Fedora 31 Server, podman and SELinux
-
@Woti he got the command wrong.
tail -f
will only get the last few lines of the logThis will look at the entire log.
sudo grep denied /var/log/audit/audit.log
-
Are you running podman as root? A normal user can't modify /usr/local/bin normally even without SELinux.
-
That unit script shows that it uses this as the default path:
DEFAULT_VOLUME=$(cd ~ && pwd -P)"/easyepg"
How did that end up in /usr/local/bin?
-
@stacksofplates during installation of the script you can choose where to install easyepg. I tried both in /home/myuser/easyepg as podman with my user and in /usr/local/bin/easyepg as podman with root.
-
Output 1 of 2 audit.log
type=AVC msg=audit(1583268530.225:308): avc: denied { write } for pid=2673 comm="git" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583268657.393:313): avc: denied { write } for pid=3024 comm="git" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583268949.079:371): avc: denied { add_name } for pid=3682 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583269134.240:386): avc: denied { create } for pid=3920 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583269242.611:406): avc: denied { create } for pid=4143 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269242.611:407): avc: denied { write open } for pid=4143 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=8739228 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269242.620:408): avc: denied { read } for pid=4143 comm="git" path="/easyepg/easyepg/.git/HEAD.lock" dev="dm-0" ino=575190 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269242.620:409): avc: denied { remove_name } for pid=4143 comm="git" name="HEAD.lock" dev="dm-0" ino=575190 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583269242.620:410): avc: denied { rename } for pid=4143 comm="git" name="HEAD.lock" dev="dm-0" ino=575190 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269242.621:411): avc: denied { setattr } for pid=4143 comm="git" name="config" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269242.621:412): avc: denied { map } for pid=4143 comm="git" path="/easyepg/easyepg/.git/config" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269242.621:413): avc: denied { unlink } for pid=4143 comm="git" name="config" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269242.622:414): avc: denied { create } for pid=4143 comm="git" name="tLxMhAM" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583269242.622:415): avc: denied { unlink } for pid=4143 comm="git" name="tLxMhAM" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583269244.875:416): avc: denied { link } for pid=4152 comm="git" name="tmp_pack_katKey" dev="dm-0" ino=575193 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269244.892:417): avc: denied { append } for pid=4143 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=4240653 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269244.997:418): avc: denied { ioctl } for pid=4160 comm="bash" path="/easyepg/easyepg/update.sh" dev="dm-0" ino=13460878 ioctlcmd=0x5401 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269247.412:419): avc: denied { rmdir } for pid=4699 comm="rm" name="branches" dev="dm-0" ino=4240646 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583269247.420:420): avc: denied { remove_name } for pid=4699 comm="rm" name="easyepg" dev="dm-0" ino=14560060 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583269248.288:421): avc: denied { setattr } for pid=4725 comm="chown" name="my-git.te" dev="dm-0" ino=9478378 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269248.288:422): avc: denied { setattr } for pid=4725 comm="chown" name="hzn" dev="dm-0" ino=13298283 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583269248.289:423): avc: denied { setattr } for pid=4725 comm="chown" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583269864.864:431): avc: denied { create } for pid=5249 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269864.864:432): avc: denied { write open } for pid=5249 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=13298582 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269864.869:433): avc: denied { read } for pid=5249 comm="git" path="/easyepg/easyepg/.git/HEAD.lock" dev="dm-0" ino=4226140 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269864.871:434): avc: denied { remove_name } for pid=5249 comm="git" name="HEAD.lock" dev="dm-0" ino=4226140 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583269864.871:435): avc: denied { rename } for pid=5249 comm="git" name="HEAD.lock" dev="dm-0" ino=4226140 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269864.871:436): avc: denied { setattr } for pid=5249 comm="git" name="config" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269864.871:437): avc: denied { map } for pid=5249 comm="git" path="/easyepg/easyepg/.git/config" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269864.871:438): avc: denied { unlink } for pid=5249 comm="git" name="config" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269864.871:439): avc: denied { create } for pid=5249 comm="git" name="tEzi3Yf" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583269864.871:440): avc: denied { unlink } for pid=5249 comm="git" name="tEzi3Yf" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583269866.711:441): avc: denied { link } for pid=5254 comm="git" name="tmp_pack_aKmh5l" dev="dm-0" ino=4230338 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269866.720:442): avc: denied { append } for pid=5249 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=575213 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269866.766:443): avc: denied { ioctl } for pid=5259 comm="bash" path="/easyepg/easyepg/update.sh" dev="dm-0" ino=512980 ioctlcmd=0x5401 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269866.795:444): avc: denied { read } for pid=5264 comm="cp" name="prog_combine.pl" dev="dm-0" ino=512968 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269866.795:445): avc: denied { open } for pid=5264 comm="cp" path="/easyepg/easyepg/prog_combine.pl" dev="dm-0" ino=512968 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269866.795:446): avc: denied { write } for pid=5264 comm="cp" name="prog_combine.pl" dev="dm-0" ino=9658138 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269868.852:447): avc: denied { remove_name } for pid=5792 comm="rm" name="branches" dev="dm-0" ino=8739260 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583269868.852:448): avc: denied { rmdir } for pid=5792 comm="rm" name="branches" dev="dm-0" ino=8739260 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583269868.852:449): avc: denied { unlink } for pid=5792 comm="rm" name="exclude" dev="dm-0" ino=13298582 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269868.860:450): avc: denied { remove_name } for pid=5792 comm="rm" name="easyepg" dev="dm-0" ino=575196 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583269869.734:451): avc: denied { setattr } for pid=5827 comm="chown" name="my-git.te" dev="dm-0" ino=9478378 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269869.735:452): avc: denied { setattr } for pid=5827 comm="chown" name="epg.sh" dev="dm-0" ino=9658134 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269869.735:453): avc: denied { setattr } for pid=5827 comm="chown" name="hzn" dev="dm-0" ino=13298283 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583269869.737:454): avc: denied { setattr } for pid=5827 comm="chown" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583269938.914:455): avc: denied { execute } for pid=5931 comm="bash" name="epg.sh" dev="dm-0" ino=9658134 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269938.914:456): avc: denied { execute_no_trans } for pid=5931 comm="bash" path="/easyepg/epg.sh" dev="dm-0" ino=9658134 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269938.919:457): avc: denied { ioctl } for pid=5931 comm="epg.sh" path="/easyepg/epg.sh" dev="dm-0" ino=9658134 ioctlcmd=0x5401 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269950.143:458): avc: denied { create } for pid=6039 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269950.148:459): avc: denied { rename } for pid=6039 comm="git" name="HEAD.lock" dev="dm-0" ino=575200 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269950.149:460): avc: denied { map } for pid=6039 comm="git" path="/easyepg/easyepg/.git/config" dev="dm-0" ino=575201 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269950.149:461): avc: denied { create } for pid=6039 comm="git" name="ti678m1" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583269950.150:462): avc: denied { unlink } for pid=6039 comm="git" name="ti678m1" dev="dm-0" ino=575201 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583269951.786:463): avc: denied { link } for pid=6046 comm="git" name="tmp_pack_1QFH8x" dev="dm-0" ino=575203 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583269951.793:464): avc: denied { append } for pid=6039 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=13298606 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583270122.384:529): avc: denied { unlink } for pid=7005 comm="systemd-user-ru" name="hosts" dev="tmpfs" ino=68629 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583270122.384:530): avc: denied { read } for pid=7005 comm="systemd-user-ru" name="secrets" dev="tmpfs" ino=42446 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=dir permissive=1 type=AVC msg=audit(1583270122.385:531): avc: denied { rmdir } for pid=7005 comm="systemd-user-ru" name="secrets" dev="tmpfs" ino=42446 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=dir permissive=1 type=AVC msg=audit(1583270122.385:532): avc: denied { unlink } for pid=7005 comm="systemd-user-ru" name=".containerenv" dev="tmpfs" ino=42444 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=file permissive=1 type=AVC msg=audit(1583350958.833:261): avc: denied { create } for pid=1438 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583350958.833:262): avc: denied { remove_name } for pid=1438 comm="git" name=".git" dev="dm-0" ino=8412886 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583350958.833:263): avc: denied { remove_name } for pid=1438 comm="git" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583350958.890:264): avc: denied { remove_name } for pid=1440 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583351702.774:309): avc: denied { remove_name } for pid=1834 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583351702.793:310): avc: denied { remove_name } for pid=1837 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583352068.116:314): avc: denied { remove_name } for pid=1986 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583352068.136:315): avc: denied { remove_name } for pid=1989 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583352178.007:316): avc: denied { remove_name } for pid=2082 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583352178.023:317): avc: denied { remove_name } for pid=2085 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583352263.055:328): avc: denied { remove_name } for pid=2191 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583352263.072:329): avc: denied { remove_name } for pid=2194 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583352791.875:366): avc: denied { remove_name } for pid=2429 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583352791.894:367): avc: denied { remove_name } for pid=2432 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583353388.093:404): avc: denied { remove_name } for pid=3027 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583353388.114:405): avc: denied { remove_name } for pid=3030 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583354127.774:460): avc: denied { write } for pid=3275 comm="rm" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_dir_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583354127.792:461): avc: denied { write } for pid=3278 comm="rm" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_dir_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583354477.988:519): avc: denied { unlink } for pid=3570 comm="systemd-user-ru" name="hosts" dev="tmpfs" ino=50070 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583354477.989:520): avc: denied { unlink } for pid=3570 comm="systemd-user-ru" name="resolv.conf" dev="tmpfs" ino=50066 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583354477.989:521): avc: denied { read } for pid=3570 comm="systemd-user-ru" name="secrets" dev="tmpfs" ino=37057 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=dir permissive=0 type=AVC msg=audit(1583354477.989:522): avc: denied { unlink } for pid=3570 comm="systemd-user-ru" name=".containerenv" dev="tmpfs" ino=37055 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=file permissive=0 type=AVC msg=audit(1583354477.989:523): avc: denied { unlink } for pid=3570 comm="systemd-user-ru" name="hostname" dev="tmpfs" ino=37054 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=file permissive=0 type=AVC msg=audit(1583437487.930:270): avc: denied { write } for pid=1974 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.150:271): avc: denied { setattr } for pid=1995 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.150:272): avc: denied { setattr } for pid=1995 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.151:273): avc: denied { setattr } for pid=1995 comm="chown" name="LICENSE" dev="dm-0" ino=13379704 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.151:274): avc: denied { setattr } for pid=1995 comm="chown" name="README.md" dev="dm-0" ino=13508762 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.151:275): avc: denied { setattr } for pid=1995 comm="chown" name="backup.sh" dev="dm-0" ino=13508763 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.151:276): avc: denied { setattr } for pid=1995 comm="chown" name="branch-debaschdi.sh" dev="dm-0" ino=13726284 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.151:277): avc: denied { setattr } for pid=1995 comm="chown" name="ch_combine.pl" dev="dm-0" ino=13726285 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.151:278): avc: denied { setattr } for pid=1995 comm="chown" name="combine.sh" dev="dm-0" ino=13726286 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.151:279): avc: denied { setattr } for pid=1995 comm="chown" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.152:280): avc: denied { setattr } for pid=1995 comm="chown" name="ch_ext.pl" dev="dm-0" ino=4219926 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.152:281): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=4219930 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.152:282): avc: denied { setattr } for pid=1995 comm="chown" name="epg_ext.pl" dev="dm-0" ino=4219932 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.152:283): avc: denied { setattr } for pid=1995 comm="chown" name="ext.sh" dev="dm-0" ino=4219933 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.152:284): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=4219935 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.152:285): avc: denied { setattr } for pid=1995 comm="chown" name="ext" dev="dm-0" ino=4219912 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.152:286): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=8635392 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.153:287): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=8635393 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.153:288): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=8635395 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.153:289): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=8635423 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.154:290): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=8635428 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.154:291): avc: denied { setattr } for pid=1995 comm="chown" name="hzn.sh" dev="dm-0" ino=8667283 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.154:292): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=8693190 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.154:293): avc: denied { setattr } for pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=8701656 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.155:294): avc: denied { setattr } for pid=1995 comm="chown" name="hzn" dev="dm-0" ino=8625290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.155:295): avc: denied { setattr } for pid=1995 comm="chown" name="prog_combine.pl" dev="dm-0" ino=13726291 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.155:296): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=13726293 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.155:297): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=13726346 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.155:298): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=13726349 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.155:299): avc: denied { setattr } for pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=13777383 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.155:300): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=13777384 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.156:301): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=13777385 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.156:302): avc: denied { setattr } for pid=1995 comm="chown" name="rdt.sh" dev="dm-0" ino=13777386 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.156:303): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=13777387 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.156:304): avc: denied { setattr } for pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=13167104 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.156:305): avc: denied { setattr } for pid=1995 comm="chown" name="rdt" dev="dm-0" ino=13726292 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.156:306): avc: denied { setattr } for pid=1995 comm="chown" name="restore.sh" dev="dm-0" ino=13167105 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.156:307): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=226961 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.156:308): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=231429 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.156:309): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=231430 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:310): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=231434 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:311): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=231435 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:312): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=231436 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:313): avc: denied { setattr } for pid=1995 comm="chown" name="swc.sh" dev="dm-0" ino=231437 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:314): avc: denied { setattr } for pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=360556 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:315): avc: denied { setattr } for pid=1995 comm="chown" name="swc" dev="dm-0" ino=225110 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0type=AVC msg=audit(1583437489.158:316): avc: denied { setattr } for pid=1995 comm="chown" name="testing.sh" dev="dm-0" ino=13167106 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:317): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=4219938 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:318): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=4219939 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:319): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=4219940 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:320): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=4219941 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:321): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=4219942 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:322): avc: denied { setattr } for pid=1995 comm="chown" name="proxy.sh" dev="dm-0" ino=4219944 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:323): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=4563988 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
