ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Woti
    3. Posts
    W
    • Profile
    • Following 0
    • Followers 0
    • Topics 4
    • Posts 72
    • Groups 0

    Posts

    Recent Best Controversial
    • RE: Fedora 31 Server, podman and SELinux

      No stress sir 🙂 Thanks for the command. I'll try it later.

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      Finally I tried again. I removed all images and container and easyepg directory. I created a new directory in my /home/user/easyepg.
      At first I run your SELinux command as root user. After that as user I run the script and I could successfully run the images without any SELinux errors 🙂

      That's nice 🙂

      I found out there was an image missing: easyepg.cron
      In the script file https://raw.githubusercontent.com/dlueth/easyepg.minimal/master/init they use the flag --restart unless-stopped.

      sh -c "docker create -l easyepg.minimal --name=easyepg.cron -e MODE=\"cron\" --restart unless-stopped ${OPTIONS} qoopido/easyepg.minimal:${TAG} 1> /dev/null"
      

      This flag isn't supported by Podman.
      I guess Podman won't start easyepg.cron after server restart?
      Is there any solution?

      I downloaded the script with wget and made it executable. I removed the flag --reload unless-stopped and it worked.
      As it said, now I could convert the script to Portman and is there any way to get the SELinux label to work after reboot of the server?

      Thanks a lot for your help so long @stacksofplates 🙂

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      No problem 🙂 Anyway it does not work. Plenty of SELinux errors. I'll stop now with Podman and try to get working the cronjob commando without overwriting file permissions.

      I'm running in a VM so I can play around and crash 😄

      Until I found a solution I'll issue the easyepg script manually on my Fedora Server host, just like I do today.

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      Don't need to run Docker. I do not run Docker but the Docker to Podman alias package needs to install

      dnf install podman-docker 
      

      With that installed, the script will find "Docker".

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      I tried with chcon -t container_t easyepg.
      I moved easyepg to /home/myuser/easyepg

      [twolf@localhost ~]$ podman start easyepg.admin
      Error: unable to start container "easyepg.admin": set propagation for `/home/twolf/.local/share/containers/storage/overlay/78126aba7a4e047b690f0c6ce66d36e7b04043f04d8b994c53cf92982e9ce29d/merged/easyepg`: Permission denied: OCI runtime permission denied error
      

      When I "pause" SELinux both containers are working fine.

      [twolf@localhost ~]$ podman start easyepg.admin
      easyepg.admin
      [twolf@localhost ~]$ podman start easyepg.run
      easyepg.run
      
