Fedora 31 Server, podman and SELinux
-
Output 2 of 2 audit.log
type=AVC msg=audit(1583437489.158:324): avc: denied { setattr } for pid=1995 comm="chown" name="tkm.sh" dev="dm-0" ino=4622383 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:325): avc: denied { setattr } for pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=4622384 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:326): avc: denied { setattr } for pid=1995 comm="chown" name="web_magentatv_de.php" dev="dm-0" ino=4622385 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:327): avc: denied { setattr } for pid=1995 comm="chown" name="tkm" dev="dm-0" ino=4219936 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.159:328): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=8832681 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.159:329): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=8832819 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.159:330): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=8903342 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.159:331): avc: denied { setattr } for pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=8903498 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:332): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=8913684 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:333): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=9096147 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:334): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=9096148 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:335): avc: denied { setattr } for pid=1995 comm="chown" name="tvp.sh" dev="dm-0" ino=9096149 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:336): avc: denied { setattr } for pid=1995 comm="chown" name="tvp" dev="dm-0" ino=8785984 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.171:337): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=13167108 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:338): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=13167109 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:339): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=13167110 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:340): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=13167111 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:341): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=13167112 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:342): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=13167113 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:343): avc: denied { setattr } for pid=1995 comm="chown" name="tvs.sh" dev="dm-0" ino=13167114 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:344): avc: denied { setattr } for pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=13167115 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:345): avc: denied { setattr } for pid=1995 comm="chown" name="tvs" dev="dm-0" ino=13167107 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.171:346): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=499341 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:347): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=499347 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:348): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=499358 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:349): avc: denied { setattr } for pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=1125864 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:350): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=1125865 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:351): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=1125866 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:352): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=1125867 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:353): avc: denied { setattr } for pid=1995 comm="chown" name="tvtv.sh" dev="dm-0" ino=1125868 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:354): avc: denied { setattr } for pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=1125869 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:355): avc: denied { setattr } for pid=1995 comm="chown" name="tvtv" dev="dm-0" ino=499338 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.173:356): avc: denied { setattr } for pid=1995 comm="chown" name="update.sh" dev="dm-0" ino=13167116 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:357): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=4622387 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:358): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=4622388 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:359): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=4622389 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:360): avc: denied { setattr } for pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=4622390 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:361): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=4622391 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:362): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=4622392 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:363): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=4622393 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:364): avc: denied { setattr } for pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=4622394 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:365): avc: denied { setattr } for pid=1995 comm="chown" name="vdf.sh" dev="dm-0" ino=4622395 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:366): avc: denied { setattr } for pid=1995 comm="chown" name="vdf" dev="dm-0" ino=4622386 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.174:367): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=9096151 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:368): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=9096152 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:369): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=9096153 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:370): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=9096154 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:371): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=9096155 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:372): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=9096156 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:373): avc: denied { setattr } for pid=1995 comm="chown" name="wpu.sh" dev="dm-0" ino=9096157 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:374): avc: denied { setattr } for pid=1995 comm="chown" name="wpu" dev="dm-0" ino=9096150 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.175:375): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=13167118 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:376): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=13167119 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:377): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=13167120 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:378): avc: denied { setattr } for pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=13167121 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:379): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=13167122 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:380): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=13167123 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:381): avc: denied { setattr } for pid=1995 comm="chown" name="save_page.js" dev="dm-0" ino=13167124 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:382): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=13167125 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:383): avc: denied { setattr } for pid=1995 comm="chown" name="ztt.sh" dev="dm-0" ino=13167126 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:384): avc: denied { setattr } for pid=1995 comm="chown" name="ztt" dev="dm-0" ino=13167117 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.176:385): avc: denied { setattr } for pid=1995 comm="chown" name="xml" dev="dm-0" ino=9241691 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.176:386): avc: denied { setattr } for pid=1995 comm="chown" name="combine" dev="dm-0" ino=13726283 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.176:387): avc: denied { setattr } for pid=1995 comm="chown" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437629.934:392): avc: denied { write } for pid=2651 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.934:393): avc: denied { add_name } for pid=2651 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.935:394): avc: denied { create } for pid=2651 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.937:395): avc: denied { write } for pid=2651 comm="git" name="easyepg" dev="dm-0" ino=12658816 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.937:396): avc: denied { add_name } for pid=2651 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.952:397): avc: denied { create } for pid=2651 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437629.954:398): avc: denied { write } for pid=2651 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=9108398 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437629.962:399): avc: denied { remove_name } for pid=2651 comm="git" name="HEAD.lock" dev="dm-0" ino=1693069 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.962:400): avc: denied { rename } for pid=2651 comm="git" name="HEAD.lock" dev="dm-0" ino=1693069 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437629.963:401): avc: denied { setattr } for pid=2651 comm="git" name="config" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437629.964:402): avc: denied { unlink } for pid=2651 comm="git" name="config" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437629.965:403): avc: denied { create } for pid=2651 comm="git" name="tfdZp8t" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583437629.965:404): avc: denied { unlink } for pid=2651 comm="git" name="tfdZp8t" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583437632.018:405): avc: denied { link } for pid=2660 comm="git" name="tmp_pack_1aum5K" dev="dm-0" ino=4878847 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437632.032:406): avc: denied { append } for pid=2651 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=5189445 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437632.220:407): avc: denied { write } for pid=2667 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437634.202:408): avc: denied { rmdir } for pid=3204 comm="rm" name="branches" dev="dm-0" ino=4878843 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437634.212:409): avc: denied { remove_name } for pid=3204 comm="rm" name="easyepg" dev="dm-0" ino=12658816 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437635.115:410): avc: denied { setattr } for pid=3232 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437635.116:411): avc: denied { setattr } for pid=3232 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.400:426): avc: denied { write } for pid=3454 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.400:427): avc: denied { add_name } for pid=3454 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.400:428): avc: denied { create } for pid=3454 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.402:429): avc: denied { write } for pid=3454 comm="git" name="easyepg" dev="dm-0" ino=8667266 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.402:430): avc: denied { add_name } for pid=3454 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.405:431): avc: denied { create } for pid=3454 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438005.405:432): avc: denied { write } for pid=3454 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=4878846 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438005.410:433): avc: denied { remove_name } for pid=3454 comm="git" name="HEAD.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.410:434): avc: denied { rename } for pid=3454 comm="git" name="HEAD.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438005.411:435): avc: denied { setattr } for pid=3454 comm="git" name="config" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1type=AVC msg=audit(1583438005.411:436): avc: denied { unlink } for pid=3454 comm="git" name="config" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438005.413:437): avc: denied { create } for pid=3454 comm="git" name="tAU8v6D" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438005.413:438): avc: denied { unlink } for pid=3454 comm="git" name="tAU8v6D" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438007.166:439): avc: denied { link } for pid=3463 comm="git" name="tmp_pack_OWZZAV" dev="dm-0" ino=15145098 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.185:440): avc: denied { create } for pid=3454 comm="git" name="packed-refs.lock" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.186:441): avc: denied { write } for pid=3454 comm="git" path="/easyepg/easyepg/.git/packed-refs.lock" dev="dm-0" ino=15145101 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.188:442): avc: denied { rename } for pid=3454 comm="git" name="packed-refs.new" dev="dm-0" ino=15145102 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.189:443): avc: denied { unlink } for pid=3454 comm="git" name="packed-refs.lock" dev="dm-0" ino=15145101 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.191:444): avc: denied { append } for pid=3454 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=1693072 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.194:445): avc: denied { setattr } for pid=3454 comm="git" name="config.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.284:446): avc: denied { write } for pid=3470 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438009.167:447): avc: denied { rmdir } for pid=4007 comm="rm" name="branches" dev="dm-0" ino=1693060 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438009.175:448): avc: denied { remove_name } for pid=4007 comm="rm" name="easyepg" dev="dm-0" ino=8667266 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438009.931:449): avc: denied { setattr } for pid=4042 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438009.931:450): avc: denied { setattr } for pid=4042 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438083.683:452): avc: denied { create } for pid=4211 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438083.684:453): avc: denied { write } for pid=4211 comm="git" name="easyepg" dev="dm-0" ino=1693058 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438083.684:454): avc: denied { add_name } for pid=4211 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438083.690:455): avc: denied { remove_name } for pid=4211 comm="git" name="HEAD.lock" dev="dm-0" ino=5189568 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438083.692:456): avc: denied { create } for pid=4211 comm="git" name="tONRGVi" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438083.692:457): avc: denied { unlink } for pid=4211 comm="git" name="tONRGVi" dev="dm-0" ino=5189569 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438085.463:458): avc: denied { link } for pid=4217 comm="git" name="tmp_pack_GtRffg" dev="dm-0" ino=5189571 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438085.539:459): avc: denied { write } for pid=4225 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438087.491:460): avc: denied { rmdir } for pid=4743 comm="rm" name="branches" dev="dm-0" ino=9108396 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438087.500:461): avc: denied { write } for pid=4743 comm="rm" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438087.500:462): avc: denied { remove_name } for pid=4743 comm="rm" name="easyepg" dev="dm-0" ino=1693058 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438088.387:463): avc: denied { setattr } for pid=4769 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438088.388:464): avc: denied { setattr } for pid=4769 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.905:492): avc: denied { write } for pid=5567 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.905:493): avc: denied { add_name } for pid=5567 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.906:494): avc: denied { create } for pid=5567 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.906:495): avc: denied { write } for pid=5567 comm="git" name="easyepg" dev="dm-0" ino=9140785 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.906:496): avc: denied { add_name } for pid=5567 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.916:497): avc: denied { create } for pid=5567 comm="git" name="description" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438413.917:498): avc: denied { write } for pid=5567 comm="git" path="/easyepg/easyepg/.git/description" dev="dm-0" ino=14897477 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438413.924:499): avc: denied { remove_name } for pid=5567 comm="git" name="HEAD.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.924:500): avc: denied { rename } for pid=5567 comm="git" name="HEAD.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438413.924:501): avc: denied { setattr } for pid=5567 comm="git" name="config" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438413.925:502): avc: denied { unlink } for pid=5567 comm="git" name="config" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1type=AVC msg=audit(1583438413.926:503): avc: denied { create } for pid=5567 comm="git" name="tgjDNkv" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438413.926:504): avc: denied { unlink } for pid=5567 comm="git" name="tgjDNkv" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438415.493:505): avc: denied { link } for pid=5572 comm="git" name="tmp_pack_uWSQHj" dev="dm-0" ino=14897482 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438415.499:506): avc: denied { append } for pid=5567 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=9140793 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438415.524:507): avc: denied { create } for pid=5567 comm="git" name="ch_json2xml.pl" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438415.525:508): avc: denied { write } for pid=5567 comm="git" path="/easyepg/easyepg/rdt/ch_json2xml.pl" dev="dm-0" ino=14897492 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438415.542:509): avc: denied { rename } for pid=5567 comm="git" name="index.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438415.715:510): avc: denied { write } for pid=5582 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438417.261:511): avc: denied { rmdir } for pid=6119 comm="rm" name="branches" dev="dm-0" ino=1680193 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438417.261:512): avc: denied { unlink } for pid=6119 comm="rm" name="description" dev="dm-0" ino=14897477 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438417.277:513): avc: denied { remove_name } for pid=6119 comm="rm" name="easyepg" dev="dm-0" ino=9140785 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438418.143:514): avc: denied { setattr } for pid=6154 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438418.143:515): avc: denied { setattr } for pid=6154 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
-
By the way: The image from "qoopido" is the one I'm trying to use. It's the same as in the linked tutorial.
podman search easyepg INDEX NAME DESCRIPTION STARS OFFICIAL AUTOMATED docker.io docker.io/mod242/easyepg Docker Image for easyepg 0 docker.io docker.io/qoopido/easyepg.minimal Minimal docker container to run easyepg 1 docker.io docker.io/takealug/easyepg A docker container for running easyepg with ... 1 docker.io docker.io/xuvin/easyepg easyEPG with Helper Script - Debian Base Ima... 0 docker.io docker.io/strowi/easyepg easyepg in a container 0
-
You can just tell podman to relabel the directory with :Z. For example:
podman run --rm -ti $PWD/mydirectory:/var/lib/something:Z fedora:31 bash
Now the $PWD/mydirectory has the
container_file_t
label. -
This is the initial setup:
docker start easyepg.admin docker exec -ti -u easyepg -w /easyepg easyepg.admin /bin/bash ./epg.sh
How to use the :Z option here? I read about it a lot but didn't get it to work.
After starting "docker/podman start easyepg.admin" I get those SELinux errors.The one and only reason why I want to try easyepg with docker / podman is because I overwrote my entire filesystem (there's a thread about this) after following this tutorial https://github.com/sunsettrack4/easyepg
# Setup to run the script daily at 3 AM 0 3 * * * cd ~/easyepg && bash epg.sh
This crontab entry is not working for me.
When I move manually to the easyepg directory and issue ./epg.sh the script is working fine. -
You would have to use it with the qoopido image.
Just start that image like a normal container and don't use that install script.
If you use that install script you have to manually set the SELinux context for the data directory.
-
@stacksofplates Okay. I'll try that way. I didn't tried that way yet.
-
I tried and I failed
When I try the qoopido image I cannot create necessary containers as described in the tutorial
When I try with the install script I get created necessary containers:[twolf@localhost ~]$ podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/qoopido/easyepg.minimal latest 2f0ab58083e6 5 days ago 519 MB [twolf@localhost ~]$ podman ps -a CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES 0e858d93e465 docker.io/qoopido/easyepg.minimal:latest 2 minutes ago Created easyepg.run 54b5774f1d6a docker.io/qoopido/easyepg.minimal:latest 2 minutes ago Created easyepg.admin
Starting container as described...
[twolf@localhost ~]$ podman start easyepg.admin easyepg.admin [twolf@localhost ~]$
... gives me:
type=AVC msg=audit(1583530938.391:329): avc: denied { create } for pid=32955 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c104,c340 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583530938.391:330): avc: denied { remove_name } for pid=32955 comm="git" name=".git" dev="dm-0" ino=372780 scontext=system_u:system_r:container_t:s0:c104,c340 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583530938.398:332): avc: denied { remove_name } for pid=32957 comm="rm" name="easyepg" dev="dm-0" ino=13846779 scontext=system_u:system_r:container_t:s0:c104,c340 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
-
If you want to run it the other way, just set the context for the directories you want to mount. They should be
container_t
. -
And how do I do it? That's the part with SELinux I have no idea...
-
You would have to use it with the qoopido image.
Just start that image like a normal container and don't use that install script.
If you use that install script you have to manually set the SELinux context for the data directory.
To temporarily set it you can just do
chcon -t container_t the-directory
. -
I tried with chcon -t container_t easyepg.
I moved easyepg to /home/myuser/easyepg[twolf@localhost ~]$ podman start easyepg.admin Error: unable to start container "easyepg.admin": set propagation for `/home/twolf/.local/share/containers/storage/overlay/78126aba7a4e047b690f0c6ce66d36e7b04043f04d8b994c53cf92982e9ce29d/merged/easyepg`: Permission denied: OCI runtime permission denied error
When I "pause" SELinux both containers are working fine.
[twolf@localhost ~]$ podman start easyepg.admin easyepg.admin [twolf@localhost ~]$ podman start easyepg.run easyepg.run
Cloning into '/easyepg/easyepg'... Updating main... Updating Horizon... 'easyepg/hzn/hzn.sh' -> 'hzn/hzn.sh' 'easyepg/hzn/hzn.sh' -> 'hzn/de/' 'easyepg/hzn/hzn.sh' -> 'hzn/at/' 'easyepg/hzn/hzn.sh' -> 'hzn/ch/' 'easyepg/hzn/hzn.sh' -> 'hzn/nl/' 'easyepg/hzn/hzn.sh' -> 'hzn/pl/' 'easyepg/hzn/hzn.sh' -> 'hzn/ie/' 'easyepg/hzn/hzn.sh' -> 'hzn/sk/' 'easyepg/hzn/hzn.sh' -> 'hzn/cz/' 'easyepg/hzn/hzn.sh' -> 'hzn/hu/' 'easyepg/hzn/hzn.sh' -> 'hzn/ro/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ch_json2xml.pl' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/de/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/at/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ch/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/nl/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/pl/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ie/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/sk/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/cz/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/hu/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ro/' 'easyepg/hzn/cid_json.pl' -> 'hzn/cid_json.pl' 'easyepg/hzn/cid_json.pl' -> 'hzn/de/' 'easyepg/hzn/cid_json.pl' -> 'hzn/at/' 'easyepg/hzn/cid_json.pl' -> 'hzn/ch/' 'easyepg/hzn/cid_json.pl' -> 'hzn/nl/' 'easyepg/hzn/cid_json.pl' -> 'hzn/pl/' 'easyepg/hzn/cid_json.pl' -> 'hzn/ie/' 'easyepg/hzn/cid_json.pl' -> 'hzn/sk/' 'easyepg/hzn/cid_json.pl' -> 'hzn/cz/' 'easyepg/hzn/cid_json.pl' -> 'hzn/hu/' 'easyepg/hzn/cid_json.pl' -> 'hzn/ro/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/epg_json2xml.pl' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/de/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/at/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/ch/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/nl/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/pl/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/ie/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/sk/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/cz/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/hu/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/ro/' 'easyepg/hzn/settings.sh' -> 'hzn/settings.sh' 'easyepg/hzn/settings.sh' -> 'hzn/de/' 'easyepg/hzn/settings.sh' -> 'hzn/at/' 'easyepg/hzn/settings.sh' -> 'hzn/ch/' 'easyepg/hzn/settings.sh' -> 'hzn/nl/' 'easyepg/hzn/settings.sh' -> 'hzn/pl/' 'easyepg/hzn/settings.sh' -> 'hzn/ie/' 'easyepg/hzn/settings.sh' -> 'hzn/sk/' 'easyepg/hzn/settings.sh' -> 'hzn/cz/' 'easyepg/hzn/settings.sh' -> 'hzn/hu/' 'easyepg/hzn/settings.sh' -> 'hzn/ro/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/chlist_printer.pl' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/de/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/at/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/ch/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/nl/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/pl/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/ie/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/sk/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/cz/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/hu/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/ro/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/compare_menu.pl' 