-
Output 2 of 2 audit.log
type=AVC msg=audit(1583437489.158:324): avc: denied { setattr } for pid=1995 comm="chown" name="tkm.sh" dev="dm-0" ino=4622383 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:325): avc: denied { setattr } for pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=4622384 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:326): avc: denied { setattr } for pid=1995 comm="chown" name="web_magentatv_de.php" dev="dm-0" ino=4622385 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.158:327): avc: denied { setattr } for pid=1995 comm="chown" name="tkm" dev="dm-0" ino=4219936 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.159:328): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=8832681 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.159:329): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=8832819 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.159:330): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=8903342 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.159:331): avc: denied { setattr } for pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=8903498 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:332): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=8913684 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:333): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=9096147 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:334): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=9096148 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:335): avc: denied { setattr } for pid=1995 comm="chown" name="tvp.sh" dev="dm-0" ino=9096149 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:336): avc: denied { setattr } for pid=1995 comm="chown" name="tvp" dev="dm-0" ino=8785984 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.171:337): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=13167108 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:338): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=13167109 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:339): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=13167110 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:340): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=13167111 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:341): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=13167112 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:342): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=13167113 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:343): avc: denied { setattr } for pid=1995 comm="chown" name="tvs.sh" dev="dm-0" ino=13167114 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:344): avc: denied { setattr } for pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=13167115 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.171:345): avc: denied { setattr } for pid=1995 comm="chown" name="tvs" dev="dm-0" ino=13167107 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.171:346): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=499341 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:347): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=499347 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:348): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=499358 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:349): avc: denied { setattr } for pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=1125864 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:350): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=1125865 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:351): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=1125866 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:352): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=1125867 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:353): avc: denied { setattr } for pid=1995 comm="chown" name="tvtv.sh" dev="dm-0" ino=1125868 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:354): avc: denied { setattr } for pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=1125869 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:355): avc: denied { setattr } for pid=1995 comm="chown" name="tvtv" dev="dm-0" ino=499338 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.173:356): avc: denied { setattr } for pid=1995 comm="chown" name="update.sh" dev="dm-0" ino=13167116 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:357): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=4622387 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.173:358): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=4622388 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:359): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=4622389 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:360): avc: denied { setattr } for pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=4622390 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:361): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=4622391 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:362): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=4622392 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:363): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=4622393 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:364): avc: denied { setattr } for pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=4622394 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:365): avc: denied { setattr } for pid=1995 comm="chown" name="vdf.sh" dev="dm-0" ino=4622395 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:366): avc: denied { setattr } for pid=1995 comm="chown" name="vdf" dev="dm-0" ino=4622386 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.174:367): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=9096151 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:368): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=9096152 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:369): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=9096153 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:370): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=9096154 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.174:371): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=9096155 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:372): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=9096156 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:373): avc: denied { setattr } for pid=1995 comm="chown" name="wpu.sh" dev="dm-0" ino=9096157 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:374): avc: denied { setattr } for pid=1995 comm="chown" name="wpu" dev="dm-0" ino=9096150 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.175:375): avc: denied { setattr } for pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=13167118 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:376): avc: denied { setattr } for pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=13167119 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:377): avc: denied { setattr } for pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=13167120 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:378): avc: denied { setattr } for pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=13167121 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:379): avc: denied { setattr } for pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=13167122 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:380): avc: denied { setattr } for pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=13167123 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:381): avc: denied { setattr } for pid=1995 comm="chown" name="save_page.js" dev="dm-0" ino=13167124 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:382): avc: denied { setattr } for pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=13167125 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:383): avc: denied { setattr } for pid=1995 comm="chown" name="ztt.sh" dev="dm-0" ino=13167126 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583437489.175:384): avc: denied { setattr } for pid=1995 comm="chown" name="ztt" dev="dm-0" ino=13167117 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.176:385): avc: denied { setattr } for pid=1995 comm="chown" name="xml" dev="dm-0" ino=9241691 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.176:386): avc: denied { setattr } for pid=1995 comm="chown" name="combine" dev="dm-0" ino=13726283 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437489.176:387): avc: denied { setattr } for pid=1995 comm="chown" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583437629.934:392): avc: denied { write } for pid=2651 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.934:393): avc: denied { add_name } for pid=2651 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.935:394): avc: denied { create } for pid=2651 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.937:395): avc: denied { write } for pid=2651 comm="git" name="easyepg" dev="dm-0" ino=12658816 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.937:396): avc: denied { add_name } for pid=2651 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.952:397): avc: denied { create } for pid=2651 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437629.954:398): avc: denied { write } for pid=2651 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=9108398 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437629.962:399): avc: denied { remove_name } for pid=2651 comm="git" name="HEAD.lock" dev="dm-0" ino=1693069 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437629.962:400): avc: denied { rename } for pid=2651 comm="git" name="HEAD.lock" dev="dm-0" ino=1693069 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437629.963:401): avc: denied { setattr } for pid=2651 comm="git" name="config" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437629.964:402): avc: denied { unlink } for pid=2651 comm="git" name="config" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437629.965:403): avc: denied { create } for pid=2651 comm="git" name="tfdZp8t" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583437629.965:404): avc: denied { unlink } for pid=2651 comm="git" name="tfdZp8t" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583437632.018:405): avc: denied { link } for pid=2660 comm="git" name="tmp_pack_1aum5K" dev="dm-0" ino=4878847 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437632.032:406): avc: denied { append } for pid=2651 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=5189445 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437632.220:407): avc: denied { write } for pid=2667 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437634.202:408): avc: denied { rmdir } for pid=3204 comm="rm" name="branches" dev="dm-0" ino=4878843 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437634.212:409): avc: denied { remove_name } for pid=3204 comm="rm" name="easyepg" dev="dm-0" ino=12658816 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583437635.115:410): avc: denied { setattr } for pid=3232 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583437635.116:411): avc: denied { setattr } for pid=3232 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.400:426): avc: denied { write } for pid=3454 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.400:427): avc: denied { add_name } for pid=3454 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.400:428): avc: denied { create } for pid=3454 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.402:429): avc: denied { write } for pid=3454 comm="git" name="easyepg" dev="dm-0" ino=8667266 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.402:430): avc: denied { add_name } for pid=3454 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.405:431): avc: denied { create } for pid=3454 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438005.405:432): avc: denied { write } for pid=3454 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=4878846 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438005.410:433): avc: denied { remove_name } for pid=3454 comm="git" name="HEAD.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438005.410:434): avc: denied { rename } for pid=3454 comm="git" name="HEAD.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438005.411:435): avc: denied { setattr } for pid=3454 comm="git" name="config" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1type=AVC msg=audit(1583438005.411:436): avc: denied { unlink } for pid=3454 comm="git" name="config" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438005.413:437): avc: denied { create } for pid=3454 comm="git" name="tAU8v6D" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438005.413:438): avc: denied { unlink } for pid=3454 comm="git" name="tAU8v6D" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438007.166:439): avc: denied { link } for pid=3463 comm="git" name="tmp_pack_OWZZAV" dev="dm-0" ino=15145098 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.185:440): avc: denied { create } for pid=3454 comm="git" name="packed-refs.lock" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.186:441): avc: denied { write } for pid=3454 comm="git" path="/easyepg/easyepg/.git/packed-refs.lock" dev="dm-0" ino=15145101 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.188:442): avc: denied { rename } for pid=3454 comm="git" name="packed-refs.new" dev="dm-0" ino=15145102 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.189:443): avc: denied { unlink } for pid=3454 comm="git" name="packed-refs.lock" dev="dm-0" ino=15145101 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.191:444): avc: denied { append } for pid=3454 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=1693072 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.194:445): avc: denied { setattr } for pid=3454 comm="git" name="config.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438007.284:446): avc: denied { write } for pid=3470 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438009.167:447): avc: denied { rmdir } for pid=4007 comm="rm" name="branches" dev="dm-0" ino=1693060 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438009.175:448): avc: denied { remove_name } for pid=4007 comm="rm" name="easyepg" dev="dm-0" ino=8667266 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438009.931:449): avc: denied { setattr } for pid=4042 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438009.931:450): avc: denied { setattr } for pid=4042 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438083.683:452): avc: denied { create } for pid=4211 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438083.684:453): avc: denied { write } for pid=4211 comm="git" name="easyepg" dev="dm-0" ino=1693058 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438083.684:454): avc: denied { add_name } for pid=4211 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438083.690:455): avc: denied { remove_name } for pid=4211 comm="git" name="HEAD.lock" dev="dm-0" ino=5189568 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438083.692:456): avc: denied { create } for pid=4211 comm="git" name="tONRGVi" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438083.692:457): avc: denied { unlink } for pid=4211 comm="git" name="tONRGVi" dev="dm-0" ino=5189569 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438085.463:458): avc: denied { link } for pid=4217 comm="git" name="tmp_pack_GtRffg" dev="dm-0" ino=5189571 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438085.539:459): avc: denied { write } for pid=4225 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438087.491:460): avc: denied { rmdir } for pid=4743 comm="rm" name="branches" dev="dm-0" ino=9108396 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438087.500:461): avc: denied { write } for pid=4743 comm="rm" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438087.500:462): avc: denied { remove_name } for pid=4743 comm="rm" name="easyepg" dev="dm-0" ino=1693058 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438088.387:463): avc: denied { setattr } for pid=4769 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438088.388:464): avc: denied { setattr } for pid=4769 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.905:492): avc: denied { write } for pid=5567 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.905:493): avc: denied { add_name } for pid=5567 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.906:494): avc: denied { create } for pid=5567 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.906:495): avc: denied { write } for pid=5567 comm="git" name="easyepg" dev="dm-0" ino=9140785 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.906:496): avc: denied { add_name } for pid=5567 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.916:497): avc: denied { create } for pid=5567 comm="git" name="description" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438413.917:498): avc: denied { write } for pid=5567 comm="git" path="/easyepg/easyepg/.git/description" dev="dm-0" ino=14897477 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438413.924:499): avc: denied { remove_name } for pid=5567 comm="git" name="HEAD.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438413.924:500): avc: denied { rename } for pid=5567 comm="git" name="HEAD.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438413.924:501): avc: denied { setattr } for pid=5567 comm="git" name="config" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438413.925:502): avc: denied { unlink } for pid=5567 comm="git" name="config" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1type=AVC msg=audit(1583438413.926:503): avc: denied { create } for pid=5567 comm="git" name="tgjDNkv" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438413.926:504): avc: denied { unlink } for pid=5567 comm="git" name="tgjDNkv" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1583438415.493:505): avc: denied { link } for pid=5572 comm="git" name="tmp_pack_uWSQHj" dev="dm-0" ino=14897482 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438415.499:506): avc: denied { append } for pid=5567 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=9140793 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438415.524:507): avc: denied { create } for pid=5567 comm="git" name="ch_json2xml.pl" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438415.525:508): avc: denied { write } for pid=5567 comm="git" path="/easyepg/easyepg/rdt/ch_json2xml.pl" dev="dm-0" ino=14897492 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438415.542:509): avc: denied { rename } for pid=5567 comm="git" name="index.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438415.715:510): avc: denied { write } for pid=5582 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438417.261:511): avc: denied { rmdir } for pid=6119 comm="rm" name="branches" dev="dm-0" ino=1680193 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438417.261:512): avc: denied { unlink } for pid=6119 comm="rm" name="description" dev="dm-0" ino=14897477 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438417.277:513): avc: denied { remove_name } for pid=6119 comm="rm" name="easyepg" dev="dm-0" ino=9140785 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1583438418.143:514): avc: denied { setattr } for pid=6154 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1 type=AVC msg=audit(1583438418.143:515): avc: denied { setattr } for pid=6154 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
-
By the way: The image from "qoopido" is the one I'm trying to use. It's the same as in the linked tutorial.
