-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
podman: does not honor TMPDIR when executing run sub-command #10698
Comments
Fix is in containers/common#628, once it is merged, we will revendor into Podman. |
@rhatdan You sure? He's on 3.1.x per his report - that regression was from the new image code from Valentin, so it should only have appeared in 3.2.0 and above? |
@rhatdan and @mheon, I tried manually applying the changes in containers/common#628 to my podman 3.2.0 build, but the problem remained. Might this be a different issue? |
It could be that some other component in podman is attempting to write to /var/tmp/ The change I made is just going to fix the pulling of images. I setup my /var/tmp read/only, and with this patch I got it to work. |
@vrothberg PTAL |
A reproducer would help. |
Users are complaining about read/only /var/tmp failing even if TMPDIR=/tmp is set. This PR Fixes: containers#10698 [NO TESTS NEEDED] No way to test this. Signed-off-by: Daniel J Walsh <[email protected]>
Users are complaining about read/only /var/tmp failing even if TMPDIR=/tmp is set. This PR Fixes: containers#10698 [NO TESTS NEEDED] No way to test this. Signed-off-by: Daniel J Walsh <[email protected]> <MH: Fixed cherry-pick conflicts> Signed-off-by: Matthew Heon <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See #15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt/packages#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]> Signed-off-by: Tianling Shen <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See #15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]> (cherry picked from commit 416eced)
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]> (cherry picked from commit 416eced)
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt/packages#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt/packages#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt/packages#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt/packages#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt/packages#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
Earlier versions of podman did not make use of TMPDIR when running "podman run ...". Podman's default, /var/tmp, presents a problem to rootless use since OpenWrt's /var/tmp does not permit writes by non-root users. Podman 3.3.1 makes full use of TMPDIR. This is part of an attempt to get rootless podman to work on OpenWrt. See openwrt#15096. See also the upstream issue at containers/podman#10698. Signed-off-by: W. Michael Petullo <[email protected]>
/kind bug
Description
I am working with podman on OpenWrt, a light-weight distribution that aims to support network devices. The default OpenWrt environment does not allow non-root users to write to /var/tmp, and thus the TMPDIR environment variable is necessary to allow podman to work. However, it seems that the
run
sub-command might ignore TMPDIR for one of its operations.I do see references to
TMPDIR
inroot.go
, but I have not yet found why therun
sub-command deviates from thisSteps to reproduce the issue:
Install the podman package on OpenWrt.
Build or install a container image.
Run
TMPDIR=/tmp podman run IMAGE-NAME
Describe the results you received:
Podman failed with
Error: open /var/tmp/353770848: permission denied
. The presence of/var/tmp
makes me think podman ignored TMPDIR.Describe the results you expected:
Podman should use
/tmp
rather than /var/tmp`.Additional information you deem important (e.g. issue happens only occasionally):
Output of
podman version
:I also tested with 3.2.0.
Output of
podman info --debug
:Package info (e.g. output of
rpm -q podman
orapt list podman
):opkg list-installed | grep podman
Have you tested with the latest version of Podman and have you checked the Podman Troubleshooting Guide? (https://github.com/containers/podman/blob/master/troubleshooting.md)
Yes/Yes
Additional environment details (AWS, VirtualBox, physical, etc.):
The text was updated successfully, but these errors were encountered: