mirror of
https://github.com/containers/podman.git
synced 2025-05-21 17:16:22 +08:00
Don't relabel volumes if running in a privileged container
Docker does not relabel this content, and openstack is running containers in this manner. There is a penalty for doing this on each container, that is not worth taking on a disable SELinux container. Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
@ -376,8 +376,14 @@ func (c *Container) generateSpec(ctx context.Context) (*spec.Spec, error) {
|
||||
case "z":
|
||||
fallthrough
|
||||
case "Z":
|
||||
if err := label.Relabel(m.Source, c.MountLabel(), label.IsShared(o)); err != nil {
|
||||
return nil, err
|
||||
if c.MountLabel() != "" {
|
||||
if c.ProcessLabel() != "" {
|
||||
if err := label.Relabel(m.Source, c.MountLabel(), label.IsShared(o)); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
} else {
|
||||
logrus.Infof("Not relabeling volume %q in container %s as SELinux is disabled", m.Source, c.ID())
|
||||
}
|
||||
}
|
||||
|
||||
default:
|
||||
|
@ -191,5 +191,33 @@ function check_label() {
|
||||
is "$output" "Error.*: \`/proc/thread-self/attr/exec\`: OCI runtime error: unable to assign security attribute" "useful diagnostic"
|
||||
}
|
||||
|
||||
@test "podman selinux: check relabel" {
|
||||
skip_if_no_selinux
|
||||
|
||||
LABEL="system_u:object_r:tmp_t:s0"
|
||||
tmpdir=$PODMAN_TMPDIR/vol
|
||||
touch $tmpdir
|
||||
chcon -vR ${LABEL} $tmpdir
|
||||
ls -Z $tmpdir
|
||||
|
||||
run_podman run -v $tmpdir:/test $IMAGE cat /proc/self/attr/current
|
||||
level=$(secon -l $output)
|
||||
run ls -dZ ${tmpdir}
|
||||
is "$output" ${LABEL} "No Relabel Correctly"
|
||||
|
||||
run_podman run -v $tmpdir:/test:Z --security-opt label=disable $IMAGE cat /proc/self/attr/current
|
||||
level=$(secon -l $output)
|
||||
run ls -dZ $tmpdir
|
||||
is "$output" ${LABEL} "No Privileged Relabel Correctly"
|
||||
|
||||
run_podman run -v $tmpdir:/test:Z $IMAGE cat /proc/self/attr/current
|
||||
level=$(secon -l $output)
|
||||
run ls -dZ $tmpdir
|
||||
is "$output" "system_u:object_r:container_file_t:$level" "Confined Relabel Correctly"
|
||||
|
||||
run_podman run -v $tmpdir:/test:z $IMAGE cat /proc/self/attr/current
|
||||
run ls -dZ $tmpdir
|
||||
is "$output" "system_u:object_r:container_file_t:s0" "Shared Relabel Correctly"
|
||||
}
|
||||
|
||||
# vim: filetype=sh
|
||||
|
Reference in New Issue
Block a user