Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable SELinux labeling on build container volume mounts #323

Merged
merged 2 commits into from
Dec 11, 2024

Conversation

mw-a
Copy link
Contributor

@mw-a mw-a commented Dec 11, 2024

At least with rootless podman on SELinux-enabled RedHat-based distributions, access to volume mounts breaks due to a default of enabling SELinux labeling from inside the container on those mounts. This prevents building of RPMs and DEBs.

Enable option --security-opt label=disable for calls to docker/podman run to disable SELinux labeling on volume mounts. The option is supposed to be supported by both. Verified for (rootless) podman.

Fixes #320

Checklist

  • This pr contains no AI generated code
  • make package has been run and succeeded

no influence on those, I guess:

  • cargo fmt has been run
  • cargo clippy has been run
  • A functionality test has been added
  • make test has been run and passes

mw-a and others added 2 commits December 11, 2024 04:55
At least with rootless podman on SELinux-enabled RedHat-based distributions,
access to volume mounts breaks due to a default of enabling SELinux labeling
from inside the container on those mounts. This prevents building of RPMs and
DEBs.

Enable option --security-opt label=disable for calls to docker/podman run to
disable SELinux labeling on volume mounts. The option is supposed to be
supported by both. Verified for (rootless) podman.
@dmulder dmulder merged commit 2fb7ca5 into himmelblau-idm:main Dec 11, 2024
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Contanerised RPM build fails on SELinux-enabled distro
2 participants