podman search easyepg INDEX NAME DESCRIPTION STARS OFFICIAL AUTOMATED docker.io docker.io/mod242/easyepg Docker Image for easyepg 0 docker.io docker.io/qoopido/easyepg.minimal Minimal docker container to run easyepg 1 docker.io docker.io/takealug/easyepg A docker container for running easyepg with ... 1 docker.io docker.io/xuvin/easyepg easyEPG with Helper Script - Debian Base Ima... 0 docker.io docker.io/strowi/easyepg easyepg in a container 0
-
You can just tell podman to relabel the directory with :Z. For example:
podman run --rm -ti $PWD/mydirectory:/var/lib/something:Z fedora:31 bash
Now the $PWD/mydirectory has the
container_file_t
label. -
This is the initial setup:
docker start easyepg.admin docker exec -ti -u easyepg -w /easyepg easyepg.admin /bin/bash ./epg.sh
How to use the :Z option here? I read about it a lot but didn't get it to work.
After starting "docker/podman start easyepg.admin" I get those SELinux errors.The one and only reason why I want to try easyepg with docker / podman is because I overwrote my entire filesystem (there's a thread about this) after following this tutorial https://github.com/sunsettrack4/easyepg
# Setup to run the script daily at 3 AM 0 3 * * * cd ~/easyepg && bash epg.sh
This crontab entry is not working for me.
When I move manually to the easyepg directory and issue ./epg.sh the script is working fine. -
You would have to use it with the qoopido image.
Just start that image like a normal container and don't use that install script.
If you use that install script you have to manually set the SELinux context for the data directory.
-
@stacksofplates Okay. I'll try that way. I didn't tried that way yet.
-
I tried and I failed
When I try the qoopido image I cannot create necessary containers as described in the tutorial
When I try with the install script I get created necessary containers:[twolf@localhost ~]$ podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/qoopido/easyepg.minimal latest 2f0ab58083e6 5 days ago 519 MB [twolf@localhost ~]$ podman ps -a CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES 0e858d93e465 docker.io/qoopido/easyepg.minimal:latest 2 minutes ago Created easyepg.run 54b5774f1d6a docker.io/qoopido/easyepg.minimal:latest 2 minutes ago Created easyepg.admin
Starting container as described...
[twolf@localhost ~]$ podman start easyepg.admin easyepg.admin [twolf@localhost ~]$
... gives me:
type=AVC msg=audit(1583530938.391:329): avc: denied { create } for pid=32955 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c104,c340 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=0 type=AVC msg=audit(1583530938.391:330): avc: denied { remove_name } for pid=32955 comm="git" name=".git" dev="dm-0" ino=372780 scontext=system_u:system_r:container_t:s0:c104,c340 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1583530938.398:332): avc: denied { remove_name } for pid=32957 comm="rm" name="easyepg" dev="dm-0" ino=13846779 scontext=system_u:system_r:container_t:s0:c104,c340 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
-
If you want to run it the other way, just set the context for the directories you want to mount. They should be
container_t
. -
And how do I do it? That's the part with SELinux I have no idea...
-
You would have to use it with the qoopido image.
Just start that image like a normal container and don't use that install script.
If you use that install script you have to manually set the SELinux context for the data directory.
To temporarily set it you can just do
chcon -t container_t the-directory
. -
I tried with chcon -t container_t easyepg.
I moved easyepg to /home/myuser/easyepg[twolf@localhost ~]$ podman start easyepg.admin Error: unable to start container "easyepg.admin": set propagation for `/home/twolf/.local/share/containers/storage/overlay/78126aba7a4e047b690f0c6ce66d36e7b04043f04d8b994c53cf92982e9ce29d/merged/easyepg`: Permission denied: OCI runtime permission denied error
When I "pause" SELinux both containers are working fine.
[twolf@localhost ~]$ podman start easyepg.admin easyepg.admin [twolf@localhost ~]$ podman start easyepg.run easyepg.run
Cloning into '/easyepg/easyepg'... Updating main... Updating Horizon... 'easyepg/hzn/hzn.sh' -> 'hzn/hzn.sh' 'easyepg/hzn/hzn.sh' -> 'hzn/de/' 'easyepg/hzn/hzn.sh' -> 'hzn/at/' 'easyepg/hzn/hzn.sh' -> 'hzn/ch/' 'easyepg/hzn/hzn.sh' -> 'hzn/nl/' 'easyepg/hzn/hzn.sh' -> 'hzn/pl/' 'easyepg/hzn/hzn.sh' -> 'hzn/ie/' 'easyepg/hzn/hzn.sh' -> 'hzn/sk/' 'easyepg/hzn/hzn.sh' -> 'hzn/cz/' 'easyepg/hzn/hzn.sh' -> 'hzn/hu/' 'easyepg/hzn/hzn.sh' -> 'hzn/ro/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ch_json2xml.pl' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/de/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/at/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ch/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/nl/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/pl/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ie/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/sk/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/cz/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/hu/' 'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ro/' 'easyepg/hzn/cid_json.pl' -> 'hzn/cid_json.pl' 'easyepg/hzn/cid_json.pl' -> 'hzn/de/' 'easyepg/hzn/cid_json.pl' -> 'hzn/at/' 'easyepg/hzn/cid_json.pl' -> 'hzn/ch/' 'easyepg/hzn/cid_json.pl' -> 'hzn/nl/' 'easyepg/hzn/cid_json.pl' -> 'hzn/pl/' 'easyepg/hzn/cid_json.pl' -> 'hzn/ie/' 'easyepg/hzn/cid_json.pl' -> 'hzn/sk/' 'easyepg/hzn/cid_json.pl' -> 'hzn/cz/' 'easyepg/hzn/cid_json.pl' -> 'hzn/hu/' 'easyepg/hzn/cid_json.pl' -> 'hzn/ro/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/epg_json2xml.pl' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/de/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/at/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/ch/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/nl/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/pl/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/ie/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/sk/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/cz/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/hu/' 'easyepg/hzn/epg_json2xml.pl' -> 'hzn/ro/' 'easyepg/hzn/settings.sh' -> 'hzn/settings.sh' 'easyepg/hzn/settings.sh' -> 'hzn/de/' 'easyepg/hzn/settings.sh' -> 'hzn/at/' 'easyepg/hzn/settings.sh' -> 'hzn/ch/' 'easyepg/hzn/settings.sh' -> 'hzn/nl/' 'easyepg/hzn/settings.sh' -> 'hzn/pl/' 'easyepg/hzn/settings.sh' -> 'hzn/ie/' 'easyepg/hzn/settings.sh' -> 'hzn/sk/' 'easyepg/hzn/settings.sh' -> 'hzn/cz/' 'easyepg/hzn/settings.sh' -> 'hzn/hu/' 'easyepg/hzn/settings.sh' -> 'hzn/ro/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/chlist_printer.pl' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/de/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/at/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/ch/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/nl/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/pl/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/ie/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/sk/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/cz/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/hu/' 'easyepg/hzn/chlist_printer.pl' -> 'hzn/ro/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/compare_menu.pl' 'easyepg/hzn/compare_menu.pl' -> 'hzn/de/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/at/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/ch/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/nl/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/pl/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/ie/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/sk/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/cz/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/hu/' 'easyepg/hzn/compare_menu.pl' -> 'hzn/ro/' 'easyepg/hzn/url_printer.pl' -> 'hzn/url_printer.pl' 'easyepg/hzn/url_printer.pl' -> 'hzn/de/' 'easyepg/hzn/url_printer.pl' -> 'hzn/at/' 'easyepg/hzn/url_printer.pl' -> 'hzn/ch/' 'easyepg/hzn/url_printer.pl' -> 'hzn/nl/' 'easyepg/hzn/url_printer.pl' -> 'hzn/pl/' 'easyepg/hzn/url_printer.pl' -> 'hzn/ie/' 'easyepg/hzn/url_printer.pl' -> 'hzn/sk/' 'easyepg/hzn/url_printer.pl' -> 'hzn/cz/' 'easyepg/hzn/url_printer.pl' -> 'hzn/hu/' 'easyepg/hzn/url_printer.pl' -> 'hzn/ro/' Updating Zattoo... 'easyepg/ztt/ztt.sh' -> 'ztt/ztt.sh' 'easyepg/ztt/ztt.sh' -> 'ztt/de/' 'easyepg/ztt/ztt.sh' -> 'ztt/ch/' 'easyepg/ztt/settings.sh' -> 'ztt/settings.sh' 'easyepg/ztt/settings.sh' -> 'ztt/de/' 'easyepg/ztt/settings.sh' -> 'ztt/ch/' 'easyepg/ztt/compare_crid.pl' -> 'ztt/compare_crid.pl' 'easyepg/ztt/compare_crid.pl' -> 'ztt/de/' 'easyepg/ztt/compare_crid.pl' -> 'ztt/ch/' 'easyepg/ztt/save_page.js' -> 'ztt/save_page.js' 'easyepg/ztt/save_page.js' -> 'ztt/de/' 'easyepg/ztt/save_page.js' -> 'ztt/ch/' 'easyepg/ztt/epg_json2xml.pl' -> 'ztt/epg_json2xml.pl' 'easyepg/ztt/epg_json2xml.pl' -> 'ztt/de/' 'easyepg/ztt/epg_json2xml.pl' -> 'ztt/ch/' 'easyepg/ztt/ch_json2xml.pl' -> 'ztt/ch_json2xml.pl' 'easyepg/ztt/ch_json2xml.pl' -> 'ztt/de/' 'easyepg/ztt/ch_json2xml.pl' -> 'ztt/ch/' 'easyepg/ztt/cid_json.pl' -> 'ztt/cid_json.pl' 'easyepg/ztt/cid_json.pl' -> 'ztt/de/' 'easyepg/ztt/cid_json.pl' -> 'ztt/ch/' 'easyepg/ztt/chlist_printer.pl' -> 'ztt/chlist_printer.pl' 'easyepg/ztt/chlist_printer.pl' -> 'ztt/de/' 'easyepg/ztt/chlist_printer.pl' -> 'ztt/ch/' 'easyepg/ztt/compare_menu.pl' -> 'ztt/compare_menu.pl' 'easyepg/ztt/compare_menu.pl' -> 'ztt/de/' 'easyepg/ztt/compare_menu.pl' -> 'ztt/ch/' Updating Swisscom... 