-
Notifications
You must be signed in to change notification settings - Fork 27
extended attributes discarded for layered changes #654
Comments
Here is a workaround required due to this at the moment. Since bazzite is using rechunk this can be removed, but it is used throughout Universal Blue images and derivatives. For other applications as well. I was told this might be corrupting OSTree file hashes, and might be partially behind secureblue/secureblue#369 which fails when setting xattrs. Or at least the variant used there, since the only 5 files that error during |
@cgwalters , the mentioned workaround is for an executable on the host file system. If we know that we "lost" a capability in an executable inside a given image, is there a better way to set it rather than the following?
|
(edited) There's no trivial build-time workaround for this possible, the xattrs are being discarded on the client side. What would fix it is "rechunking" an image and generating an ostree commit, which we're working on tooling for, but is more invasive. |
@cgwalters, do we other options than rechunking? IDM is blocked on this issue, so I am trying to educate myself a bit more in this problem space. |
Hi Valentin, as a dirty workaround something like the service I posted above works and was used for months in Universal Blue for multiple projects |
Thanks for sharing, @antheas ! |
We are planning to move some of FreeIPA rpm post-install scripts into a separate service we can run on each reboot, so the approach to add capabilities through the hack is something that we might consider as well. However, for IdM customers modification of the immutable parts of the image at instantiation time would be unacceptable. |
This is fixed as part of #679 |
Right now when we filter the tar stream we end up discarding xattrs - there's a bit of nontrivial work necessary on our side to handle this.
It also opens up the interesting question of whether we try to e.g. honor any
security.selinux
that may be present.It is clear that we definitely want
security.capability
, and for that matter we might as well propagate things likeuser.
.The text was updated successfully, but these errors were encountered: