SELinux policy for mounting socket #9860
Unanswered
matejvasek
asked this question in
Q&A
Replies: 3 comments 3 replies
-
As long as containers can not mess with each other sockets it should be totally acceptable IMO.. |
Beta Was this translation helpful? Give feedback.
0 replies
-
Sure just disable SELinux protections for the container and it should work fine. --security-opt label=disabled. |
Beta Was this translation helpful? Give feedback.
3 replies
-
@wrabcak Any ideas on extending udica to allow a leaked socket into a container to communicate. Basically we need ability to stream_connect_to and read/write socket perms on a confined domain. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
By default
podman
's Unix socket cannot be dialed from container when mounted to it.I know this is totally deliberate and for a good reasons. However I think that for rootless container is shouldn't be so bad, right?
There is a tool that needs that:
pack
.One workaround I can use is to run
podman
on TCP socket instead of Unix socket, still I wish I could use Unix socket.How can I do it? What SELinux policy / labels on socket would make it possible?
Beta Was this translation helpful? Give feedback.
All reactions