-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
In Podman or Docker: Permission denied on SELinux machines #14787
Comments
this seems reasonable, do you want to PR this ? |
the other possible improvment here is to check that the user is root and/or is able to chown |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. It will be closed in the next 7 days unless it is tagged "help wanted" or "no stalebot" or other activity occurs. Thank you for your contributions. |
@rrichardson this should be resolved in #15115 can you confirm |
I'll take a look today or tomorrow. Thanks.
…On Tue, Mar 2, 2021 at 8:02 PM phlax ***@***.***> wrote:
@rrichardson <https://github.com/rrichardson> this should be resolved in
#15115 <#15115> can you confirm
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#14787 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAA6KC5L6WHVB2GZY444F63TBWYFHANCNFSM4WNMUYKQ>
.
|
@phlax - Using the latest envoyproxy/envoy-dev image, I have verified that the non-root podman execution works correctly.
Running as a non-privileged user (that owns the /var/envoy directory, it was able to run, write to stdout/stderr and load the config. |
brilliant - shall we close this ticket ? |
@rrichardson @phlax I still get this issue when I deploy this to cloud run on Google cloud. Any workarounds for me ? Stuck on this for a long time now :( Thanks in advance |
Permissions issues when running in Podman or Containerd (DockerCE)
Description: When starting envoy in podman or docker (as a UID other than 0)
Presumably it's complaining about this line : https://github.com/envoyproxy/envoy/blob/main/ci/docker-entrypoint.sh#L26
Even if you run as root, SELinux takes exception to a container changing ownership of stdout and stderr.
I haven't found a more elegant workaround than adding this flag in podman:
That's a bit of a blunt hammer. There is probably a more precise approach.
I think on non-root podman with cgroupsv2, the
chown /dev/std*
approach is probably not needed at all, because podman will give the container its very own FDs that pretend to be in, out and err. Maybe in this script we should check the ownership before attempting to change them?Repro steps:
run:
The text was updated successfully, but these errors were encountered: