containers/udica
This repository contains a tool for generating SELinux security profiles for containers
PythonGPL-3.0
Issues
- 0
Dependency Dashboard
#123 opened by renovate - 6
- 0
Any plans to support Kata Containers?
#141 opened by FabienGhd - 9
While creating udica policy, getting error "Couldn't create policy: [Errno 2] No such file or directory"
#134 opened by skale-godaddy - 2
Create a library containing the template policy
#129 opened by quentin9696 - 0
- 1
Disable Dependabot after Renovate trial run
#125 opened by cevich - 1
There is a Typo where contexts should be context
#118 opened by arcardon - 1
lost network connectivity
#114 opened by TidyData - 0
Add "--device-access" option
#110 opened by vmojzis - 8
- 7
Any plans to support containerd?
#90 opened by perezjasonr - 0
- 6
Run time security for containers using udica
#75 opened by HariAccuknox - 4
- 1
- 6
- 1
- 6
- 8
- 2
Support --tmpfs mount
#83 opened by mikosa - 9
- 1
- 3
Cannot remove policies installed by previous version
#104 opened by laolux - 2
Lack of check that check presence of sections
#105 opened by WellIDKRealy - 2
Please push new build to CentOS AppStream
#71 opened by rufoa - 1
Add policy generation for fifo_files
#85 opened by PatrickLaneville - 4
- 4
Rename master branch to main branch
#89 opened by rhatdan - 2
SQL Client cannot connect to instance in web
#81 opened by Davidnet - 9
- 8
- 1
Meta task silently fails with permission error
#65 opened by cevich - 3
- 0
- 5
- 3
Pip installs templates in wrong place
#59 opened by gatoniel - 2
- 2
- 1
v0.1.9 not available on PyPI
#42 opened by AkihiroSuda - 8
Couldn't create policy: 'source'
#33 opened by s4s0l - 4
policy on sockets
#35 opened by roelandjansen - 3
if container triggers SELinux denials then audit2allow cannot generate policy from them
#8 opened by milosmalik - 0
- 3
- 8
- 0
port ranges are not supported
#16 opened by janzarsky - 0
created policy blocks access to /dev/null
#28 opened by laolux - 4
- 0
Invalid syntax when only using one template
#6 opened by vmojzis