Replies: 1 comment 20 replies
-
that is expected, One thing you could do is to add your rootless user to the group that owns that directory on the host and then use Although this looks more like a use case for a root container, since you need to access a resource that your rootless user has no access to |
Beta Was this translation helpful? Give feedback.
20 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I'm ultimately trying to setup crowdsec as a user's quadlet on coreos
I'm trying to mount
/var/log/journal
to/var/log/host
for a crowdsec quadlet.The quadlet is located here
/home/vic1707/.config/containers/systemd/crowdsec.container
.But I'm doing my testing with
podman run commands
.My user can read the journal dirs and files
Based on other discussions here I also ran the command withing
podman unshare
But currently no matter what I do, the directory always gets mounted as
nobody:nobody
I tried
--privileged
,Z/z/U
in volume mount's options, I tried all sorts of combinations for--user
,--userns
,--uidmap
,--gidmap
without managing to get it to work, I'm missing something, Thanks for your help!Here are some more infos that might be helpful
U
mount option results inError: failed to chown recursively host path: lchown /var/log/journal: operation not permitted
even if running as--privileged
Z/z
:Error: lsetxattr(label=system_u:object_r:container_file_t:s0) /var/log/journal: operation not permitted
even if running as--privileged
Beta Was this translation helpful? Give feedback.
All reactions