'easyepg/hzn/compare_menu.pl' -> 'hzn/de/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/at/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/ch/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/nl/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/pl/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/ie/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/sk/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/cz/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/hu/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/ro/' 'easyepg/hzn/url_printer.pl' -> 'hzn/url_printer.pl' 'easyepg/hzn/url_printer.pl' -> 'hzn/de/' 'easyepg/hzn/url_printer.pl' -> 'hzn/at/' 'easyepg/hzn/url_printer.pl' -> 'hzn/ch/' 'easyepg/hzn/url_printer.pl' -> 'hzn/nl/' 'easyepg/hzn/url_printer.pl' -> 'hzn/pl/' 'easyepg/hzn/url_printer.pl' -> 'hzn/ie/' 'easyepg/hzn/url_printer.pl' -> 'hzn/sk/' 'easyepg/hzn/url_printer.pl' -> 'hzn/cz/' 'easyepg/hzn/url_printer.pl' -> 'hzn/hu/' 'easyepg/hzn/url_printer.pl' -> 'hzn/ro/' Updating Zattoo... 'easyepg/ztt/ztt.sh' -> 'ztt/ztt.sh' 'easyepg/ztt/ztt.sh' -> 'ztt/de/' 'easyepg/ztt/ztt.sh' -> 'ztt/ch/' 'easyepg/ztt/settings.sh' -> 'ztt/settings.sh' 'easyepg/ztt/settings.sh' -> 'ztt/de/' 'easyepg/ztt/settings.sh' -> 'ztt/ch/' 'easyepg/ztt/compare_crid.pl' -> 'ztt/compare_crid.pl' 'easyepg/ztt/compare_crid.pl' -> 'ztt/de/' 'easyepg/ztt/compare_crid.pl' -> 'ztt/ch/' 'easyepg/ztt/save_page.js' -> 'ztt/save_page.js' 'easyepg/ztt/save_page.js' -> 'ztt/de/' 'easyepg/ztt/save_page.js' -> 'ztt/ch/' 'easyepg/ztt/epg_json2xml.pl' -> 'ztt/epg_json2xml.pl' 'easyepg/ztt/epg_json2xml.pl' -> 'ztt/de/' 'easyepg/ztt/epg_json2xml.pl' -> 'ztt/ch/' 'easyepg/ztt/ch_json2xml.pl' -> 'ztt/ch_json2xml.pl' 'easyepg/ztt/ch_json2xml.pl' -> 'ztt/de/' 'easyepg/ztt/ch_json2xml.pl' -> 'ztt/ch/' 'easyepg/ztt/cid_json.pl' -> 'ztt/cid_json.pl' 'easyepg/ztt/cid_json.pl' -> 'ztt/de/' 'easyepg/ztt/cid_json.pl' -> 'ztt/ch/' 'easyepg/ztt/chlist_printer.pl' -> 'ztt/chlist_printer.pl' 'easyepg/ztt/chlist_printer.pl' -> 'ztt/de/' 'easyepg/ztt/chlist_printer.pl' -> 'ztt/ch/' 'easyepg/ztt/compare_menu.pl' -> 'ztt/compare_menu.pl' 'easyepg/ztt/compare_menu.pl' -> 'ztt/de/' 'easyepg/ztt/compare_menu.pl' -> 'ztt/ch/' Updating Swisscom... 'easyepg/swc/swc.sh' -> 'swc/swc.sh' 'easyepg/swc/swc.sh' -> 'swc/ch/' 'easyepg/swc/settings.sh' -> 'swc/settings.sh' 'easyepg/swc/settings.sh' -> 'swc/ch/' 'easyepg/swc/epg_json2xml.pl' -> 'swc/epg_json2xml.pl' 'easyepg/swc/epg_json2xml.pl' -> 'swc/ch/' 'easyepg/swc/ch_json2xml.pl' -> 'swc/ch_json2xml.pl' 'easyepg/swc/ch_json2xml.pl' -> 'swc/ch/' 'easyepg/swc/cid_json.pl' -> 'swc/cid_json.pl' 'easyepg/swc/cid_json.pl' -> 'swc/ch/' 'easyepg/swc/chlist_printer.pl' -> 'swc/chlist_printer.pl' 'easyepg/swc/chlist_printer.pl' -> 'swc/ch/' 'easyepg/swc/compare_menu.pl' -> 'swc/compare_menu.pl' 'easyepg/swc/compare_menu.pl' -> 'swc/ch/' 'easyepg/swc/url_printer.pl' -> 'swc/url_printer.pl' 'easyepg/swc/url_printer.pl' -> 'swc/ch/' Updating tvPlayer... 'easyepg/tvp/tvp.sh' -> 'tvp/tvp.sh' 'easyepg/tvp/tvp.sh' -> 'tvp/uk/' 'easyepg/tvp/settings.sh' -> 'tvp/settings.sh' 'easyepg/tvp/settings.sh' -> 'tvp/uk/' 'easyepg/tvp/epg_json2xml.pl' -> 'tvp/epg_json2xml.pl' 'easyepg/tvp/epg_json2xml.pl' -> 'tvp/uk/' 'easyepg/tvp/ch_json2xml.pl' -> 'tvp/ch_json2xml.pl' 'easyepg/tvp/ch_json2xml.pl' -> 'tvp/uk/' 'easyepg/tvp/cid_json.pl' -> 'tvp/cid_json.pl' 'easyepg/tvp/cid_json.pl' -> 'tvp/uk/' 'easyepg/tvp/chlist_printer.pl' -> 'tvp/chlist_printer.pl' 'easyepg/tvp/chlist_printer.pl' -> 'tvp/uk/' 'easyepg/tvp/compare_menu.pl' -> 'tvp/compare_menu.pl' 'easyepg/tvp/compare_menu.pl' -> 'tvp/uk/' 'easyepg/tvp/compare_crid.pl' -> 'tvp/compare_crid.pl' 'easyepg/tvp/compare_crid.pl' -> 'tvp/uk/' Updating Telekom... 'easyepg/tkm/tkm.sh' -> 'tkm/tkm.sh' 'easyepg/tkm/tkm.sh' -> 'tkm/de/' 'easyepg/tkm/settings.sh' -> 'tkm/settings.sh' 'easyepg/tkm/settings.sh' -> 'tkm/de/' 'easyepg/tkm/epg_json2xml.pl' -> 'tkm/epg_json2xml.pl' 'easyepg/tkm/epg_json2xml.pl' -> 'tkm/de/' 'easyepg/tkm/ch_json2xml.pl' -> 'tkm/ch_json2xml.pl' 'easyepg/tkm/ch_json2xml.pl' -> 'tkm/de/' 'easyepg/tkm/cid_json.pl' -> 'tkm/cid_json.pl' 'easyepg/tkm/cid_json.pl' -> 'tkm/de/' 'easyepg/tkm/chlist_printer.pl' -> 'tkm/chlist_printer.pl' 'easyepg/tkm/chlist_printer.pl' -> 'tkm/de/' 'easyepg/tkm/compare_menu.pl' -> 'tkm/compare_menu.pl' 'easyepg/tkm/compare_menu.pl' -> 'tkm/de/' 'easyepg/tkm/url_printer.pl' -> 'tkm/url_printer.pl' 'easyepg/tkm/url_printer.pl' -> 'tkm/de/' 'easyepg/tkm/proxy.sh' -> 'tkm/proxy.sh' 'easyepg/tkm/proxy.sh' -> 'tkm/de/' 'easyepg/tkm/web_magentatv_de.php' -> 'tkm/web_magentatv_de.php' 'easyepg/tkm/web_magentatv_de.php' -> 'tkm/de/' Updating RadioTimes... 'easyepg/rdt/rdt.sh' -> 'rdt/rdt.sh' 'easyepg/rdt/rdt.sh' -> 'rdt/uk/' 'easyepg/rdt/settings.sh' -> 'rdt/settings.sh' 'easyepg/rdt/settings.sh' -> 'rdt/uk/' 'easyepg/rdt/epg_json2xml.pl' -> 'rdt/epg_json2xml.pl' 'easyepg/rdt/epg_json2xml.pl' -> 'rdt/uk/' 'easyepg/rdt/ch_json2xml.pl' -> 'rdt/ch_json2xml.pl' 'easyepg/rdt/ch_json2xml.pl' -> 'rdt/uk/' 'easyepg/rdt/cid_json.pl' -> 'rdt/cid_json.pl' 'easyepg/rdt/cid_json.pl' -> 'rdt/uk/' 'easyepg/rdt/chlist_printer.pl' -> 'rdt/chlist_printer.pl' 'easyepg/rdt/chlist_printer.pl' -> 'rdt/uk/' 'easyepg/rdt/compare_menu.pl' -> 'rdt/compare_menu.pl' 'easyepg/rdt/compare_menu.pl' -> 'rdt/uk/' 'easyepg/rdt/compare_crid.pl' -> 'rdt/compare_crid.pl' 'easyepg/rdt/compare_crid.pl' -> 'rdt/uk/' 'easyepg/rdt/url_printer.pl' -> 'rdt/url_printer.pl' 'easyepg/rdt/url_printer.pl' -> 'rdt/uk/' Updating waipu.tv... 'easyepg/wpu/wpu.sh' -> 'wpu/wpu.sh' 'easyepg/wpu/wpu.sh' -> 'wpu/de/' 'easyepg/wpu/settings.sh' -> 'wpu/settings.sh' 'easyepg/wpu/settings.sh' -> 'wpu/de/' 'easyepg/wpu/epg_json2xml.pl' -> 'wpu/epg_json2xml.pl' 'easyepg/wpu/epg_json2xml.pl' -> 'wpu/de/' 'easyepg/wpu/ch_json2xml.pl' -> 'wpu/ch_json2xml.pl' 'easyepg/wpu/ch_json2xml.pl' -> 'wpu/de/' 'easyepg/wpu/cid_json.pl' -> 'wpu/cid_json.pl' 'easyepg/wpu/cid_json.pl' -> 'wpu/de/' 'easyepg/wpu/chlist_printer.pl' -> 'wpu/chlist_printer.pl' 'easyepg/wpu/chlist_printer.pl' -> 'wpu/de/' 'easyepg/wpu/compare_menu.pl' -> 'wpu/compare_menu.pl' 'easyepg/wpu/compare_menu.pl' -> 'wpu/de/' Updating TV-Spielfilm... 'easyepg/tvs/tvs.sh' -> 'tvs/tvs.sh' 'easyepg/tvs/tvs.sh' -> 'tvs/de/' 'easyepg/tvs/settings.sh' -> 'tvs/settings.sh' 'easyepg/tvs/settings.sh' -> 'tvs/de/' 'easyepg/tvs/epg_json2xml.pl' -> 'tvs/epg_json2xml.pl' 'easyepg/tvs/epg_json2xml.pl' -> 'tvs/de/' 'easyepg/tvs/ch_json2xml.pl' -> 'tvs/ch_json2xml.pl' 'easyepg/tvs/ch_json2xml.pl' -> 'tvs/de/' 'easyepg/tvs/cid_json.pl' -> 'tvs/cid_json.pl' 'easyepg/tvs/cid_json.pl' -> 'tvs/de/' 'easyepg/tvs/chlist_printer.pl' -> 'tvs/chlist_printer.pl' 'easyepg/tvs/chlist_printer.pl' -> 'tvs/de/' 'easyepg/tvs/compare_menu.pl' -> 'tvs/compare_menu.pl' 'easyepg/tvs/compare_menu.pl' -> 'tvs/de/' 'easyepg/tvs/url_printer.pl' -> 'tvs/url_printer.pl' 'easyepg/tvs/url_printer.pl' -> 'tvs/de/' Updating VODAFONE... 'easyepg/vdf/vdf.sh' -> 'vdf/vdf.sh' 'easyepg/vdf/vdf.sh' -> 'vdf/de/' 'easyepg/vdf/settings.sh' -> 'vdf/settings.sh' 'easyepg/vdf/settings.sh' -> 'vdf/de/' 'easyepg/vdf/epg_json2xml.pl' -> 'vdf/epg_json2xml.pl' 'easyepg/vdf/epg_json2xml.pl' -> 'vdf/de/' 'easyepg/vdf/ch_json2xml.pl' -> 'vdf/ch_json2xml.pl' 'easyepg/vdf/ch_json2xml.pl' -> 'vdf/de/' 'easyepg/vdf/compare_crid.pl' -> 'vdf/compare_crid.pl' 'easyepg/vdf/compare_crid.pl' -> 'vdf/de/' 'easyepg/vdf/cid_json.pl' -> 'vdf/cid_json.pl' 'easyepg/vdf/cid_json.pl' -> 'vdf/de/' 'easyepg/vdf/chlist_printer.pl' -> 'vdf/chlist_printer.pl' 'easyepg/vdf/chlist_printer.pl' -> 'vdf/de/' 'easyepg/vdf/compare_menu.pl' -> 'vdf/compare_menu.pl' 'easyepg/vdf/compare_menu.pl' -> 'vdf/de/' 'easyepg/vdf/url_printer.pl' -> 'vdf/url_printer.pl' 'easyepg/vdf/url_printer.pl' -> 'vdf/de/' Updating TVTV... 'easyepg/tvtv/tvtv.sh' -> 'tvtv/tvtv.sh' 'easyepg/tvtv/tvtv.sh' -> 'tvtv/us/' 'easyepg/tvtv/tvtv.sh' -> 'tvtv/ca/' 'easyepg/tvtv/settings.sh' -> 'tvtv/settings.sh' 'easyepg/tvtv/settings.sh' -> 'tvtv/us/' 'easyepg/tvtv/settings.sh' -> 'tvtv/ca/' 'easyepg/tvtv/compare_crid.pl' -> 'tvtv/compare_crid.pl' 'easyepg/tvtv/compare_crid.pl' -> 'tvtv/us/' 'easyepg/tvtv/compare_crid.pl' -> 'tvtv/ca/' 'easyepg/tvtv/epg_json2xml.pl' -> 'tvtv/epg_json2xml.pl' 'easyepg/tvtv/epg_json2xml.pl' -> 'tvtv/us/' 'easyepg/tvtv/epg_json2xml.pl' -> 'tvtv/ca/' 'easyepg/tvtv/ch_json2xml.pl' -> 'tvtv/ch_json2xml.pl' 'easyepg/tvtv/ch_json2xml.pl' -> 'tvtv/us/' 'easyepg/tvtv/ch_json2xml.pl' -> 'tvtv/ca/' 'easyepg/tvtv/cid_json.pl' -> 'tvtv/cid_json.pl' 'easyepg/tvtv/cid_json.pl' -> 'tvtv/us/' 'easyepg/tvtv/cid_json.pl' -> 'tvtv/ca/' 'easyepg/tvtv/chlist_printer.pl' -> 'tvtv/chlist_printer.pl' 'easyepg/tvtv/chlist_printer.pl' -> 'tvtv/us/' 'easyepg/tvtv/chlist_printer.pl' -> 'tvtv/ca/' 'easyepg/tvtv/compare_menu.pl' -> 'tvtv/compare_menu.pl' 'easyepg/tvtv/compare_menu.pl' -> 'tvtv/us/' 'easyepg/tvtv/compare_menu.pl' -> 'tvtv/ca/' 'easyepg/tvtv/url_printer.pl' -> 'tvtv/url_printer.pl' 'easyepg/tvtv/url_printer.pl' -> 'tvtv/us/' 'easyepg/tvtv/url_printer.pl' -> 'tvtv/ca/' Updating External... 'easyepg/ext/ext.sh' -> 'ext/ext.sh' 'easyepg/ext/ext.sh' -> 'ext/oa/' 'easyepg/ext/ext.sh' -> 'ext/ob/' 'easyepg/ext/ext.sh' -> 'ext/oc/' 'easyepg/ext/settings.sh' -> 'ext/settings.sh' 'easyepg/ext/settings.sh' -> 'ext/oa/' 'easyepg/ext/settings.sh' -> 'ext/ob/' 'easyepg/ext/settings.sh' -> 'ext/oc/' 'easyepg/ext/epg_ext.pl' -> 'ext/epg_ext.pl' 'easyepg/ext/epg_ext.pl' -> 'ext/oa/' 'easyepg/ext/epg_ext.pl' -> 'ext/ob/' 'easyepg/ext/epg_ext.pl' -> 'ext/oc/' 'easyepg/ext/ch_ext.pl' -> 'ext/ch_ext.pl' 'easyepg/ext/ch_ext.pl' -> 'ext/oa/' 'easyepg/ext/ch_ext.pl' -> 'ext/ob/' 'easyepg/ext/ch_ext.pl' -> 'ext/oc/' 'easyepg/ext/compare_menu.pl' -> 'ext/compare_menu.pl' 'easyepg/ext/compare_menu.pl' -> 'ext/oa/' 'easyepg/ext/compare_menu.pl' -> 'ext/ob/' 'easyepg/ext/compare_menu.pl' -> 'ext/oc/' UPDATE FINISHED! Current default time zone: 'Europe/Berlin' Local time is now: Sun Mar 8 19:34:08 CET 2020. Universal Time is now: Sun Mar 8 18:34:08 UTC 2020. easyepg:x:1000:
-
are you also running Docker? I tried to do their pipe to script install and it failed because it couldn't connect to the Docker daemon.
-
I'm guessing the only way to do it with Podman is to build the Dockerfile and then most likely use Podman to make a pod of the containers you want to run.
-
