-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Installing to RHEL-8 with STIGs applied #347
Comments
https://bugzilla.redhat.com/show_bug.cgi?id=1907870 seems to suggest that fapolicyd breaks podman and there isn't a sensible solution other than turning it off. |
stevenjohnstone
pushed a commit
that referenced
this issue
Dec 30, 2021
* uninstall podman and runc * disable fapolicy * add a firewalld service for MKE
I've built a version with d67f353 for Corsec. I realise I could probably use configuration hooks to achieve some of this. |
This seems resolved. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I'm leaving notes here on what went wrong for Corsec when trying to install MKE with launchpad. Corsec are writing a STIG for us and it's considered a very high priority for federal sales.
When installing to RHEL 8.4/8.5 with STIGs applied, I ran into the following problems which prevented installation of mke:
Footnotes
I can reproduce the failures with runc
runc exec busybox /bin/echo hi runc: error while loading shared libraries: libpthread.so.0: cannot open shared object file: Operation not permitted ERRO[0000] exec failed: container_linux.go:380: starting container process caused: process_linux.go:722: waiting for init preliminary setup caused: read init-p: connection reset by peer
. I think there's a race condition in detecting mount changes and opening libraries which triggers the failure. Disabling withsystemctl stop fapolicyd
allowed the installation to succeed. ↩https://github.com/golang/go/issues/37278 addresses this in the golang crypto library. I think https://github.com/k0sproject/rig/blob/f998dc037e0e68b6dcdee5f9d296cba468acb287/go.mod#L15 would need to be bumped to the latest golang crypto to fix this. ↩
The text was updated successfully, but these errors were encountered: