Replies: 1 comment 20 replies
-
|
that is expected, One thing you could do is to add your rootless user to the group that owns that directory on the host and then use Although this looks more like a use case for a root container, since you need to access a resource that your rootless user has no access to |
Beta Was this translation helpful? Give feedback.
20 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I'm ultimately trying to setup crowdsec as a user's quadlet on coreos
I'm trying to mount
/var/log/journalto/var/log/hostfor a crowdsec quadlet.The quadlet is located here
/home/vic1707/.config/containers/systemd/crowdsec.container.But I'm doing my testing with
podman run commands.My user can read the journal dirs and files
Based on other discussions here I also ran the command withing
podman unshareBut currently no matter what I do, the directory always gets mounted as
nobody:nobodyI tried
--privileged,Z/z/Uin volume mount's options, I tried all sorts of combinations for--user,--userns,--uidmap,--gidmapwithout managing to get it to work, I'm missing something, Thanks for your help!Here are some more infos that might be helpful
Umount option results inError: failed to chown recursively host path: lchown /var/log/journal: operation not permittedeven if running as--privilegedZ/z:Error: lsetxattr(label=system_u:object_r:container_file_t:s0) /var/log/journal: operation not permittedeven if running as--privilegedBeta Was this translation helpful? Give feedback.
All reactions