@@ -1209,6 +1209,32 @@ spec:
1209
1209
Note that this field cannot be set when spec.os.name is windows.
1210
1210
format : int64
1211
1211
type : integer
1212
+ seLinuxChangePolicy :
1213
+ description : |-
1214
+ seLinuxChangePolicy defines how the container's SELinux label is applied to all volumes used by the Pod.
1215
+ It has no effect on nodes that do not support SELinux or to volumes does not support SELinux.
1216
+ Valid values are "MountOption" and "Recursive".
1217
+
1218
+ "Recursive" means relabeling of all files on all Pod volumes by the container runtime.
1219
+ This may be slow for large volumes, but allows mixing privileged and unprivileged Pods sharing the same volume on the same node.
1220
+
1221
+ "MountOption" mounts all eligible Pod volumes with `-o context` mount option.
1222
+ This requires all Pods that share the same volume to use the same SELinux label.
1223
+ It is not possible to share the same volume among privileged and unprivileged Pods.
1224
+ Eligible volumes are in-tree FibreChannel and iSCSI volumes, and all CSI volumes
1225
+ whose CSI driver announces SELinux support by setting spec.seLinuxMount: true in their
1226
+ CSIDriver instance. Other volumes are always re-labelled recursively.
1227
+ "MountOption" value is allowed only when SELinuxMount feature gate is enabled.
1228
+
1229
+ If not specified and SELinuxMount feature gate is enabled, "MountOption" is used.
1230
+ If not specified and SELinuxMount feature gate is disabled, "MountOption" is used for ReadWriteOncePod volumes
1231
+ and "Recursive" for all other volumes.
1232
+
1233
+ This field affects only Pods that have SELinux label set, either in PodSecurityContext or in SecurityContext of all containers.
1234
+
1235
+ All Pods that use the same volume should use the same seLinuxChangePolicy, otherwise some pods can get stuck in ContainerCreating state.
1236
+ Note that this field cannot be set when spec.os.name is windows.
1237
+ type : string
1212
1238
seLinuxOptions :
1213
1239
description : |-
1214
1240
The SELinux context to be applied to all containers.
@@ -2511,6 +2537,32 @@ spec:
2511
2537
Note that this field cannot be set when spec.os.name is windows.
2512
2538
format : int64
2513
2539
type : integer
2540
+ seLinuxChangePolicy :
2541
+ description : |-
2542
+ seLinuxChangePolicy defines how the container's SELinux label is applied to all volumes used by the Pod.
2543
+ It has no effect on nodes that do not support SELinux or to volumes does not support SELinux.
2544
+ Valid values are "MountOption" and "Recursive".
2545
+
2546
+ "Recursive" means relabeling of all files on all Pod volumes by the container runtime.
2547
+ This may be slow for large volumes, but allows mixing privileged and unprivileged Pods sharing the same volume on the same node.
2548
+
2549
+ "MountOption" mounts all eligible Pod volumes with `-o context` mount option.
2550
+ This requires all Pods that share the same volume to use the same SELinux label.
2551
+ It is not possible to share the same volume among privileged and unprivileged Pods.
2552
+ Eligible volumes are in-tree FibreChannel and iSCSI volumes, and all CSI volumes
2553
+ whose CSI driver announces SELinux support by setting spec.seLinuxMount: true in their
2554
+ CSIDriver instance. Other volumes are always re-labelled recursively.
2555
+ "MountOption" value is allowed only when SELinuxMount feature gate is enabled.
2556
+
2557
+ If not specified and SELinuxMount feature gate is enabled, "MountOption" is used.
2558
+ If not specified and SELinuxMount feature gate is disabled, "MountOption" is used for ReadWriteOncePod volumes
2559
+ and "Recursive" for all other volumes.
2560
+
2561
+ This field affects only Pods that have SELinux label set, either in PodSecurityContext or in SecurityContext of all containers.
2562
+
2563
+ All Pods that use the same volume should use the same seLinuxChangePolicy, otherwise some pods can get stuck in ContainerCreating state.
2564
+ Note that this field cannot be set when spec.os.name is windows.
2565
+ type : string
2514
2566
seLinuxOptions :
2515
2567
description : |-
2516
2568
The SELinux context to be applied to all containers.
