Skip to content

Commit c837b60

Browse files
Stephen Belangerclaude
andcommitted
docs: add SELinux note for Podman socket mounting
On Fedora/RHEL/SELinux systems, the container_t policy blocks connectto on container_runtime_t sockets. Add --security-opt label=disable to all Podman socket-mount examples and the podman-compose config. Verified during local integration test: SELinux denials appear in audit log without this option; the option resolves them. Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent 47234e3 commit c837b60

File tree

1 file changed

+11
-1
lines changed

1 file changed

+11
-1
lines changed

docs/content/docs/(getting-started)/docker.mdx

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -304,7 +304,7 @@ Spacebot supports both rootful and rootless Podman socket paths.
304304
**Rootful Podman** — start the socket service and mount it:
305305

306306
```bash
307-
systemctl enable --now podman.socket
307+
sudo systemctl enable --now podman.socket
308308
```
309309

310310
```bash
@@ -314,6 +314,7 @@ podman run -d \
314314
-e SPACEBOT_DEPLOYMENT=docker \
315315
-v spacebot-data:/data \
316316
-v /run/podman/podman.sock:/run/podman/podman.sock \
317+
--security-opt label=disable \
317318
-p 19898:19898 \
318319
ghcr.io/spacedriveapp/spacebot:slim
319320
```
@@ -332,13 +333,20 @@ podman run -d \
332333
-e XDG_RUNTIME_DIR=/run/user/$(id -u) \
333334
-v spacebot-data:/data \
334335
-v $XDG_RUNTIME_DIR/podman/podman.sock:$XDG_RUNTIME_DIR/podman/podman.sock \
336+
--security-opt label=disable \
335337
-p 19898:19898 \
336338
ghcr.io/spacedriveapp/spacebot:slim
337339
```
338340

339341
You can also set `DOCKER_HOST=unix:///path/to/podman.sock` to point Spacebot at
340342
any custom socket location.
341343

344+
> **SELinux note (Fedora, RHEL, and derivatives):** SELinux blocks containers
345+
> from connecting to the Podman socket by default. Add
346+
> `--security-opt label=disable` to the `podman run` command, or
347+
> `security_opt: [label=disable]` in your `podman-compose.yml`, when mounting
348+
> the socket.
349+
342350
### Podman Compose
343351

344352
```yaml
@@ -355,6 +363,8 @@ services:
355363
environment:
356364
- ANTHROPIC_API_KEY=${ANTHROPIC_API_KEY}
357365
- SPACEBOT_DEPLOYMENT=docker
366+
security_opt:
367+
- label=disable
358368
359369
volumes:
360370
spacebot-data:

0 commit comments

Comments
 (0)