From 0d0ad59641a308450d694d4c2fb95303c64fabf8 Mon Sep 17 00:00:00 2001 From: Peter Hunt Date: Thu, 7 Mar 2019 12:52:54 -0500 Subject: Default to SELinux private label for play kube mounts Before, there were SELinux denials when a volume was bind-mounted by podman play kube. Partially fix this by setting the default private label for mounts created by play kube (with DirectoryOrCreate) For volumes mounted as Directory, the user will have to set their own SELinux permissions on the mount point also remove left over debugging print statement Signed-off-by: Peter Hunt --- docs/podman-play-kube.1.md | 2 ++ 1 file changed, 2 insertions(+) (limited to 'docs') diff --git a/docs/podman-play-kube.1.md b/docs/podman-play-kube.1.md index a9af961cd..a38abf35a 100644 --- a/docs/podman-play-kube.1.md +++ b/docs/podman-play-kube.1.md @@ -22,6 +22,8 @@ the ID of the new Pod is output. Ideally the input file would be one created by Podman (see podman-generate-kube(1)). This would guarantee a smooth import and expected results. +Note: HostPath volume types created by play kube will be given an SELinux private label (Z) + # OPTIONS: **--authfile** -- cgit v1.2.3-54-g00ecf