      Cloning into '/easyepg/easyepg'...
      Updating main...
      Updating Horizon...
      'easyepg/hzn/hzn.sh' -> 'hzn/hzn.sh'
      'easyepg/hzn/hzn.sh' -> 'hzn/de/'
      'easyepg/hzn/hzn.sh' -> 'hzn/at/'
      'easyepg/hzn/hzn.sh' -> 'hzn/ch/'
      'easyepg/hzn/hzn.sh' -> 'hzn/nl/'
      'easyepg/hzn/hzn.sh' -> 'hzn/pl/'
      'easyepg/hzn/hzn.sh' -> 'hzn/ie/'
      'easyepg/hzn/hzn.sh' -> 'hzn/sk/'
      'easyepg/hzn/hzn.sh' -> 'hzn/cz/'
      'easyepg/hzn/hzn.sh' -> 'hzn/hu/'
      'easyepg/hzn/hzn.sh' -> 'hzn/ro/'
      'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ch_json2xml.pl'
      'easyepg/hzn/ch_json2xml.pl' -> 'hzn/de/'
      'easyepg/hzn/ch_json2xml.pl' -> 'hzn/at/'
      'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ch/'
      'easyepg/hzn/ch_json2xml.pl' -> 'hzn/nl/'
      'easyepg/hzn/ch_json2xml.pl' -> 'hzn/pl/'
      'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ie/'
      'easyepg/hzn/ch_json2xml.pl' -> 'hzn/sk/'
      'easyepg/hzn/ch_json2xml.pl' -> 'hzn/cz/'
      'easyepg/hzn/ch_json2xml.pl' -> 'hzn/hu/'
      'easyepg/hzn/ch_json2xml.pl' -> 'hzn/ro/'
      'easyepg/hzn/cid_json.pl' -> 'hzn/cid_json.pl'
      'easyepg/hzn/cid_json.pl' -> 'hzn/de/'
      'easyepg/hzn/cid_json.pl' -> 'hzn/at/'
      'easyepg/hzn/cid_json.pl' -> 'hzn/ch/'
      'easyepg/hzn/cid_json.pl' -> 'hzn/nl/'
      'easyepg/hzn/cid_json.pl' -> 'hzn/pl/'
      'easyepg/hzn/cid_json.pl' -> 'hzn/ie/'
      'easyepg/hzn/cid_json.pl' -> 'hzn/sk/'
      'easyepg/hzn/cid_json.pl' -> 'hzn/cz/'
      'easyepg/hzn/cid_json.pl' -> 'hzn/hu/'
      'easyepg/hzn/cid_json.pl' -> 'hzn/ro/'
      'easyepg/hzn/epg_json2xml.pl' -> 'hzn/epg_json2xml.pl'
      'easyepg/hzn/epg_json2xml.pl' -> 'hzn/de/'
      'easyepg/hzn/epg_json2xml.pl' -> 'hzn/at/'
      'easyepg/hzn/epg_json2xml.pl' -> 'hzn/ch/'
      'easyepg/hzn/epg_json2xml.pl' -> 'hzn/nl/'
      'easyepg/hzn/epg_json2xml.pl' -> 'hzn/pl/'
      'easyepg/hzn/epg_json2xml.pl' -> 'hzn/ie/'
      'easyepg/hzn/epg_json2xml.pl' -> 'hzn/sk/'
      'easyepg/hzn/epg_json2xml.pl' -> 'hzn/cz/'
      'easyepg/hzn/epg_json2xml.pl' -> 'hzn/hu/'
      'easyepg/hzn/epg_json2xml.pl' -> 'hzn/ro/'
      'easyepg/hzn/settings.sh' -> 'hzn/settings.sh'
      'easyepg/hzn/settings.sh' -> 'hzn/de/'
      'easyepg/hzn/settings.sh' -> 'hzn/at/'
      'easyepg/hzn/settings.sh' -> 'hzn/ch/'
      'easyepg/hzn/settings.sh' -> 'hzn/nl/'
      'easyepg/hzn/settings.sh' -> 'hzn/pl/'
      'easyepg/hzn/settings.sh' -> 'hzn/ie/'
      'easyepg/hzn/settings.sh' -> 'hzn/sk/'
      'easyepg/hzn/settings.sh' -> 'hzn/cz/'
      'easyepg/hzn/settings.sh' -> 'hzn/hu/'
      'easyepg/hzn/settings.sh' -> 'hzn/ro/'
      'easyepg/hzn/chlist_printer.pl' -> 'hzn/chlist_printer.pl'
      'easyepg/hzn/chlist_printer.pl' -> 'hzn/de/'
      'easyepg/hzn/chlist_printer.pl' -> 'hzn/at/'
      'easyepg/hzn/chlist_printer.pl' -> 'hzn/ch/'
      'easyepg/hzn/chlist_printer.pl' -> 'hzn/nl/'
      'easyepg/hzn/chlist_printer.pl' -> 'hzn/pl/'
      'easyepg/hzn/chlist_printer.pl' -> 'hzn/ie/'
      'easyepg/hzn/chlist_printer.pl' -> 'hzn/sk/'
      'easyepg/hzn/chlist_printer.pl' -> 'hzn/cz/'
      'easyepg/hzn/chlist_printer.pl' -> 'hzn/hu/'
      'easyepg/hzn/chlist_printer.pl' -> 'hzn/ro/'
      'easyepg/hzn/compare_menu.pl' -> 'hzn/compare_menu.pl'
      'easyepg/hzn/compare_menu.pl' -> 'hzn/de/'
      'easyepg/hzn/compare_menu.pl' -> 'hzn/at/'
      'easyepg/hzn/compare_menu.pl' -> 'hzn/ch/'
      'easyepg/hzn/compare_menu.pl' -> 'hzn/nl/'
      'easyepg/hzn/compare_menu.pl' -> 'hzn/pl/'
      'easyepg/hzn/compare_menu.pl' -> 'hzn/ie/'
      'easyepg/hzn/compare_menu.pl' -> 'hzn/sk/'
      'easyepg/hzn/compare_menu.pl' -> 'hzn/cz/'
      'easyepg/hzn/compare_menu.pl' -> 'hzn/hu/'
      'easyepg/hzn/compare_menu.pl' -> 'hzn/ro/'
      'easyepg/hzn/url_printer.pl' -> 'hzn/url_printer.pl'
      'easyepg/hzn/url_printer.pl' -> 'hzn/de/'
      'easyepg/hzn/url_printer.pl' -> 'hzn/at/'
      'easyepg/hzn/url_printer.pl' -> 'hzn/ch/'
      'easyepg/hzn/url_printer.pl' -> 'hzn/nl/'
      'easyepg/hzn/url_printer.pl' -> 'hzn/pl/'
      'easyepg/hzn/url_printer.pl' -> 'hzn/ie/'
      'easyepg/hzn/url_printer.pl' -> 'hzn/sk/'
      'easyepg/hzn/url_printer.pl' -> 'hzn/cz/'
      'easyepg/hzn/url_printer.pl' -> 'hzn/hu/'
      'easyepg/hzn/url_printer.pl' -> 'hzn/ro/'
      Updating Zattoo...
      'easyepg/ztt/ztt.sh' -> 'ztt/ztt.sh'
      'easyepg/ztt/ztt.sh' -> 'ztt/de/'
      'easyepg/ztt/ztt.sh' -> 'ztt/ch/'
      'easyepg/ztt/settings.sh' -> 'ztt/settings.sh'
      'easyepg/ztt/settings.sh' -> 'ztt/de/'
      'easyepg/ztt/settings.sh' -> 'ztt/ch/'
      'easyepg/ztt/compare_crid.pl' -> 'ztt/compare_crid.pl'
      'easyepg/ztt/compare_crid.pl' -> 'ztt/de/'
      'easyepg/ztt/compare_crid.pl' -> 'ztt/ch/'
      'easyepg/ztt/save_page.js' -> 'ztt/save_page.js'
