-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
tmpfs mounts do not accept exec option #3819
Comments
Related: #3803 - we need the option to resolve that as well |
We need to do this for all mounts - not just tmpfs |
We need to update and revendor Buildah to land fixes to the shared option parse code first. Then we can add this to Podman. |
Previously, we explicitly set noexec/nosuid/nodev on every mount, with no ability to disable them. The 'mount' command on Linux will accept their inverses without complaint, though - 'noexec' is counteracted by 'exec', 'nosuid' by 'suid', etc. Add support for passing these options at the command line to disable our explicit forcing of security options. This also cleans up mount option handling significantly. We are still parsing options in more than one place, which isn't good, but option parsing for bind and tmpfs mounts has been unified. Fixes: containers#3819 Fixes: containers#3803 Signed-off-by: Matthew Heon <[email protected]>
FWIW I am also having this issue after switching from docker to podman for a build infrastructure tool that ends up running |
The manual is quite clear on which flags are supported:
However the
exec
options is rejected as invalid in the current master: https://github.com/containers/libpod/blob/4d470c73ca9f441ced162431270977b967b547a1/pkg/util/mountOpts.go#L50Additional info:
This came up while using the docker wrapper for podman, docker supports this mount option for tmpfs.
A revision on the code or the documentation about this would be good to have.
The text was updated successfully, but these errors were encountered: