swift::storage::mount breaks selinux contexts
Bug #1320853 reported by
Lukas Bezdicka
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
puppet-swift |
Fix Released
|
Undecided
|
Lukas Bezdicka | ||
Icehouse |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
It is required to provide selinux context to mount or at least run restorecon to have correct context uppon mount.
Changed in puppet-swift: | |
assignee: | nobody → Lukas Bezdicka (social-b) |
status: | New → In Progress |
Changed in puppet-swift: | |
milestone: | none → 5.0.0 |
status: | Fix Committed → Fix Released |
To post a comment you must log in.
Reviewed: https:/ /review. openstack. org/94172 /git.openstack. org/cgit/ stackforge/ puppet- swift/commit/ ?id=9ca38e7e442 ac8e59bf21c78a4 3feea5c025501a
Committed: https:/
Submitter: Jenkins
Branch: master
commit 9ca38e7e442ac8e 59bf21c78a43fee a5c025501a
Author: Lukas Bezdicka <email address hidden>
Date: Mon May 19 13:25:44 2014 +0200
Restore selinux context on swift mount
Mounting devices without specifying or restoring context ends up with
default context file_t assigned for swift paths. On selinux systems it
is nice to at least try to preserve predefined contexts on paths.
Change-Id: I9b68c04cb0d4ee 72c074e514db714 1c3c077c978
Closes-Bug: rhbz#1095503
Closes-Bug: #1320853