      'easyepg/ztt/save_page.js' -> 'ztt/de/'
      'easyepg/ztt/save_page.js' -> 'ztt/ch/'
      'easyepg/ztt/epg_json2xml.pl' -> 'ztt/epg_json2xml.pl'
      'easyepg/ztt/epg_json2xml.pl' -> 'ztt/de/'
      'easyepg/ztt/epg_json2xml.pl' -> 'ztt/ch/'
      'easyepg/ztt/ch_json2xml.pl' -> 'ztt/ch_json2xml.pl'
      'easyepg/ztt/ch_json2xml.pl' -> 'ztt/de/'
      'easyepg/ztt/ch_json2xml.pl' -> 'ztt/ch/'
      'easyepg/ztt/cid_json.pl' -> 'ztt/cid_json.pl'
      'easyepg/ztt/cid_json.pl' -> 'ztt/de/'
      'easyepg/ztt/cid_json.pl' -> 'ztt/ch/'
      'easyepg/ztt/chlist_printer.pl' -> 'ztt/chlist_printer.pl'
      'easyepg/ztt/chlist_printer.pl' -> 'ztt/de/'
      'easyepg/ztt/chlist_printer.pl' -> 'ztt/ch/'
      'easyepg/ztt/compare_menu.pl' -> 'ztt/compare_menu.pl'
      'easyepg/ztt/compare_menu.pl' -> 'ztt/de/'
      'easyepg/ztt/compare_menu.pl' -> 'ztt/ch/'
      Updating Swisscom...
      'easyepg/swc/swc.sh' -> 'swc/swc.sh'
      'easyepg/swc/swc.sh' -> 'swc/ch/'
      'easyepg/swc/settings.sh' -> 'swc/settings.sh'
      'easyepg/swc/settings.sh' -> 'swc/ch/'
      'easyepg/swc/epg_json2xml.pl' -> 'swc/epg_json2xml.pl'
      'easyepg/swc/epg_json2xml.pl' -> 'swc/ch/'
      'easyepg/swc/ch_json2xml.pl' -> 'swc/ch_json2xml.pl'
      'easyepg/swc/ch_json2xml.pl' -> 'swc/ch/'
      'easyepg/swc/cid_json.pl' -> 'swc/cid_json.pl'
      'easyepg/swc/cid_json.pl' -> 'swc/ch/'
      'easyepg/swc/chlist_printer.pl' -> 'swc/chlist_printer.pl'
      'easyepg/swc/chlist_printer.pl' -> 'swc/ch/'
      'easyepg/swc/compare_menu.pl' -> 'swc/compare_menu.pl'
      'easyepg/swc/compare_menu.pl' -> 'swc/ch/'
      'easyepg/swc/url_printer.pl' -> 'swc/url_printer.pl'
      'easyepg/swc/url_printer.pl' -> 'swc/ch/'
      Updating tvPlayer...
      'easyepg/tvp/tvp.sh' -> 'tvp/tvp.sh'
      'easyepg/tvp/tvp.sh' -> 'tvp/uk/'
      'easyepg/tvp/settings.sh' -> 'tvp/settings.sh'
      'easyepg/tvp/settings.sh' -> 'tvp/uk/'
      'easyepg/tvp/epg_json2xml.pl' -> 'tvp/epg_json2xml.pl'
      'easyepg/tvp/epg_json2xml.pl' -> 'tvp/uk/'
      'easyepg/tvp/ch_json2xml.pl' -> 'tvp/ch_json2xml.pl'
      'easyepg/tvp/ch_json2xml.pl' -> 'tvp/uk/'
      'easyepg/tvp/cid_json.pl' -> 'tvp/cid_json.pl'
      'easyepg/tvp/cid_json.pl' -> 'tvp/uk/'
      'easyepg/tvp/chlist_printer.pl' -> 'tvp/chlist_printer.pl'
      'easyepg/tvp/chlist_printer.pl' -> 'tvp/uk/'
      'easyepg/tvp/compare_menu.pl' -> 'tvp/compare_menu.pl'
      'easyepg/tvp/compare_menu.pl' -> 'tvp/uk/'
      'easyepg/tvp/compare_crid.pl' -> 'tvp/compare_crid.pl'
      'easyepg/tvp/compare_crid.pl' -> 'tvp/uk/'
      Updating Telekom...
      'easyepg/tkm/tkm.sh' -> 'tkm/tkm.sh'
      'easyepg/tkm/tkm.sh' -> 'tkm/de/'
      'easyepg/tkm/settings.sh' -> 'tkm/settings.sh'
      'easyepg/tkm/settings.sh' -> 'tkm/de/'
      'easyepg/tkm/epg_json2xml.pl' -> 'tkm/epg_json2xml.pl'
      'easyepg/tkm/epg_json2xml.pl' -> 'tkm/de/'
      'easyepg/tkm/ch_json2xml.pl' -> 'tkm/ch_json2xml.pl'
      'easyepg/tkm/ch_json2xml.pl' -> 'tkm/de/'
      'easyepg/tkm/cid_json.pl' -> 'tkm/cid_json.pl'
      'easyepg/tkm/cid_json.pl' -> 'tkm/de/'
      'easyepg/tkm/chlist_printer.pl' -> 'tkm/chlist_printer.pl'
      'easyepg/tkm/chlist_printer.pl' -> 'tkm/de/'
      'easyepg/tkm/compare_menu.pl' -> 'tkm/compare_menu.pl'
      'easyepg/tkm/compare_menu.pl' -> 'tkm/de/'
      'easyepg/tkm/url_printer.pl' -> 'tkm/url_printer.pl'
      'easyepg/tkm/url_printer.pl' -> 'tkm/de/'
      'easyepg/tkm/proxy.sh' -> 'tkm/proxy.sh'
      'easyepg/tkm/proxy.sh' -> 'tkm/de/'
      'easyepg/tkm/web_magentatv_de.php' -> 'tkm/web_magentatv_de.php'
      'easyepg/tkm/web_magentatv_de.php' -> 'tkm/de/'
      Updating RadioTimes...
      'easyepg/rdt/rdt.sh' -> 'rdt/rdt.sh'
      'easyepg/rdt/rdt.sh' -> 'rdt/uk/'
      'easyepg/rdt/settings.sh' -> 'rdt/settings.sh'
      'easyepg/rdt/settings.sh' -> 'rdt/uk/'
      'easyepg/rdt/epg_json2xml.pl' -> 'rdt/epg_json2xml.pl'
      'easyepg/rdt/epg_json2xml.pl' -> 'rdt/uk/'
      'easyepg/rdt/ch_json2xml.pl' -> 'rdt/ch_json2xml.pl'
      'easyepg/rdt/ch_json2xml.pl' -> 'rdt/uk/'
      'easyepg/rdt/cid_json.pl' -> 'rdt/cid_json.pl'
      'easyepg/rdt/cid_json.pl' -> 'rdt/uk/'
      'easyepg/rdt/chlist_printer.pl' -> 'rdt/chlist_printer.pl'
      'easyepg/rdt/chlist_printer.pl' -> 'rdt/uk/'
      'easyepg/rdt/compare_menu.pl' -> 'rdt/compare_menu.pl'
      'easyepg/rdt/compare_menu.pl' -> 'rdt/uk/'
      'easyepg/rdt/compare_crid.pl' -> 'rdt/compare_crid.pl'
      'easyepg/rdt/compare_crid.pl' -> 'rdt/uk/'
      'easyepg/rdt/url_printer.pl' -> 'rdt/url_printer.pl'
      'easyepg/rdt/url_printer.pl' -> 'rdt/uk/'
      Updating waipu.tv...
      'easyepg/wpu/wpu.sh' -> 'wpu/wpu.sh'
      'easyepg/wpu/wpu.sh' -> 'wpu/de/'
      'easyepg/wpu/settings.sh' -> 'wpu/settings.sh'
      'easyepg/wpu/settings.sh' -> 'wpu/de/'
      'easyepg/wpu/epg_json2xml.pl' -> 'wpu/epg_json2xml.pl'
      'easyepg/wpu/epg_json2xml.pl' -> 'wpu/de/'
      'easyepg/wpu/ch_json2xml.pl' -> 'wpu/ch_json2xml.pl'
      'easyepg/wpu/ch_json2xml.pl' -> 'wpu/de/'
      'easyepg/wpu/cid_json.pl' -> 'wpu/cid_json.pl'
      'easyepg/wpu/cid_json.pl' -> 'wpu/de/'
      'easyepg/wpu/chlist_printer.pl' -> 'wpu/chlist_printer.pl'
      'easyepg/wpu/chlist_printer.pl' -> 'wpu/de/'
      'easyepg/wpu/compare_menu.pl' -> 'wpu/compare_menu.pl'
      'easyepg/wpu/compare_menu.pl' -> 'wpu/de/'
      Updating TV-Spielfilm...
      'easyepg/tvs/tvs.sh' -> 'tvs/tvs.sh'
      'easyepg/tvs/tvs.sh' -> 'tvs/de/'
      'easyepg/tvs/settings.sh' -> 'tvs/settings.sh'
      'easyepg/tvs/settings.sh' -> 'tvs/de/'
      'easyepg/tvs/epg_json2xml.pl' -> 'tvs/epg_json2xml.pl'
      'easyepg/tvs/epg_json2xml.pl' -> 'tvs/de/'
      'easyepg/tvs/ch_json2xml.pl' -> 'tvs/ch_json2xml.pl'
      'easyepg/tvs/ch_json2xml.pl' -> 'tvs/de/'
      'easyepg/tvs/cid_json.pl' -> 'tvs/cid_json.pl'
      'easyepg/tvs/cid_json.pl' -> 'tvs/de/'
      'easyepg/tvs/chlist_printer.pl' -> 'tvs/chlist_printer.pl'
      'easyepg/tvs/chlist_printer.pl' -> 'tvs/de/'
      'easyepg/tvs/compare_menu.pl' -> 'tvs/compare_menu.pl'
      'easyepg/tvs/compare_menu.pl' -> 'tvs/de/'
      'easyepg/tvs/url_printer.pl' -> 'tvs/url_printer.pl'
      'easyepg/tvs/url_printer.pl' -> 'tvs/de/'
      Updating VODAFONE...
      'easyepg/vdf/vdf.sh' -> 'vdf/vdf.sh'
      'easyepg/vdf/vdf.sh' -> 'vdf/de/'
      'easyepg/vdf/settings.sh' -> 'vdf/settings.sh'
      'easyepg/vdf/settings.sh' -> 'vdf/de/'
      'easyepg/vdf/epg_json2xml.pl' -> 'vdf/epg_json2xml.pl'
      'easyepg/vdf/epg_json2xml.pl' -> 'vdf/de/'
      'easyepg/vdf/ch_json2xml.pl' -> 'vdf/ch_json2xml.pl'
      'easyepg/vdf/ch_json2xml.pl' -> 'vdf/de/'
      'easyepg/vdf/compare_crid.pl' -> 'vdf/compare_crid.pl'
      'easyepg/vdf/compare_crid.pl' -> 'vdf/de/'
      'easyepg/vdf/cid_json.pl' -> 'vdf/cid_json.pl'
      'easyepg/vdf/cid_json.pl' -> 'vdf/de/'
      'easyepg/vdf/chlist_printer.pl' -> 'vdf/chlist_printer.pl'
      'easyepg/vdf/chlist_printer.pl' -> 'vdf/de/'
      'easyepg/vdf/compare_menu.pl' -> 'vdf/compare_menu.pl'
      'easyepg/vdf/compare_menu.pl' -> 'vdf/de/'
      'easyepg/vdf/url_printer.pl' -> 'vdf/url_printer.pl'
      'easyepg/vdf/url_printer.pl' -> 'vdf/de/'
      Updating TVTV...
      'easyepg/tvtv/tvtv.sh' -> 'tvtv/tvtv.sh'
      'easyepg/tvtv/tvtv.sh' -> 'tvtv/us/'
      'easyepg/tvtv/tvtv.sh' -> 'tvtv/ca/'
      'easyepg/tvtv/settings.sh' -> 'tvtv/settings.sh'
      'easyepg/tvtv/settings.sh' -> 'tvtv/us/'
      'easyepg/tvtv/settings.sh' -> 'tvtv/ca/'
      'easyepg/tvtv/compare_crid.pl' -> 'tvtv/compare_crid.pl'
      'easyepg/tvtv/compare_crid.pl' -> 'tvtv/us/'
      'easyepg/tvtv/compare_crid.pl' -> 'tvtv/ca/'
      'easyepg/tvtv/epg_json2xml.pl' -> 'tvtv/epg_json2xml.pl'
      'easyepg/tvtv/epg_json2xml.pl' -> 'tvtv/us/'
      'easyepg/tvtv/epg_json2xml.pl' -> 'tvtv/ca/'
      'easyepg/tvtv/ch_json2xml.pl' -> 'tvtv/ch_json2xml.pl'
      'easyepg/tvtv/ch_json2xml.pl' -> 'tvtv/us/'
      'easyepg/tvtv/ch_json2xml.pl' -> 'tvtv/ca/'
      'easyepg/tvtv/cid_json.pl' -> 'tvtv/cid_json.pl'
      'easyepg/tvtv/cid_json.pl' -> 'tvtv/us/'
      'easyepg/tvtv/cid_json.pl' -> 'tvtv/ca/'
      'easyepg/tvtv/chlist_printer.pl' -> 'tvtv/chlist_printer.pl'
      'easyepg/tvtv/chlist_printer.pl' -> 'tvtv/us/'
      'easyepg/tvtv/chlist_printer.pl' -> 'tvtv/ca/'
      'easyepg/tvtv/compare_menu.pl' -> 'tvtv/compare_menu.pl'
      'easyepg/tvtv/compare_menu.pl' -> 'tvtv/us/'
      'easyepg/tvtv/compare_menu.pl' -> 'tvtv/ca/'
      'easyepg/tvtv/url_printer.pl' -> 'tvtv/url_printer.pl'
      'easyepg/tvtv/url_printer.pl' -> 'tvtv/us/'
      'easyepg/tvtv/url_printer.pl' -> 'tvtv/ca/'
      Updating External...
      'easyepg/ext/ext.sh' -> 'ext/ext.sh'
      'easyepg/ext/ext.sh' -> 'ext/oa/'
      'easyepg/ext/ext.sh' -> 'ext/ob/'
      'easyepg/ext/ext.sh' -> 'ext/oc/'
      'easyepg/ext/settings.sh' -> 'ext/settings.sh'
      'easyepg/ext/settings.sh' -> 'ext/oa/'
      'easyepg/ext/settings.sh' -> 'ext/ob/'
      'easyepg/ext/settings.sh' -> 'ext/oc/'
      'easyepg/ext/epg_ext.pl' -> 'ext/epg_ext.pl'
      'easyepg/ext/epg_ext.pl' -> 'ext/oa/'
      'easyepg/ext/epg_ext.pl' -> 'ext/ob/'
      'easyepg/ext/epg_ext.pl' -> 'ext/oc/'
      'easyepg/ext/ch_ext.pl' -> 'ext/ch_ext.pl'
      'easyepg/ext/ch_ext.pl' -> 'ext/oa/'
      'easyepg/ext/ch_ext.pl' -> 'ext/ob/'
      'easyepg/ext/ch_ext.pl' -> 'ext/oc/'
      'easyepg/ext/compare_menu.pl' -> 'ext/compare_menu.pl'
      'easyepg/ext/compare_menu.pl' -> 'ext/oa/'
      'easyepg/ext/compare_menu.pl' -> 'ext/ob/'
      'easyepg/ext/compare_menu.pl' -> 'ext/oc/'
      UPDATE FINISHED!
      
      Current default time zone: 'Europe/Berlin'
      Local time is now:      Sun Mar  8 19:34:08 CET 2020.
      Universal Time is now:  Sun Mar  8 18:34:08 UTC 2020.
      
      easyepg:x:1000:
      
      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      And how do I do it? That's the part with SELinux I have no idea...

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      I tried and I failed 😞
      When I try the qoopido image I cannot create necessary containers as described in the tutorial
      When I try with the install script I get created necessary containers:

      [twolf@localhost ~]$ podman images
      REPOSITORY                          TAG      IMAGE ID       CREATED      SIZE
      docker.io/qoopido/easyepg.minimal   latest   2f0ab58083e6   5 days ago   519 MB
      [twolf@localhost ~]$ podman ps -a
      CONTAINER ID  IMAGE                                     COMMAND  CREATED        STATUS   PORTS  NAMES
      0e858d93e465  docker.io/qoopido/easyepg.minimal:latest           2 minutes ago  Created         easyepg.run
      54b5774f1d6a  docker.io/qoopido/easyepg.minimal:latest           2 minutes ago  Created         easyepg.admin
      

      Starting container as described...

      [twolf@localhost ~]$ podman start easyepg.admin
      easyepg.admin
      [twolf@localhost ~]$
      

      ... gives me:

      type=AVC msg=audit(1583530938.391:329): avc: denied { create } for pid=32955 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c104,c340 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=0 
      
      type=AVC msg=audit(1583530938.391:330): avc: denied { remove_name } for pid=32955 comm="git" name=".git" dev="dm-0" ino=372780 scontext=system_u:system_r:container_t:s0:c104,c340 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=0 
      
      type=AVC msg=audit(1583530938.398:332): avc: denied { remove_name } for pid=32957 comm="rm" name="easyepg" dev="dm-0" ino=13846779 scontext=system_u:system_r:container_t:s0:c104,c340 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0 
      
      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      @stacksofplates Okay. I'll try that way. I didn't tried that way yet.

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      This is the initial setup:

      docker start easyepg.admin
      docker exec -ti -u easyepg -w /easyepg easyepg.admin /bin/bash ./epg.sh
      

      How to use the :Z option here? I read about it a lot but didn't get it to work.
      After starting "docker/podman start easyepg.admin" I get those SELinux errors.

      The one and only reason why I want to try easyepg with docker / podman is because I overwrote my entire filesystem (there's a thread about this) after following this tutorial https://github.com/sunsettrack4/easyepg

      # Setup to run the script daily at 3 AM
      0 3 * * * cd ~/easyepg && bash epg.sh
      

      This crontab entry is not working for me.
      When I move manually to the easyepg directory and issue ./epg.sh the script is working fine.

