SELinux policy for mounting socket #9860
Unanswered
matejvasek
asked this question in
Q&A
Replies: 3 comments 3 replies
-
As long as containers can not mess with each other sockets it should be totally acceptable IMO.. |
Beta Was this translation helpful? Give feedback.
0 replies
-
Sure just disable SELinux protections for the container and it should work fine. --security-opt label=disabled. |
Beta Was this translation helpful? Give feedback.
3 replies
-
@wrabcak Any ideas on extending udica to allow a leaked socket into a container to communicate. Basically we need ability to stream_connect_to and read/write socket perms on a confined domain. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
By default
podman
's Unix socket cannot be dialed from container when mounted to it.I know this is totally deliberate and for a good reasons. However I think that for rootless container is shouldn't be so bad, right?
There is a tool that needs that:
pack
.One workaround I can use is to run
podman
on TCP socket instead of Unix socket, still I wish I could use Unix socket.How can I do it? What SELinux policy / labels on socket would make it possible?
Beta Was this translation helpful? Give feedback.
All reactions