Type: | BUG |
Impact: | NA |
Release Date: | 2022-05-03 |
olcne
[1.5.0-2]
- Upgrade Helm to 3.7.1-2
[1.5.0-2]
- fix null pointer exception in systemd service state validation
[1.5.0-1]
- Introduce support for compact Kubernetes clusters
- Introduce MetalLB
- Introduce Oracle Cloud Infrastructure Cloud Controller Manager
- Improved log messages in Platform API Server and Platform Agent
- Upgrade Kubernetes to 1.22.8
- Upgrade Istio to 1.13.2
- Renamed the oci-csi module to oci-ccm
[1.5.0-20.alpha]
- Update istio-1.13.2 grafana to 7.5.15
[1.5.0-14.alpha]
- Metallb fix
[1.5.0-11.alpha]
- Remove module directories when olcne rpm is uninstalled
[1.5.0-10.alpha]
- OCI CCM 0.13.0
[1.5.0-9.alpha]
- Reworked log messages
[1.5.0-8.alpha]
- Update Istio to 1.13.2(prometheus-2.31.1, grafana-8.4.6)
[1.5.0-7.alpha]
- Update Istio to 1.12.6(prometheus-2.30.1, grafana-7.5.15)
[1.5.0-6.alpha]
- Update to k8s 1.22 with golang 1.17
[1.5.0-5.alpha]
- Update internal docs for oci-ccm module
[1.5.0-4.alpha]
- Extend oci-ccm module to support load balancer
[1.5.0-3.alpha]
- Firewall pre-req
[1.5.0-2.alpha]
- Ensure that config map settings needed by metallb is preserved during k8s upgrade
[1.5.0-1.alpha]
- Metallb module
[1.4.1-14]
- Added 1.4 extra images to registry-image-helper.sh script
[1.4.1-13]
- Update sudoers file and changed its permissions to '0440'
[1.4.1-12]
- Update olcne-kubernetes.md file for 'compact' flag
[1.4.1-11]
- Ensure that the order of items in an upgraded config file is stable with respect to the original file
[1.4.1-10]
- Ensure that old olcnectl config files are upgraded
[1.4.1-9]
- Rename oci-csi module to oci-ccm and add support for oci-ccm loadbalancer creation
[1.4.1-8]
- Make 'compact' flag updatable
[1.4.1-7]
- Introduce 'compact' that enables control-plane nodes to run any workloads
[1.4.1-6]
- Ability to label 1 or more kubernetes nodes
[1.4.1-5]
- Fixed a bug where specifying a port in the container-registry argument
to the Kubernetes module would result in pods not being able to start.
[1.4.1-4]
- Update helm to 3.7.1
[1.4.1-3]
- Update versions to Istio-1.12.2, prometheus-2.31.1 and grafana-7.5.11
[1.4.1-2]
- Allow loadbalancer to be configured regardless of security list mode
[1.4.0-4]
- Fix bug in initialising certs manager when environment name not mentioned
[1.4.0-3]
- Fix bug in fetching report for multi-environment
[1.4.0-2]
- Pause image is 3.4.1
[1.4.0-1]
- CSI plugin
- Reports feature
- Kubernetes-1.20.6 to Kubernetes-1.21.6 upgrade
- Istio-1.9.4 to Istio-1.11.4 upgrade
- Component upgrades
- Config file feature
[1.3.0-13]
- Fix iptables issue when running on OL7 host using OL8 image
[1.3.0-12]
- Address CVE's ISTIO-SECURITY-2021-003, ISTIO-SECURITY-2021-005, ISTIO-SECURITY-2021-006, ISTIO-SECURITY-2021-007
[1.3.0-11]
- Fixed yaml file to stop olcne-nginx and keepalived services at uninstall [Orabug: 32296282]
[1.3.0-10]
- Fixed missing double semicolon in registry image helper
[1.3.0-9]
istio
[1.12.6-1]
- Addresses CVE-2022-24726, CVE-2022-24921
istio
[1.13.2-1]
- Added Oracle specific files for 1.13.2-1
olcne-selinux
kubernetes
[1.22.8-1]
- Added Oracle specific build files for Kubernetes
coredns
[1.8.4-1]
- Added Oracle specific build files
etcd
[3.4.13-3]
- Updated THIRD_PARTY_LICENSES.txt generated using pls attribution-helper
[3.4.13-2]
- Added buildhost variable
- updated golang version
[3.4.13-1]
- Added Oracle specific build files
kubernetes-cni-plugins
[1.0.1-3]
- Updated THIRD_PARTY_LICENSES.txt generated using pls attribution-helper
[1.0.1-2]
- Add flannel-cni-plugins as a dependency
[1.0.1-1]
- Added Oracle specific build files for Kubernetes CNI Plugins
flannel-cni-plugin
[1.0.1-1]
- Added Oracle specific build files for Flannel CNI Plugins
kubernetes-cni
[1.0.1-2]
- Updated THIRD_PARTY_LICENSES.txt generated using pls attribution-helper
[1.0.1-1]
- Added Oracle specific build files for Kubernetes CNI
conmon
[3:2.0.26-2]
- updated golang version
- added buildhost variable
[3:2.0.26-1]
- Added build scripts
cri-o
[1.22.3-2]