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      By the way: The image from "qoopido" is the one I'm trying to use. It's the same as in the linked tutorial.

      podman search easyepg
      INDEX       NAME                                DESCRIPTION                                       STARS   OFFICIAL   AUTOMATED
      docker.io   docker.io/mod242/easyepg            Docker Image for easyepg                          0
      docker.io   docker.io/qoopido/easyepg.minimal   Minimal docker container to run easyepg           1
      docker.io   docker.io/takealug/easyepg          A docker container for running easyepg with ...   1
      docker.io   docker.io/xuvin/easyepg             easyEPG with Helper Script - Debian Base Ima...   0
      docker.io   docker.io/strowi/easyepg            easyepg in a container                            0
      
      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      Output 2 of 2 audit.log

      type=AVC msg=audit(1583437489.158:324): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tkm.sh" dev="dm-0" ino=4622383 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:325): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=4622384 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:326): avc:  denied  { setattr } for  pid=1995 comm="chown" name="web_magentatv_de.php" dev="dm-0" ino=4622385 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:327): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tkm" dev="dm-0" ino=4219936 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.159:328): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=8832681 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.159:329): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=8832819 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.159:330): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=8903342 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.159:331): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=8903498 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:332): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=8913684 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:333): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=9096147 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:334): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=9096148 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:335): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvp.sh" dev="dm-0" ino=9096149 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:336): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvp" dev="dm-0" ino=8785984 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.171:337): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=13167108 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:338): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=13167109 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:339): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=13167110 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:340): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=13167111 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:341): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=13167112 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:342): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=13167113 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:343): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvs.sh" dev="dm-0" ino=13167114 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:344): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=13167115 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.171:345): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvs" dev="dm-0" ino=13167107 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.171:346): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=499341 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.173:347): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=499347 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.173:348): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=499358 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.173:349): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=1125864 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.173:350): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=1125865 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.173:351): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=1125866 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.173:352): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=1125867 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.173:353): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvtv.sh" dev="dm-0" ino=1125868 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.173:354): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=1125869 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.173:355): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvtv" dev="dm-0" ino=499338 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.173:356): avc:  denied  { setattr } for  pid=1995 comm="chown" name="update.sh" dev="dm-0" ino=13167116 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.173:357): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=4622387 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.173:358): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=4622388 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:359): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=4622389 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:360): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=4622390 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:361): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=4622391 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:362): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=4622392 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:363): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=4622393 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:364): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=4622394 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:365): avc:  denied  { setattr } for  pid=1995 comm="chown" name="vdf.sh" dev="dm-0" ino=4622395 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:366): avc:  denied  { setattr } for  pid=1995 comm="chown" name="vdf" dev="dm-0" ino=4622386 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.174:367): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=9096151 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:368): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=9096152 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:369): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=9096153 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:370): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=9096154 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.174:371): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=9096155 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:372): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=9096156 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:373): avc:  denied  { setattr } for  pid=1995 comm="chown" name="wpu.sh" dev="dm-0" ino=9096157 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:374): avc:  denied  { setattr } for  pid=1995 comm="chown" name="wpu" dev="dm-0" ino=9096150 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.175:375): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=13167118 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:376): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=13167119 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:377): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=13167120 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:378): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=13167121 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:379): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=13167122 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:380): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=13167123 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:381): avc:  denied  { setattr } for  pid=1995 comm="chown" name="save_page.js" dev="dm-0" ino=13167124 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:382): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=13167125 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:383): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ztt.sh" dev="dm-0" ino=13167126 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.175:384): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ztt" dev="dm-0" ino=13167117 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.176:385): avc:  denied  { setattr } for  pid=1995 comm="chown" name="xml" dev="dm-0" ino=9241691 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.176:386): avc:  denied  { setattr } for  pid=1995 comm="chown" name="combine" dev="dm-0" ino=13726283 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.176:387): avc:  denied  { setattr } for  pid=1995 comm="chown" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437629.934:392): avc:  denied  { write } for  pid=2651 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583437629.934:393): avc:  denied  { add_name } for  pid=2651 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583437629.935:394): avc:  denied  { create } for  pid=2651 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583437629.937:395): avc:  denied  { write } for  pid=2651 comm="git" name="easyepg" dev="dm-0" ino=12658816 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583437629.937:396): avc:  denied  { add_name } for  pid=2651 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583437629.952:397): avc:  denied  { create } for  pid=2651 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583437629.954:398): avc:  denied  { write } for  pid=2651 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=9108398 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583437629.962:399): avc:  denied  { remove_name } for  pid=2651 comm="git" name="HEAD.lock" dev="dm-0" ino=1693069 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583437629.962:400): avc:  denied  { rename } for  pid=2651 comm="git" name="HEAD.lock" dev="dm-0" ino=1693069 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583437629.963:401): avc:  denied  { setattr } for  pid=2651 comm="git" name="config" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583437629.964:402): avc:  denied  { unlink } for  pid=2651 comm="git" name="config" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583437629.965:403): avc:  denied  { create } for  pid=2651 comm="git" name="tfdZp8t" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583437629.965:404): avc:  denied  { unlink } for  pid=2651 comm="git" name="tfdZp8t" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583437632.018:405): avc:  denied  { link } for  pid=2660 comm="git" name="tmp_pack_1aum5K" dev="dm-0" ino=4878847 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583437632.032:406): avc:  denied  { append } for  pid=2651 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=5189445 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583437632.220:407): avc:  denied  { write } for  pid=2667 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583437634.202:408): avc:  denied  { rmdir } for  pid=3204 comm="rm" name="branches" dev="dm-0" ino=4878843 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583437634.212:409): avc:  denied  { remove_name } for  pid=3204 comm="rm" name="easyepg" dev="dm-0" ino=12658816 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583437635.115:410): avc:  denied  { setattr } for  pid=3232 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583437635.116:411): avc:  denied  { setattr } for  pid=3232 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438005.400:426): avc:  denied  { write } for  pid=3454 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438005.400:427): avc:  denied  { add_name } for  pid=3454 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438005.400:428): avc:  denied  { create } for  pid=3454 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438005.402:429): avc:  denied  { write } for  pid=3454 comm="git" name="easyepg" dev="dm-0" ino=8667266 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438005.402:430): avc:  denied  { add_name } for  pid=3454 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438005.405:431): avc:  denied  { create } for  pid=3454 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438005.405:432): avc:  denied  { write } for  pid=3454 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=4878846 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438005.410:433): avc:  denied  { remove_name } for  pid=3454 comm="git" name="HEAD.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438005.410:434): avc:  denied  { rename } for  pid=3454 comm="git" name="HEAD.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438005.411:435): avc:  denied  { setattr } for  pid=3454 comm="git" name="config" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1type=AVC msg=audit(1583438005.411:436): avc:  denied  { unlink } for  pid=3454 comm="git" name="config" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438005.413:437): avc:  denied  { create } for  pid=3454 comm="git" name="tAU8v6D" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583438005.413:438): avc:  denied  { unlink } for  pid=3454 comm="git" name="tAU8v6D" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583438007.166:439): avc:  denied  { link } for  pid=3463 comm="git" name="tmp_pack_OWZZAV" dev="dm-0" ino=15145098 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438007.185:440): avc:  denied  { create } for  pid=3454 comm="git" name="packed-refs.lock" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438007.186:441): avc:  denied  { write } for  pid=3454 comm="git" path="/easyepg/easyepg/.git/packed-refs.lock" dev="dm-0" ino=15145101 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438007.188:442): avc:  denied  { rename } for  pid=3454 comm="git" name="packed-refs.new" dev="dm-0" ino=15145102 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438007.189:443): avc:  denied  { unlink } for  pid=3454 comm="git" name="packed-refs.lock" dev="dm-0" ino=15145101 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438007.191:444): avc:  denied  { append } for  pid=3454 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=1693072 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438007.194:445): avc:  denied  { setattr } for  pid=3454 comm="git" name="config.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438007.284:446): avc:  denied  { write } for  pid=3470 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438009.167:447): avc:  denied  { rmdir } for  pid=4007 comm="rm" name="branches" dev="dm-0" ino=1693060 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438009.175:448): avc:  denied  { remove_name } for  pid=4007 comm="rm" name="easyepg" dev="dm-0" ino=8667266 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438009.931:449): avc:  denied  { setattr } for  pid=4042 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438009.931:450): avc:  denied  { setattr } for  pid=4042 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438083.683:452): avc:  denied  { create } for  pid=4211 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438083.684:453): avc:  denied  { write } for  pid=4211 comm="git" name="easyepg" dev="dm-0" ino=1693058 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438083.684:454): avc:  denied  { add_name } for  pid=4211 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438083.690:455): avc:  denied  { remove_name } for  pid=4211 comm="git" name="HEAD.lock" dev="dm-0" ino=5189568 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438083.692:456): avc:  denied  { create } for  pid=4211 comm="git" name="tONRGVi" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583438083.692:457): avc:  denied  { unlink } for  pid=4211 comm="git" name="tONRGVi" dev="dm-0" ino=5189569 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583438085.463:458): avc:  denied  { link } for  pid=4217 comm="git" name="tmp_pack_GtRffg" dev="dm-0" ino=5189571 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438085.539:459): avc:  denied  { write } for  pid=4225 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438087.491:460): avc:  denied  { rmdir } for  pid=4743 comm="rm" name="branches" dev="dm-0" ino=9108396 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438087.500:461): avc:  denied  { write } for  pid=4743 comm="rm" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438087.500:462): avc:  denied  { remove_name } for  pid=4743 comm="rm" name="easyepg" dev="dm-0" ino=1693058 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438088.387:463): avc:  denied  { setattr } for  pid=4769 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438088.388:464): avc:  denied  { setattr } for  pid=4769 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438413.905:492): avc:  denied  { write } for  pid=5567 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438413.905:493): avc:  denied  { add_name } for  pid=5567 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438413.906:494): avc:  denied  { create } for  pid=5567 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438413.906:495): avc:  denied  { write } for  pid=5567 comm="git" name="easyepg" dev="dm-0" ino=9140785 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438413.906:496): avc:  denied  { add_name } for  pid=5567 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438413.916:497): avc:  denied  { create } for  pid=5567 comm="git" name="description" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438413.917:498): avc:  denied  { write } for  pid=5567 comm="git" path="/easyepg/easyepg/.git/description" dev="dm-0" ino=14897477 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438413.924:499): avc:  denied  { remove_name } for  pid=5567 comm="git" name="HEAD.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438413.924:500): avc:  denied  { rename } for  pid=5567 comm="git" name="HEAD.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438413.924:501): avc:  denied  { setattr } for  pid=5567 comm="git" name="config" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438413.925:502): avc:  denied  { unlink } for  pid=5567 comm="git" name="config" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1type=AVC msg=audit(1583438413.926:503): avc:  denied  { create } for  pid=5567 comm="git" name="tgjDNkv" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583438413.926:504): avc:  denied  { unlink } for  pid=5567 comm="git" name="tgjDNkv" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583438415.493:505): avc:  denied  { link } for  pid=5572 comm="git" name="tmp_pack_uWSQHj" dev="dm-0" ino=14897482 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438415.499:506): avc:  denied  { append } for  pid=5567 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=9140793 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438415.524:507): avc:  denied  { create } for  pid=5567 comm="git" name="ch_json2xml.pl" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438415.525:508): avc:  denied  { write } for  pid=5567 comm="git" path="/easyepg/easyepg/rdt/ch_json2xml.pl" dev="dm-0" ino=14897492 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438415.542:509): avc:  denied  { rename } for  pid=5567 comm="git" name="index.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438415.715:510): avc:  denied  { write } for  pid=5582 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438417.261:511): avc:  denied  { rmdir } for  pid=6119 comm="rm" name="branches" dev="dm-0" ino=1680193 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438417.261:512): avc:  denied  { unlink } for  pid=6119 comm="rm" name="description" dev="dm-0" ino=14897477 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438417.277:513): avc:  denied  { remove_name } for  pid=6119 comm="rm" name="easyepg" dev="dm-0" ino=9140785 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583438418.143:514): avc:  denied  { setattr } for  pid=6154 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583438418.143:515): avc:  denied  { setattr } for  pid=6154 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
      
      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      Output 1 of 2 audit.log

      type=AVC msg=audit(1583268530.225:308): avc:  denied  { write } for  pid=2673 comm="git" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583268657.393:313): avc:  denied  { write } for  pid=3024 comm="git" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583268949.079:371): avc:  denied  { add_name } for  pid=3682 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583269134.240:386): avc:  denied  { create } for  pid=3920 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583269242.611:406): avc:  denied  { create } for  pid=4143 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269242.611:407): avc:  denied  { write open } for  pid=4143 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=8739228 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269242.620:408): avc:  denied  { read } for  pid=4143 comm="git" path="/easyepg/easyepg/.git/HEAD.lock" dev="dm-0" ino=575190 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269242.620:409): avc:  denied  { remove_name } for  pid=4143 comm="git" name="HEAD.lock" dev="dm-0" ino=575190 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583269242.620:410): avc:  denied  { rename } for  pid=4143 comm="git" name="HEAD.lock" dev="dm-0" ino=575190 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269242.621:411): avc:  denied  { setattr } for  pid=4143 comm="git" name="config" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269242.621:412): avc:  denied  { map } for  pid=4143 comm="git" path="/easyepg/easyepg/.git/config" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269242.621:413): avc:  denied  { unlink } for  pid=4143 comm="git" name="config" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269242.622:414): avc:  denied  { create } for  pid=4143 comm="git" name="tLxMhAM" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583269242.622:415): avc:  denied  { unlink } for  pid=4143 comm="git" name="tLxMhAM" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583269244.875:416): avc:  denied  { link } for  pid=4152 comm="git" name="tmp_pack_katKey" dev="dm-0" ino=575193 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269244.892:417): avc:  denied  { append } for  pid=4143 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=4240653 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269244.997:418): avc:  denied  { ioctl } for  pid=4160 comm="bash" path="/easyepg/easyepg/update.sh" dev="dm-0" ino=13460878 ioctlcmd=0x5401 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269247.412:419): avc:  denied  { rmdir } for  pid=4699 comm="rm" name="branches" dev="dm-0" ino=4240646 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583269247.420:420): avc:  denied  { remove_name } for  pid=4699 comm="rm" name="easyepg" dev="dm-0" ino=14560060 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583269248.288:421): avc:  denied  { setattr } for  pid=4725 comm="chown" name="my-git.te" dev="dm-0" ino=9478378 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269248.288:422): avc:  denied  { setattr } for  pid=4725 comm="chown" name="hzn" dev="dm-0" ino=13298283 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583269248.289:423): avc:  denied  { setattr } for  pid=4725 comm="chown" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583269864.864:431): avc:  denied  { create } for  pid=5249 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269864.864:432): avc:  denied  { write open } for  pid=5249 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=13298582 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269864.869:433): avc:  denied  { read } for  pid=5249 comm="git" path="/easyepg/easyepg/.git/HEAD.lock" dev="dm-0" ino=4226140 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269864.871:434): avc:  denied  { remove_name } for  pid=5249 comm="git" name="HEAD.lock" dev="dm-0" ino=4226140 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583269864.871:435): avc:  denied  { rename } for  pid=5249 comm="git" name="HEAD.lock" dev="dm-0" ino=4226140 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269864.871:436): avc:  denied  { setattr } for  pid=5249 comm="git" name="config" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269864.871:437): avc:  denied  { map } for  pid=5249 comm="git" path="/easyepg/easyepg/.git/config" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269864.871:438): avc:  denied  { unlink } for  pid=5249 comm="git" name="config" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269864.871:439): avc:  denied  { create } for  pid=5249 comm="git" name="tEzi3Yf" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583269864.871:440): avc:  denied  { unlink } for  pid=5249 comm="git" name="tEzi3Yf" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583269866.711:441): avc:  denied  { link } for  pid=5254 comm="git" name="tmp_pack_aKmh5l" dev="dm-0" ino=4230338 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269866.720:442): avc:  denied  { append } for  pid=5249 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=575213 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269866.766:443): avc:  denied  { ioctl } for  pid=5259 comm="bash" path="/easyepg/easyepg/update.sh" dev="dm-0" ino=512980 ioctlcmd=0x5401 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269866.795:444): avc:  denied  { read } for  pid=5264 comm="cp" name="prog_combine.pl" dev="dm-0" ino=512968 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269866.795:445): avc:  denied  { open } for  pid=5264 comm="cp" path="/easyepg/easyepg/prog_combine.pl" dev="dm-0" ino=512968 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269866.795:446): avc:  denied  { write } for  pid=5264 comm="cp" name="prog_combine.pl" dev="dm-0" ino=9658138 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269868.852:447): avc:  denied  { remove_name } for  pid=5792 comm="rm" name="branches" dev="dm-0" ino=8739260 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583269868.852:448): avc:  denied  { rmdir } for  pid=5792 comm="rm" name="branches" dev="dm-0" ino=8739260 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583269868.852:449): avc:  denied  { unlink } for  pid=5792 comm="rm" name="exclude" dev="dm-0" ino=13298582 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269868.860:450): avc:  denied  { remove_name } for  pid=5792 comm="rm" name="easyepg" dev="dm-0" ino=575196 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583269869.734:451): avc:  denied  { setattr } for  pid=5827 comm="chown" name="my-git.te" dev="dm-0" ino=9478378 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269869.735:452): avc:  denied  { setattr } for  pid=5827 comm="chown" name="epg.sh" dev="dm-0" ino=9658134 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269869.735:453): avc:  denied  { setattr } for  pid=5827 comm="chown" name="hzn" dev="dm-0" ino=13298283 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583269869.737:454): avc:  denied  { setattr } for  pid=5827 comm="chown" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1
      type=AVC msg=audit(1583269938.914:455): avc:  denied  { execute } for  pid=5931 comm="bash" name="epg.sh" dev="dm-0" ino=9658134 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269938.914:456): avc:  denied  { execute_no_trans } for  pid=5931 comm="bash" path="/easyepg/epg.sh" dev="dm-0" ino=9658134 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269938.919:457): avc:  denied  { ioctl } for  pid=5931 comm="epg.sh" path="/easyepg/epg.sh" dev="dm-0" ino=9658134 ioctlcmd=0x5401 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269950.143:458): avc:  denied  { create } for  pid=6039 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269950.148:459): avc:  denied  { rename } for  pid=6039 comm="git" name="HEAD.lock" dev="dm-0" ino=575200 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269950.149:460): avc:  denied  { map } for  pid=6039 comm="git" path="/easyepg/easyepg/.git/config" dev="dm-0" ino=575201 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269950.149:461): avc:  denied  { create } for  pid=6039 comm="git" name="ti678m1" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583269950.150:462): avc:  denied  { unlink } for  pid=6039 comm="git" name="ti678m1" dev="dm-0" ino=575201 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
      type=AVC msg=audit(1583269951.786:463): avc:  denied  { link } for  pid=6046 comm="git" name="tmp_pack_1QFH8x" dev="dm-0" ino=575203 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583269951.793:464): avc:  denied  { append } for  pid=6039 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=13298606 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583270122.384:529): avc:  denied  { unlink } for  pid=7005 comm="systemd-user-ru" name="hosts" dev="tmpfs" ino=68629 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0 tclass=file permissive=1
      type=AVC msg=audit(1583270122.384:530): avc:  denied  { read } for  pid=7005 comm="systemd-user-ru" name="secrets" dev="tmpfs" ino=42446 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=dir permissive=1
      type=AVC msg=audit(1583270122.385:531): avc:  denied  { rmdir } for  pid=7005 comm="systemd-user-ru" name="secrets" dev="tmpfs" ino=42446 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=dir permissive=1
      type=AVC msg=audit(1583270122.385:532): avc:  denied  { unlink } for  pid=7005 comm="systemd-user-ru" name=".containerenv" dev="tmpfs" ino=42444 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=file permissive=1
      type=AVC msg=audit(1583350958.833:261): avc:  denied  { create } for  pid=1438 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583350958.833:262): avc:  denied  { remove_name } for  pid=1438 comm="git" name=".git" dev="dm-0" ino=8412886 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583350958.833:263): avc:  denied  { remove_name } for  pid=1438 comm="git" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583350958.890:264): avc:  denied  { remove_name } for  pid=1440 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583351702.774:309): avc:  denied  { remove_name } for  pid=1834 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583351702.793:310): avc:  denied  { remove_name } for  pid=1837 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583352068.116:314): avc:  denied  { remove_name } for  pid=1986 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583352068.136:315): avc:  denied  { remove_name } for  pid=1989 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583352178.007:316): avc:  denied  { remove_name } for  pid=2082 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583352178.023:317): avc:  denied  { remove_name } for  pid=2085 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583352263.055:328): avc:  denied  { remove_name } for  pid=2191 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583352263.072:329): avc:  denied  { remove_name } for  pid=2194 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583352791.875:366): avc:  denied  { remove_name } for  pid=2429 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583352791.894:367): avc:  denied  { remove_name } for  pid=2432 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583353388.093:404): avc:  denied  { remove_name } for  pid=3027 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583353388.114:405): avc:  denied  { remove_name } for  pid=3030 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583354127.774:460): avc:  denied  { write } for  pid=3275 comm="rm" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_dir_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583354127.792:461): avc:  denied  { write } for  pid=3278 comm="rm" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_dir_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583354477.988:519): avc:  denied  { unlink } for  pid=3570 comm="systemd-user-ru" name="hosts" dev="tmpfs" ino=50070 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583354477.989:520): avc:  denied  { unlink } for  pid=3570 comm="systemd-user-ru" name="resolv.conf" dev="tmpfs" ino=50066 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583354477.989:521): avc:  denied  { read } for  pid=3570 comm="systemd-user-ru" name="secrets" dev="tmpfs" ino=37057 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=dir permissive=0
      type=AVC msg=audit(1583354477.989:522): avc:  denied  { unlink } for  pid=3570 comm="systemd-user-ru" name=".containerenv" dev="tmpfs" ino=37055 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=file permissive=0
      type=AVC msg=audit(1583354477.989:523): avc:  denied  { unlink } for  pid=3570 comm="systemd-user-ru" name="hostname" dev="tmpfs" ino=37054 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=file permissive=0
      type=AVC msg=audit(1583437487.930:270): avc:  denied  { write } for  pid=1974 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.150:271): avc:  denied  { setattr } for  pid=1995 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.150:272): avc:  denied  { setattr } for  pid=1995 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.151:273): avc:  denied  { setattr } for  pid=1995 comm="chown" name="LICENSE" dev="dm-0" ino=13379704 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.151:274): avc:  denied  { setattr } for  pid=1995 comm="chown" name="README.md" dev="dm-0" ino=13508762 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.151:275): avc:  denied  { setattr } for  pid=1995 comm="chown" name="backup.sh" dev="dm-0" ino=13508763 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.151:276): avc:  denied  { setattr } for  pid=1995 comm="chown" name="branch-debaschdi.sh" dev="dm-0" ino=13726284 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.151:277): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_combine.pl" dev="dm-0" ino=13726285 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.151:278): avc:  denied  { setattr } for  pid=1995 comm="chown" name="combine.sh" dev="dm-0" ino=13726286 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.151:279): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.152:280): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_ext.pl" dev="dm-0" ino=4219926 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.152:281): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=4219930 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.152:282): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_ext.pl" dev="dm-0" ino=4219932 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.152:283): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ext.sh" dev="dm-0" ino=4219933 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.152:284): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=4219935 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.152:285): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ext" dev="dm-0" ino=4219912 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.152:286): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=8635392 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.153:287): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=8635393 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.153:288): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=8635395 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.153:289): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=8635423 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.154:290): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=8635428 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.154:291): avc:  denied  { setattr } for  pid=1995 comm="chown" name="hzn.sh" dev="dm-0" ino=8667283 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.154:292): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=8693190 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.154:293): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=8701656 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.155:294): avc:  denied  { setattr } for  pid=1995 comm="chown" name="hzn" dev="dm-0" ino=8625290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.155:295): avc:  denied  { setattr } for  pid=1995 comm="chown" name="prog_combine.pl" dev="dm-0" ino=13726291 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.155:296): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=13726293 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.155:297): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=13726346 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.155:298): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=13726349 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.155:299): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=13777383 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.155:300): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=13777384 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.156:301): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=13777385 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.156:302): avc:  denied  { setattr } for  pid=1995 comm="chown" name="rdt.sh" dev="dm-0" ino=13777386 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.156:303): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=13777387 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.156:304): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=13167104 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.156:305): avc:  denied  { setattr } for  pid=1995 comm="chown" name="rdt" dev="dm-0" ino=13726292 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
      type=AVC msg=audit(1583437489.156:306): avc:  denied  { setattr } for  pid=1995 comm="chown" name="restore.sh" dev="dm-0" ino=13167105 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.156:307): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=226961 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.156:308): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=231429 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.156:309): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=231430 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:310): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=231434 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:311): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=231435 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:312): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=231436 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:313): avc:  denied  { setattr } for  pid=1995 comm="chown" name="swc.sh" dev="dm-0" ino=231437 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:314): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=360556 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:315): avc:  denied  { setattr } for  pid=1995 comm="chown" name="swc" dev="dm-0" ino=225110 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0type=AVC msg=audit(1583437489.158:316): avc:  denied  { setattr } for  pid=1995 comm="chown" name="testing.sh" dev="dm-0" ino=13167106 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:317): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=4219938 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:318): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=4219939 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:319): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=4219940 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:320): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=4219941 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:321): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=4219942 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:322): avc:  denied  { setattr } for  pid=1995 comm="chown" name="proxy.sh" dev="dm-0" ino=4219944 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      type=AVC msg=audit(1583437489.158:323): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=4563988 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
      
