Can a podman container access the podman unix sock using a volume mounted without getting a permission denied ? #24302
Replies: 2 comments 2 replies
-
I will wait what the users will reply but that works if I pass as parameter |
Beta Was this translation helpful? Give feedback.
-
Permission denied will happen based on either SELinux or DAC. For SELinux you will need to disable enforcement for the container. --security-opt label=disabled For DAC, if the user owning the podman.sock is different then the user within the container, then it will be denied. You can try to play games with the group access on the socket and set the socket to 660. But you will need to make sure the group access for the user running podman leaks into the container --group-add keep-groups
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
When I mount the podman sock of the user 1000 within a container I got a "permission denied" when the application tries to access it using
export DOCKER_HOST="unix:///workdir/podman.sock"
Step to reproduce
Error
The permission denied is certainly related to the fact that the file is mounted using
root
Beta Was this translation helpful? Give feedback.
All reactions