- Updated THIRD_PARTY_LICENSES.txt generated using pls attribution-helper
[1.22.3-1]
- Added Oracle Specifile Files for cri-o
cri-tools
[1.22.0-2]
- Updated THIRD_PARTY_LICENSES.txt generated using pls attribution-helper
[1.22.0-1]
- Added Oracle Specific Build Files for cri-tools
kata-proxy
[1.12.1-4]
- Updated THIRD_PARTY_LICENSES.txt generated using pls attribution-helper
[1.12.1-3]
- updated golang version
- added buildhost variable
[1.12.1-2]
- Golang 1.15.9
[1.12.1-1]
- Added Oracle Specific Build Files for kata-proxy
kata-runtime
[1.12.1-4]
- Updated THIRD_PARTY_LICENSES.txt generated using pls attribution-helper
[1.12.1-3]
- updated golang version
- added buildhost variable
[1.12.1-2]
- Golang 1.15.9
[1.12.1-1]
- Added Oracle Specific Files For kata-runtime
kata-shim
[1.12.1-4]
- Updated THIRD_PARTY_LICENSES.txt generated using pls attribution-helper
[1.12.1-3]
- updated golang version
- added buildhost variable
[1.12.1-2]
- Golang 1.15.9
[1.12.1-1]
- Added Oracle Specific Build Files for kata-shim
kata-ksm-throttler
[1.12.1-4]
- Updated THIRD_PARTY_LICENSES.txt generated using pls attribution-helper
[1.12.1-3]
- updated golang version
- added buildhost variable
[1.12.1-2]
- Golang 1.15.9
[1.12.1-1]
- Added Oracle Specific Build Files for kata-ksm-throttler
kata-agent
[1.12.1-4]
- Updated THIRD_PARTY_LICENSES.txt generated using pls attribution-helper
[1.12.1-3]
- updated golang version
- added buildhost variable
[1.12.1-2]
- Golang 1.15.9
[1.12.1-1]
- Added Oracle Specific Build Files for kata-agent
kata-image
[1.12.1-3]
- updated golang version
- added buildhost variable
[1.12.1-2]
- Golang 1.15.9
[1.12.1-1]
- Added Oracle Specific Build Files for kata-image
yq
[3.4.0-3]
- updated golang version
- added buildhost variable
[3.4.0-2]
- Address CVE-2021-27918
[3.4.0-1]
- Added Oracle specific build files
kata
[1.12.1-4]
- update kata-image versions
- update kernel-uek-container version to kernel-uek-container-5.4.17-2136.306.1.3
[1.21.1-3]
- Support k8s 1.21.6
- updated kernel-uek-container version
- updated kata-image versions
- added buildhost variable
[1.12.1-2]
- Golang 1.15.9
[1.12.1-1]
- Updated to kata 1.12.1
- Updated guest kernel (kernel-uek-container) minimum version to UEK6U2 (5.4.17-2102.200.7)
helm
[3.7.1-2]
- Updated THIRD_PARTY_LICENSES.txt generated using pls attribution-helper
[3.7.1-1]
- Added Oracle Specific build Files
container-selinux
[2:2.119.2-1.911c772]
- fix #1811759
[2:2.119.1-2.c57a6f9]
- update to 2.119.1 RHEL7 branch
- Related: RHELPLAN-26239
[2:2.107-3]
- use 2.107 in RHEL7u7
- add build.sh script
[2:2.107-2]
- Resolves: #1626215
[2:2.107-1]
- bump to v2.107
[2:2.99-1]
- built commit b13d03b
[2:2.95-2]
- rebase
[2:2.84-2]
- rebase
[2.77-1]
- backported fixes from upstream
[2.76-1]
- Allow containers to use fuse file systems by default
- Allow containers to sendto dgram socket of container runtimes
- Needed to run container runtimes in notify socket unit files.
[2.74-1]
- Allow containers to setexec themselves
[2:2.73-3]
- tweak macro for fedora - applies to rhel8 as well
[2:2.73-2]
- moved changelog entries:
- Define spc_t as a container_domain, so that container_runtime will transition
to spc_t even when setup with nosuid.
- Allow container_runtimes to setattr on callers fifo_files
- Fix restorecon to not error on missing directory
[2.69-3]
- Make sure we pull in the latest selinux-policy
[2.69-2]
- Add map support to container-selinux for RHEL 7.5
- Dontudit attempts to write to kernel_sysctl_t
[2.68-1]
- Add label for /var/lib/origin
- Add customizable_file_t to customizable_types
[2.67-1]
- Add policy for container_logreader_t
[2.66-1]
- Allow dnsmasq to dbus chat with spc_t
[2.64-1]
- Allow containers to create all socket classes
[2.62-1]
- Label overlay directories under /var/lib/containers/ correctly
[2.61-1]
- Allow spc_t to load kernel modules from inside of container
[2.60-1]
- Allow containers to list cgroup directories
- Transition for unconfined_service_t to container_runtime_t when executing container_runtime_exec_t.
