
127
- <td>SELinux <em>(optional)</em> </td>
127
+ <td>SELinux</td>
128
128
<td>
129
- Setting custom SELinux options should be disallowed .<br>
129
+ Setting the SELinux type is restricted, and setting a custom SELinux user or role option is forbidden .<br>
130
130
<br><b>Restricted Fields:</b><br>
131
- spec.securityContext.seLinuxOptions<br>
132
- spec.containers[*].securityContext.seLinuxOptions<br>
133
- spec.initContainers[*].securityContext.seLinuxOptions<br>
134
- <br><b>Allowed Values:</b> undefined/nil<br>
131
+ spec.securityContext.seLinuxOptions.type<br>
132
+ spec.containers[*].securityContext.seLinuxOptions.type<br>
133
+ spec.initContainers[*].securityContext.seLinuxOptions.type<br>
134
+ <br><b>Allowed Values:</b><br>
135
+ undefined/empty<br>
136
+ container_t<br>
137
+ container_init_t<br>
138
+ container_kvm_t<br>
139
+ <br><b>Restricted Fields:</b><br>
140
+ spec.securityContext.seLinuxOptions.user<br>
141
+ spec.containers[*].securityContext.seLinuxOptions.user<br>
142
+ spec.initContainers[*].securityContext.seLinuxOptions.user<br>
143
+ spec.securityContext.seLinuxOptions.role<br>
144
+ spec.containers[*].securityContext.seLinuxOptions.role<br>
145
+ spec.initContainers[*].securityContext.seLinuxOptions.role<br>
146
+ <br><b>Allowed Values:</b> undefined/empty<br>
135
147
</td>
136
148
</tr>
137
149
<tr>
0 commit comments