      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      @stacksofplates during installation of the script you can choose where to install easyepg. I tried both in /home/myuser/easyepg as podman with my user and in /usr/local/bin/easyepg as podman with root.

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      @black3dynamite said in Fedora 31 Server, podman and SELinux:

      You can just use podman to install easyepg. I found five to choose from.
      b7dc841d-1414-42d4-8482-e0be0a2e8fb9-image.png

      Yes I know. Have not tried those and I just know about "takealug". I can try. Just to figure out if get the same SELinux errors.

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      @black3dynamite said in Fedora 31 Server, podman and SELinux:

      Show us the audit logs.

      # this command will so anything that was denied.
      sudo tail -f /var/log/audit/audit.log | grep "denied"
      

      This one gives no output at all. I'll try tomorrow again.

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server, podman and SELinux

      @DustinB3403 How do I create exclusions? Everything works fine with SELinux disabled.

      posted in IT Discussion
      W
      Woti
    • Fedora 31 Server, podman and SELinux

      Hello,
      I am following this tutorial https://github.com/dlueth/easyepg.minimal it is a Ubuntu based Docker image. I am running in trouble with plenty of SELinux errors and I do not know how to fix these.
      I googled around and come over a tool called "udica", but no way I do not know how to create new policies.
      Beside of that, they are using Docker. In Fedora I need to use Podman.
      I did install the Docker alias for Podman package and everything is working like a charm beside of the policies errors.

      dnf install podman-docker cockpit-podman
      

      Following the instruction in the tutorial:
      Download and run the script works fine.

      sh -c "$(curl -s -H 'Cache-Control: no-cache' https://raw.githubusercontent.com/dlueth/easyepg.minimal/master/init)"
      

      Running:

      podman start easyepg.admin
      

      Gives me:
      SELinux prevents git from having write access to the directory /usr/local/bin/telerising/easyepg
      SELinux prevents git from accessing the easyepg directory with write access.
      SELinux prevents git from accessing the easyepg directory with add_name access.
      There are much more such messages with different SELinux access-commands.
      I did not suspect that it would be so difficult.

      Are there some experts here who could give me some advice?
      Do you need more info og logs?

      Best regards,
      Woti

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server Edition filesystem permissions changed to 777

      I see. I am just scared about all those entries. I need to get more knowledge about those stuff.
      Need to harden Fedora server 🙂 Found this one here but no response at all 😄
      https://mangolassi.it/topic/19719/what-hardening-standards-are-you-using-for-fedora

      posted in IT Discussion
      W
      Woti
    • RE: Fedora 31 Server Edition filesystem permissions changed to 777

      I just do not understand why those entries coming up.
      I have no phpmyadmin etc installed.

      posted in IT Discussion
      W
      Woti
    • 1
    • 2
    • 3
    • 4
    • 2 / 4