[2.58-2]
- Run restorecon /usr/bin/podman in postinstall
[2.58-1]
- Add labels to allow podman to be run from a systemd unit file
[2.57-1]
- Set the version of SELinux policy required to the latest to fix build issues.
[2.56-1]
- Allow container_runtime_t to transition to spc_t over unlabeled files
[2.55-1]
Allow iptables to read container state
Dontaudit attempts from containers to write to /proc/self
Allow spc_t to change attributes on container_runtime_t fifo files
[2.52-1]
- Add better support for writing custom selinux policy for customer container domains.
[2.51-1]
- Allow shell_exec_t as a container_runtime_t entrypoint
[2.50-1]
- Allow bin_t as a container_runtime_t entrypoint
[2.49-1]
- Add support for MLS running container runtimes
- Add missing allow rules for running systemd in a container
[2.48-1]
- Update policy to match master branch
- Remove typebounds and replace with nnp_transition and nosuid_transition calls
[2.41-1]
- Add support to nnp_transition for container domains
- Eliminates need for typebounds.
[2.40-1]
- Allow container_runtime_t to use user ttys
- Fixes bounds check for container_t
[2.39-1]
- Allow container runtimes to use interited terminals. This helps
satisfy the bounds check of container_t versus container_runtime_t.
[2.38-1]
- Allow container runtimes to mmap container_file_t devices
- Add labeling for rhel push plugin
[2.37-1]
- Allow containers to use inherited ttys
- Allow ostree to handle labels under /var/lib/containers/ostree
[2.36-1]
- Allow containers to relabelto/from all file types to container_file_t
[2.35-1]
- Allow container to map chr_files labeled container_file_t
[2.34-1]
- Dontaudit container processes getattr on kernel file systems
[2.33-1]
- Allow containers to read /etc/resolv.conf and /etc/hosts if volume
- mounted into container.
[2.32-1]
- Make sure users creating content in /var/lib with right labels
[2.31-1]
- Allow the container runtime to dbus chat with dnsmasq
- add dontaudit rules for container trying to write to /proc
[2.29-1]
- Add support for lxcd
- Add support for labeling of tmpfs storage created within a container.
[2.28-1]
- Allow a container to umount a container_file_t filesystem
[2.27-1]
- Allow container runtimes to work with the netfilter sockets
- Allow container_file_t to be an entrypoint for VM's
- Allow spc_t domains to transition to svirt_t
[2.24-1]
- Make sure container_runtime_t has all access of container_t
[2.23-1]
- Allow container runtimes to create sockets in tmp dirs
[2.22-1]
- Add additonal support for crio labeling.
[2.21-3]
- Fixup spec file conditionals
[2:2.21-2]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
[2.21-1]
- Allow containers to execmod on container_share_t files.
[2.20-2]
- Relabel runc and crio executables
[2.20-1]
- Allow container processes to getsession
[2:2.19-2.1]
- update release tag to isolate from 7.3
[2:2.19-1]
- Fix mcs transition problem on stdin/stdout/stderr
- Add labels for CRI-O
- Allow containers to use tunnel sockets
[2:2.15-1.1]
- Resolves: #1451289
- rebase to v2.15
- built @origin/RHEL-1.12 commit 583ca40
[2:2.10-2.1]
- Make sure we have a late enough version of policycoreutils
[2:2.10-1]
- Update to the latest container-selinux patch from upstream
- Label files under /usr/libexec/lxc as container_runtime_exec_t
- Give container_t access to XFRM sockets
- Allow spc_t to dbus chat with init system
- Allow containers to read cgroup configuration mounted into a container
[2:2.9-4]
- Resolves: #1425574
- built commit 79a6d70
[2:2.9-3]
- Resolves: #1420591
- built @origin/RHEL-1.12 commit 8f876c4
[2:2.9-2]
- built @origin/RHEL-1.12 commit 33cb78b
[2:2.8-2]
-
[2:2.7-1]
- built origin/RHEL-1.12 commit 21dd37b
[2:2.4-2]
- correct version-release in changelog entries
[2:2.4-1]
- Add typebounds statement for container_t from container_runtime_t
- We should only label runc not runc*
[2:2.3-1]
- Fix labeling on /usr/bin/runc.*
- Add sandbox_net_domain access to container.te
- Remove containers ability to look at /etc content
[2:2.2-4]
- use upstream's RHEL-1.12 branch, commit 56c32da for CentOS 7
[2:2.2-3]
- properly disable docker module in %post
[2:2.2-2]
- depend on selinux-policy-targeted
- relabel docker-latest* files as well
[2:2.2-1]
- bump to v2.2
- additional labeling for ocid
[2:2.0-2]
- install policy at level 200
- From: Dan Walsh
[2:2.0-1]
- Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a
standalone package)
- include projectatomic/RHEL-1.12 branch commit for building on centos/rhel
[2:1.12.4-29]
- new package (separated from docker)
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team