Don't need to run Docker. I do not run Docker but the Docker to Podman alias package needs to install
dnf install podman-docker
With that installed, the script will find "Docker".
-
My apologies. I gave you the wrong SELinux label. The correct type is
container_file_t
. So run chcon -t container_file_t dir_name` and it should be the correct context. -
No problem Anyway it does not work. Plenty of SELinux errors. I'll stop now with Podman and try to get working the cronjob commando without overwriting file permissions.
I'm running in a VM so I can play around and crash
Until I found a solution I'll issue the easyepg script manually on my Fedora Server host, just like I do today.
-
@Woti said in Fedora 31 Server, podman and SELinux:
No problem Anyway it does not work. Plenty of SELinux errors. I'll stop now with Podman and try to get working the cronjob commando without overwriting file permissions.
I'm running in a VM so I can play around and crash
Until I found a solution I'll issue the easyepg script manually on my Fedora Server host, just like I do today.
Weird. I was able to start the admin container with that SELinux label.
-
This post is deleted! -
Finally I tried again. I removed all images and container and easyepg directory. I created a new directory in my /home/user/easyepg.
At first I run your SELinux command as root user. After that as user I run the script and I could successfully run the images without any SELinux errorsThat's nice
I found out there was an image missing: easyepg.cron
In the script file https://raw.githubusercontent.com/dlueth/easyepg.minimal/master/init they use the flag--restart unless-stopped
.sh -c "docker create -l easyepg.minimal --name=easyepg.cron -e MODE=\"cron\" --restart unless-stopped ${OPTIONS} qoopido/easyepg.minimal:${TAG} 1> /dev/null"
This flag isn't supported by Podman.
I guess Podman won't start easyepg.cron after server restart?
Is there any solution?I downloaded the script with wget and made it executable. I removed the flag
--reload unless-stopped
and it worked.
As it said, now I could convert the script to Portman and is there any way to get the SELinux label to work after reboot of the server?Thanks a lot for your help so long @stacksofplates
-
@Woti said in Fedora 31 Server, podman and SELinux:
Finally I tried again. I removed all images and container and easyepg directory. I created a new directory in my /home/user/easyepg.
At first I run your SELinux command as root user. After that as user I run the script and I could successfully run the images without any SELinux errorsThat's nice
I found out there was an image missing: easyepg.cron
In the script file https://raw.githubusercontent.com/dlueth/easyepg.minimal/master/init they use the flag--restart unless-stopped
.sh -c "docker create -l easyepg.minimal --name=easyepg.cron -e MODE=\"cron\" --restart unless-stopped ${OPTIONS} qoopido/easyepg.minimal:${TAG} 1> /dev/null"
This flag isn't supported by Podman.
I guess Podman won't start easyepg.cron after server restart?
Is there any solution?I downloaded the script with wget and made it executable. I removed the flag
--reload unless-stopped
and it worked.
As it said, now I could convert the script to Portman and is there any way to get the SELinux label to work after reboot of the server?Thanks a lot for your help so long @stacksofplates
No prob. That flag doesn't work because podman isn't a daemon. You can just create a systemd unit to start it and keep it running.
The SELinux label will still be there after a reboot. It's "temporary" but that only means it will change on a relabel of the filesystem or a
restorecon
command.