'easyepg/swc/swc.sh' -> 'swc/swc.sh' 'easyepg/swc/swc.sh' -> 'swc/ch/' 'easyepg/swc/settings.sh' -> 'swc/settings.sh' 'easyepg/swc/settings.sh' -> 'swc/ch/' 'easyepg/swc/epg_json2xml.pl' -> 'swc/epg_json2xml.pl' 'easyepg/swc/epg_json2xml.pl' -> 'swc/ch/' 'easyepg/swc/ch_json2xml.pl' -> 'swc/ch_json2xml.pl' 'easyepg/swc/ch_json2xml.pl' -> 'swc/ch/' 'easyepg/swc/cid_json.pl' -> 'swc/cid_json.pl' 'easyepg/swc/cid_json.pl' -> 'swc/ch/' 'easyepg/swc/chlist_printer.pl' -> 'swc/chlist_printer.pl' 'easyepg/swc/chlist_printer.pl' -> 'swc/ch/' 'easyepg/swc/compare_menu.pl' -> 'swc/compare_menu.pl' 'easyepg/swc/compare_menu.pl' -> 'swc/ch/' 'easyepg/swc/url_printer.pl' -> 'swc/url_printer.pl' 'easyepg/swc/url_printer.pl' -> 'swc/ch/' Updating tvPlayer... 'easyepg/tvp/tvp.sh' -> 'tvp/tvp.sh' 'easyepg/tvp/tvp.sh' -> 'tvp/uk/' 'easyepg/tvp/settings.sh' -> 'tvp/settings.sh' 'easyepg/tvp/settings.sh' -> 'tvp/uk/' 'easyepg/tvp/epg_json2xml.pl' -> 'tvp/epg_json2xml.pl' 'easyepg/tvp/epg_json2xml.pl' -> 'tvp/uk/' 'easyepg/tvp/ch_json2xml.pl' -> 'tvp/ch_json2xml.pl' 'easyepg/tvp/ch_json2xml.pl' -> 'tvp/uk/' 'easyepg/tvp/cid_json.pl' -> 'tvp/cid_json.pl' 'easyepg/tvp/cid_json.pl' -> 'tvp/uk/' 'easyepg/tvp/chlist_printer.pl' -> 'tvp/chlist_printer.pl' 'easyepg/tvp/chlist_printer.pl' -> 'tvp/uk/' 'easyepg/tvp/compare_menu.pl' -> 'tvp/compare_menu.pl' 'easyepg/tvp/compare_menu.pl' -> 'tvp/uk/' 'easyepg/tvp/compare_crid.pl' -> 'tvp/compare_crid.pl' 'easyepg/tvp/compare_crid.pl' -> 'tvp/uk/' Updating Telekom... 'easyepg/tkm/tkm.sh' -> 'tkm/tkm.sh' 'easyepg/tkm/tkm.sh' -> 'tkm/de/' 'easyepg/tkm/settings.sh' -> 'tkm/settings.sh' 'easyepg/tkm/settings.sh' -> 'tkm/de/' 'easyepg/tkm/epg_json2xml.pl' -> 'tkm/epg_json2xml.pl' 'easyepg/tkm/epg_json2xml.pl' -> 'tkm/de/' 'easyepg/tkm/ch_json2xml.pl' -> 'tkm/ch_json2xml.pl' 'easyepg/tkm/ch_json2xml.pl' -> 'tkm/de/' 'easyepg/tkm/cid_json.pl' -> 'tkm/cid_json.pl' 'easyepg/tkm/cid_json.pl' -> 'tkm/de/' 'easyepg/tkm/chlist_printer.pl' -> 'tkm/chlist_printer.pl' 'easyepg/tkm/chlist_printer.pl' -> 'tkm/de/' 'easyepg/tkm/compare_menu.pl' -> 'tkm/compare_menu.pl' 'easyepg/tkm/compare_menu.pl' -> 'tkm/de/' 'easyepg/tkm/url_printer.pl' -> 'tkm/url_printer.pl' 'easyepg/tkm/url_printer.pl' -> 'tkm/de/' 'easyepg/tkm/proxy.sh' -> 'tkm/proxy.sh' 'easyepg/tkm/proxy.sh' -> 'tkm/de/' 'easyepg/tkm/web_magentatv_de.php' -> 'tkm/web_magentatv_de.php' 'easyepg/tkm/web_magentatv_de.php' -> 'tkm/de/' Updating RadioTimes... 'easyepg/rdt/rdt.sh' -> 'rdt/rdt.sh' 'easyepg/rdt/rdt.sh' -> 'rdt/uk/' 'easyepg/rdt/settings.sh' -> 'rdt/settings.sh' 'easyepg/rdt/settings.sh' -> 'rdt/uk/' 'easyepg/rdt/epg_json2xml.pl' -> 'rdt/epg_json2xml.pl' 'easyepg/rdt/epg_json2xml.pl' -> 'rdt/uk/' 'easyepg/rdt/ch_json2xml.pl' -> 'rdt/ch_json2xml.pl' 'easyepg/rdt/ch_json2xml.pl' -> 'rdt/uk/' 'easyepg/rdt/cid_json.pl' -> 'rdt/cid_json.pl' 'easyepg/rdt/cid_json.pl' -> 'rdt/uk/' 'easyepg/rdt/chlist_printer.pl' -> 'rdt/chlist_printer.pl' 'easyepg/rdt/chlist_printer.pl' -> 'rdt/uk/' 'easyepg/rdt/compare_menu.pl' -> 'rdt/compare_menu.pl' 'easyepg/rdt/compare_menu.pl' -> 'rdt/uk/' 'easyepg/rdt/compare_crid.pl' -> 'rdt/compare_crid.pl' 'easyepg/rdt/compare_crid.pl' -> 'rdt/uk/' 'easyepg/rdt/url_printer.pl' -> 'rdt/url_printer.pl' 'easyepg/rdt/url_printer.pl' -> 'rdt/uk/' Updating waipu.tv... 'easyepg/wpu/wpu.sh' -> 'wpu/wpu.sh' 'easyepg/wpu/wpu.sh' -> 'wpu/de/' 'easyepg/wpu/settings.sh' -> 'wpu/settings.sh' 'easyepg/wpu/settings.sh' -> 'wpu/de/' 'easyepg/wpu/epg_json2xml.pl' -> 'wpu/epg_json2xml.pl' 'easyepg/wpu/epg_json2xml.pl' -> 'wpu/de/' 'easyepg/wpu/ch_json2xml.pl' -> 'wpu/ch_json2xml.pl' 'easyepg/wpu/ch_json2xml.pl' -> 'wpu/de/' 'easyepg/wpu/cid_json.pl' -> 'wpu/cid_json.pl' 'easyepg/wpu/cid_json.pl' -> 'wpu/de/' 'easyepg/wpu/chlist_printer.pl' -> 'wpu/chlist_printer.pl' 'easyepg/wpu/chlist_printer.pl' -> 'wpu/de/' 'easyepg/wpu/compare_menu.pl' -> 'wpu/compare_menu.pl' 'easyepg/wpu/compare_menu.pl' -> 'wpu/de/' Updating TV-Spielfilm... 