Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"containerd" under RockyLinux 9 fails because of SELinux #27

Open
mnaser opened this issue Aug 5, 2024 · 2 comments
Open

"containerd" under RockyLinux 9 fails because of SELinux #27

mnaser opened this issue Aug 5, 2024 · 2 comments

Comments

@mnaser
Copy link
Member

mnaser commented Aug 5, 2024

https://ci.atmosphere.dev/t/atmosphere/build/3e64d174889744d4b096c9e7b1abf091

@mnaser
Copy link
Member Author

mnaser commented Aug 5, 2024

@fitbeard I think we might need help from your side on this, we have native VMs for CI which can let us things more reliably (from #26 )

@fitbeard
Copy link
Contributor

fitbeard commented Aug 5, 2024

@mnaser SELinux is more aggressive on RHEL9. It's in enforced mode by default (before on EL7/8 mode was permissive). My proposal would be to set SELinux to permissive mode for CI and leave real configuration for users. Users will almost always turn this off:(

Just pass this in a first place before other steps: sudo setenforce 0 or use real ansible:

- name: Put SELinux in permissive mode, logging actions that would be blocked.
  ansible.posix.selinux:
    policy: targeted
    state: permissive

or

- name: Disable SELinux
  ansible.posix.selinux:
    state: disabled

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants