Podman权限问题导致的403报错思路与解决

问题

podman运行镜像,端口映射、卷映射无误,但在运行访问测试容器内http接口报错403.

查阅系统日志,存在多处容器相关的selinux访问被拒绝错误,sealert提示需要为几个进程的对象添加临时规则。

考虑是否为selinux问题,禁用se后解决,启用se后复现。

容器运行时增加--pivileged选项也可正常运行无报错。

分析

根据podman手册解释,在进行卷映射时,podman默认不更改宿主机的卷及文件的安全上下文标签,从而将导致容器访问宿主机文件时被se拦截报错。

解决

-v 路径后增加:Z 标签,手动指定podman更改宿主机的卷及文件的安全上下文标签

podman run -v host-dir:container-dir:Z 

参考链接

 

Labeling systems like SELinux require that proper labels are placed on volume content mounted into a container. Without a label, the security system might prevent the processes running inside the container from using the content. By default, Podman does not change the labels set by the OS.

To change a label in the container context, add either of two suffixes :z or :Z to the volume mount. These suffixes tell Podman to relabel file objects on the shared volumes. The z option tells Podman that two or more containers share the volume content. As a result, Podman labels the content with a shared content label. Shared volume labels allow all containers to read/write content. The Z option tells Podman to label the content with a private unshared label Only the current container can use a private volume. Relabeling walks the file system under the volume and changes the label on each file, if the volume has thousands of inodes, this process takes a long time, delaying the start of the container. If the volume was previously relabeled with the z option, Podman is optimized to not relabel a second time. If files are moved into the volume, then the labels can be manually change with the chcon -R container_file_t PATH command.

https://docs.podman.io/en/latest/markdown/podman-run.1.htmlicon-default.png?t=N6B9https://docs.podman.io/en/latest/markdown/podman-run.1.html

你可能感兴趣的:(web部署,podman)