-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix --init with /dev bind mount #14281
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM just one non-blocking nit above.
Not sure why
Either way I think you have to add this to the podman diff exclude list:
Line 10 in 9915b8f
Also make sure to document this known limitation in the man page. |
I agree lets move it to /run/ |
Good idea. This should be documented for --volume/--mount etc. |
@kolyshkin FYI |
f67ea12
to
02c8b28
Compare
pkg/specgen/generate/storage.go
Outdated
var errDuplicateDest = errors.Errorf("duplicate mount destination") | ||
|
||
// The default path of the mounted container init. | ||
const containerInitPath = "/run/podman-init" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we move this into libpod/define
and use it in libpod/diff.go as well.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done ✔️
LGTM |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: flouthoc, fruch, vrothberg The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
The init binary until now has been bind-mounted to /dev/init which breaks when bind-mounting to /dev. Instead mount the init to /run/podman-init. The reasoning for using /run is that it is already used for other runtime data such as secrets. Fixes: containers#14251 Signed-off-by: Valentin Rothberg <[email protected]>
/lgtm |
/hold cancel |
In moby/moby#37665 I put it to /sbin as chances are very low that someone would want container's |
The init binary until now has been bind-mounted to /dev/init which
breaks when bind-mounting to /dev. Instead mount the init to
/run/podman-init. The reasoning for using /run is that it is already
used for other runtime data such as secrets.
Fixes: #14251
Signed-off-by: Valentin Rothberg [email protected]
Does this PR introduce a user-facing change?