@@ -3974,6 +4026,32 @@ spec:
3974
4026
Note that this field cannot be set when spec.os.name is windows.
3975
4027
format : int64
3976
4028
type : integer
4029
+ seLinuxChangePolicy :
4030
+ description : |-
4031
+ seLinuxChangePolicy defines how the container's SELinux label is applied to all volumes used by the Pod.
4032
+ It has no effect on nodes that do not support SELinux or to volumes does not support SELinux.
4033
+ Valid values are "MountOption" and "Recursive".
4034
+
4035
+ "Recursive" means relabeling of all files on all Pod volumes by the container runtime.
4036
+ This may be slow for large volumes, but allows mixing privileged and unprivileged Pods sharing the same volume on the same node.
4037
+
4038
+ "MountOption" mounts all eligible Pod volumes with `-o context` mount option.
4039
+ This requires all Pods that share the same volume to use the same SELinux label.
4040
+ It is not possible to share the same volume among privileged and unprivileged Pods.
4041
+ Eligible volumes are in-tree FibreChannel and iSCSI volumes, and all CSI volumes
4042
+ whose CSI driver announces SELinux support by setting spec.seLinuxMount: true in their
4043
+ CSIDriver instance. Other volumes are always re-labelled recursively.
4044
+ "MountOption" value is allowed only when SELinuxMount feature gate is enabled.
4045
+
4046
+ If not specified and SELinuxMount feature gate is enabled, "MountOption" is used.
4047
+ If not specified and SELinuxMount feature gate is disabled, "MountOption" is used for ReadWriteOncePod volumes
4048
+ and "Recursive" for all other volumes.
4049
+
4050
+ This field affects only Pods that have SELinux label set, either in PodSecurityContext or in SecurityContext of all containers.
4051
+
4052
+ All Pods that use the same volume should use the same seLinuxChangePolicy, otherwise some pods can get stuck in ContainerCreating state.
4053
+ Note that this field cannot be set when spec.os.name is windows.
4054
+ type : string
3977
4055
seLinuxOptions :
3978
4056
description : |-
3979
4057
The SELinux context to be applied to all containers.
@@ -5230,6 +5308,32 @@ spec:
5230
5308
Note that this field cannot be set when spec.os.name is windows.
5231
5309
format : int64
5232
5310
type : integer
5311
+ seLinuxChangePolicy :
5312
+ description : |-
5313
+ seLinuxChangePolicy defines how the container's SELinux label is applied to all volumes used by the Pod.
5314
+ It has no effect on nodes that do not support SELinux or to volumes does not support SELinux.
5315
+ Valid values are "MountOption" and "Recursive".
5316
+
5317
+ "Recursive" means relabeling of all files on all Pod volumes by the container runtime.
5318
+ This may be slow for large volumes, but allows mixing privileged and unprivileged Pods sharing the same volume on the same node.
5319
+
5320
+ "MountOption" mounts all eligible Pod volumes with `-o context` mount option.
5321
+ This requires all Pods that share the same volume to use the same SELinux label.
5322
+ It is not possible to share the same volume among privileged and unprivileged Pods.
5323
+ Eligible volumes are in-tree FibreChannel and iSCSI volumes, and all CSI volumes
5324
+ whose CSI driver announces SELinux support by setting spec.seLinuxMount: true in their
5325
+ CSIDriver instance. Other volumes are always re-labelled recursively.
5326
+ "MountOption" value is allowed only when SELinuxMount feature gate is enabled.
5327
+
5328
+ If not specified and SELinuxMount feature gate is enabled, "MountOption" is used.
5329
+ If not specified and SELinuxMount feature gate is disabled, "MountOption" is used for ReadWriteOncePod volumes
5330
+ and "Recursive" for all other volumes.
5331
+
5332
+ This field affects only Pods that have SELinux label set, either in PodSecurityContext or in SecurityContext of all containers.
5333
+
5334
+ All Pods that use the same volume should use the same seLinuxChangePolicy, otherwise some pods can get stuck in ContainerCreating state.
5335
+ Note that this field cannot be set when spec.os.name is windows.
5336
+ type : string
5233
5337
seLinuxOptions :
5234
5338
description : |-
5235
5339
The SELinux context to be applied to all containers.
0 commit comments