swift::storage::mount breaks selinux contexts

Bug #1320853 reported by Lukas Bezdicka
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
puppet-swift
Fix Released
Undecided
Lukas Bezdicka
Icehouse
Fix Released
Undecided
Unassigned

Bug Description

It is required to provide selinux context to mount or at least run restorecon to have correct context uppon mount.

Changed in puppet-swift:
assignee: nobody → Lukas Bezdicka (social-b)
status: New → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to puppet-swift (master)

Reviewed: https://review.openstack.org/94172
Committed: https://git.openstack.org/cgit/stackforge/puppet-swift/commit/?id=9ca38e7e442ac8e59bf21c78a43feea5c025501a
Submitter: Jenkins
Branch: master

commit 9ca38e7e442ac8e59bf21c78a43feea5c025501a
Author: Lukas Bezdicka <email address hidden>
Date: Mon May 19 13:25:44 2014 +0200

    Restore selinux context on swift mount

    Mounting devices without specifying or restoring context ends up with
    default context file_t assigned for swift paths. On selinux systems it
    is nice to at least try to preserve predefined contexts on paths.

    Change-Id: I9b68c04cb0d4ee72c074e514db7141c3c077c978
    Closes-Bug: rhbz#1095503
    Closes-Bug: #1320853

Changed in puppet-swift:
status: In Progress → Fix Committed
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to puppet-swift (stable/icehouse)

Fix proposed to branch: stable/icehouse
Review: https://review.openstack.org/97195

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to puppet-swift (stable/icehouse)

Reviewed: https://review.openstack.org/97195
Committed: https://git.openstack.org/cgit/stackforge/puppet-swift/commit/?id=94122b325cc11b2569a59355cc8cf6410dbfc945
Submitter: Jenkins
Branch: stable/icehouse

commit 94122b325cc11b2569a59355cc8cf6410dbfc945
Author: Lukas Bezdicka <email address hidden>
Date: Mon May 19 13:25:44 2014 +0200

    Restore selinux context on swift mount

    Mounting devices without specifying or restoring context ends up with
    default context file_t assigned for swift paths. On selinux systems it
    is nice to at least try to preserve predefined contexts on paths.

    Change-Id: I9b68c04cb0d4ee72c074e514db7141c3c077c978
    Closes-Bug: rhbz#1095503
    Closes-Bug: #1320853
    (cherry picked from commit 9ca38e7e442ac8e59bf21c78a43feea5c025501a)

tags: added: in-stable-icehouse
Mathieu Gagné (mgagne)
Changed in puppet-swift:
milestone: none → 5.0.0
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.