'easyepg/tvs/tvs.sh' -> 'tvs/tvs.sh' 'easyepg/tvs/tvs.sh' -> 'tvs/de/' 'easyepg/tvs/settings.sh' -> 'tvs/settings.sh' 'easyepg/tvs/settings.sh' -> 'tvs/de/' 'easyepg/tvs/epg_json2xml.pl' -> 'tvs/epg_json2xml.pl' 'easyepg/tvs/epg_json2xml.pl' -> 'tvs/de/' 'easyepg/tvs/ch_json2xml.pl' -> 'tvs/ch_json2xml.pl' 'easyepg/tvs/ch_json2xml.pl' -> 'tvs/de/' 'easyepg/tvs/cid_json.pl' -> 'tvs/cid_json.pl' 'easyepg/tvs/cid_json.pl' -> 'tvs/de/' 'easyepg/tvs/chlist_printer.pl' -> 'tvs/chlist_printer.pl' 'easyepg/tvs/chlist_printer.pl' -> 'tvs/de/' 'easyepg/tvs/compare_menu.pl' -> 'tvs/compare_menu.pl' 'easyepg/tvs/compare_menu.pl' -> 'tvs/de/' 'easyepg/tvs/url_printer.pl' -> 'tvs/url_printer.pl' 'easyepg/tvs/url_printer.pl' -> 'tvs/de/' Updating VODAFONE... 'easyepg/vdf/vdf.sh' -> 'vdf/vdf.sh' 'easyepg/vdf/vdf.sh' -> 'vdf/de/' 'easyepg/vdf/settings.sh' -> 'vdf/settings.sh' 'easyepg/vdf/settings.sh' -> 'vdf/de/' 'easyepg/vdf/epg_json2xml.pl' -> 'vdf/epg_json2xml.pl' 'easyepg/vdf/epg_json2xml.pl' -> 'vdf/de/' 'easyepg/vdf/ch_json2xml.pl' -> 'vdf/ch_json2xml.pl' 'easyepg/vdf/ch_json2xml.pl' -> 'vdf/de/' 'easyepg/vdf/compare_crid.pl' -> 'vdf/compare_crid.pl' 'easyepg/vdf/compare_crid.pl' -> 'vdf/de/' 'easyepg/vdf/cid_json.pl' -> 'vdf/cid_json.pl' 'easyepg/vdf/cid_json.pl' -> 'vdf/de/' 'easyepg/vdf/chlist_printer.pl' -> 'vdf/chlist_printer.pl' 'easyepg/vdf/chlist_printer.pl' -> 'vdf/de/' 'easyepg/vdf/compare_menu.pl' -> 'vdf/compare_menu.pl' 'easyepg/vdf/compare_menu.pl' -> 'vdf/de/' 'easyepg/vdf/url_printer.pl' -> 'vdf/url_printer.pl' 'easyepg/vdf/url_printer.pl' -> 'vdf/de/' Updating TVTV... 'easyepg/tvtv/tvtv.sh' -> 'tvtv/tvtv.sh' 'easyepg/tvtv/tvtv.sh' -> 'tvtv/us/' 'easyepg/tvtv/tvtv.sh' -> 'tvtv/ca/' 'easyepg/tvtv/settings.sh' -> 'tvtv/settings.sh' 'easyepg/tvtv/settings.sh' -> 'tvtv/us/' 'easyepg/tvtv/settings.sh' -> 'tvtv/ca/' 'easyepg/tvtv/compare_crid.pl' -> 'tvtv/compare_crid.pl' 'easyepg/tvtv/compare_crid.pl' -> 'tvtv/us/' 'easyepg/tvtv/compare_crid.pl' -> 'tvtv/ca/' 'easyepg/tvtv/epg_json2xml.pl' -> 'tvtv/epg_json2xml.pl' 'easyepg/tvtv/epg_json2xml.pl' -> 'tvtv/us/' 'easyepg/tvtv/epg_json2xml.pl' -> 'tvtv/ca/' 'easyepg/tvtv/ch_json2xml.pl' -> 'tvtv/ch_json2xml.pl' 'easyepg/tvtv/ch_json2xml.pl' -> 'tvtv/us/' 'easyepg/tvtv/ch_json2xml.pl' -> 'tvtv/ca/' 'easyepg/tvtv/cid_json.pl' -> 'tvtv/cid_json.pl' 'easyepg/tvtv/cid_json.pl' -> 'tvtv/us/' 'easyepg/tvtv/cid_json.pl' -> 'tvtv/ca/' 'easyepg/tvtv/chlist_printer.pl' -> 'tvtv/chlist_printer.pl' 'easyepg/tvtv/chlist_printer.pl' -> 'tvtv/us/' 'easyepg/tvtv/chlist_printer.pl' -> 'tvtv/ca/' 'easyepg/tvtv/compare_menu.pl' -> 'tvtv/compare_menu.pl' 'easyepg/tvtv/compare_menu.pl' -> 'tvtv/us/' 'easyepg/tvtv/compare_menu.pl' -> 'tvtv/ca/' 'easyepg/tvtv/url_printer.pl' -> 'tvtv/url_printer.pl' 'easyepg/tvtv/url_printer.pl' -> 'tvtv/us/' 'easyepg/tvtv/url_printer.pl' -> 'tvtv/ca/' Updating External... 'easyepg/ext/ext.sh' -> 'ext/ext.sh' 'easyepg/ext/ext.sh' -> 'ext/oa/' 'easyepg/ext/ext.sh' -> 'ext/ob/' 'easyepg/ext/ext.sh' -> 'ext/oc/' 'easyepg/ext/settings.sh' -> 'ext/settings.sh' 'easyepg/ext/settings.sh' -> 'ext/oa/' 'easyepg/ext/settings.sh' -> 'ext/ob/' 'easyepg/ext/settings.sh' -> 'ext/oc/' 'easyepg/ext/epg_ext.pl' -> 'ext/epg_ext.pl' 'easyepg/ext/epg_ext.pl' -> 'ext/oa/' 'easyepg/ext/epg_ext.pl' -> 'ext/ob/' 'easyepg/ext/epg_ext.pl' -> 'ext/oc/' 'easyepg/ext/ch_ext.pl' -> 'ext/ch_ext.pl' 'easyepg/ext/ch_ext.pl' -> 'ext/oa/' 'easyepg/ext/ch_ext.pl' -> 'ext/ob/' 'easyepg/ext/ch_ext.pl' -> 'ext/oc/' 'easyepg/ext/compare_menu.pl' -> 'ext/compare_menu.pl' 'easyepg/ext/compare_menu.pl' -> 'ext/oa/' 'easyepg/ext/compare_menu.pl' -> 'ext/ob/' 'easyepg/ext/compare_menu.pl' -> 'ext/oc/' UPDATE FINISHED! Current default time zone: 'Europe/Berlin' Local time is now: Sun Mar 8 19:34:08 CET 2020. Universal Time is now: Sun Mar 8 18:34:08 UTC 2020. easyepg:x:1000:
-
are you also running Docker? I tried to do their pipe to script install and it failed because it couldn't connect to the Docker daemon.
-
I'm guessing the only way to do it with Podman is to build the Dockerfile and then most likely use Podman to make a pod of the containers you want to run.
-
Don't need to run Docker. I do not run Docker but the Docker to Podman alias package needs to install
dnf install podman-docker
With that installed, the script will find "Docker".
-
My apologies. I gave you the wrong SELinux label. The correct type is
container_file_t
. So run chcon -t container_file_t dir_name` and it should be the correct context.