Rootless Podman in rootless podman without disabling SELinux? #19813
Unanswered
robertguetzkow
asked this question in
Q&A
Replies: 2 comments 3 replies
-
Some initial tests seem to work fine without any changes to SELinux. I'd be curious when this is actually required. |
Beta Was this translation helpful? Give feedback.
0 replies
-
Depending on what the container within a container is doing, it could break SELinux rules. |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I'm interested in running podman in podman (PINP) for CI. The use case is that the pipeline itself runs inside a podman container and developers may wish to start containers as part of the pipeline, e.g. for testing their containerized application. I would like to make this setup reasonably secure, but according to the article "How to use Podman inside of a container" disabling SELinux is a prerequisite for rootless podman in rootless podman. Ideally, I would not want to expose the host or other containers to unnecessary risks, may this be accidental or intentional attempts to circumvent the container isolation. Since the article is from 2021, I thought I'd ask whether there have been changes in the meantime.
Thank you for developing this nice software!
Beta Was this translation helpful? Give feedback.
All reactions