Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add SELinux policy #50

Open
Hu6li opened this issue Aug 28, 2023 · 1 comment
Open

Add SELinux policy #50

Hu6li opened this issue Aug 28, 2023 · 1 comment

Comments

@Hu6li
Copy link
Contributor

Hu6li commented Aug 28, 2023

If one tries to run hashr using Linux with enforced SELinux, there will be an access violation when it comes to the preprocessing.
This is due to incompatibility in SELinux contexts of /tmp and docker

AVC Events:
scontext=system_u:system_r:container_t:
tcontext=unconfined_u:object_r:user_tmp_t

General solutions (maybe there are more):

  1. Custom SELinux policy
  2. Change default preprocessing directory or provide flag to do so
  3. Disable SELinux: Don't think this should be a general solution
@meeehow
Copy link
Collaborator

meeehow commented Dec 4, 2023

Thanks for filing this and sorry for late reply. I like option 2) the most, having this configured via a flag makes most sense. I'll see if I can add the flag in the next couple of days.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants