-
Epic
-
Resolution: Done
-
Blocker
-
None
-
SPO and selinuxd RHEL-9 support
-
True
-
False
-
Not Selected
-
To Do
-
0% To Do, 0% In Progress, 100% Done
-
Approved
Epic Goal
- Support RHEL-9 cluster nodes
Why is this important?
- OCP is transitioning to RHEL-9 and because SPO puts the security profiles directly on the nodes, we need to make sure it keeps working
Scenarios
- As an OCP admin, I want to upgrade from OCP version based on RHEL-8 to an OCP version based on RHEL-9 while keeping my security profiles working
- As an OCP admin, I want to install a fresh OCP cluster based on RHEL-9 and use and record security profiles
Acceptance Criteria
- SPO and selinuxd must support both RHEL-8 and RHEL-9
- Our CI in the fork must test both
Dependencies (internal and external)
- OCP must be installable with RHEL-9 for us to be able to test the policies
Previous Work (Optional):
- The SPO upstream has been using the latest Fedora release, so at least for clean installs we have some idea
Open questions::
- Do we need to rebuild the selinxud container atop RHEL-9 or even keep both as long as OCP supports both RHEL-8 and RHEL-9?
Done Checklist
- CI - CI is running, tests are automated and merged.
- Release Enablement <link to Feature Enablement Presentation>
- DEV - Upstream code and tests merged: <link to meaningful PR or GitHub Issue>
- DEV - Upstream documentation merged: <link to meaningful PR or GitHub Issue>
- DEV - Downstream build attached to advisory: <link to errata>
- QE - Test plans in Polarion: <link or reference to Polarion>
- QE - Automated tests merged: <link or reference to automated tests>
- DOC - Downstream documentation merged: <link to meaningful PR>
- clones
-
CMP-1343 RHEL-9 support in compliance operator and content
- Closed