-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add configuration option for disabling new keyring #8384
Comments
These look like they are blocked by seccomp rules. Could you give the actual podman command you are trying to execute? |
docker run --rm -it --user test-user \
--device /dev/fuse \
--cap-add SYS_ADMIN \
an-oci-toolset-image sh
podman run --rm -it --net=host --pid=host busybox echo ok As @rhatdan said, the problem is that the This syscall is blocked for security concern, so I think we should either namspacize the keyring, or provide an option to reuse the current keyring just like each runtime does. The latter one should be reasonable for nested rootless container. PS: podman: 2.1.1 |
Docker is wrong, keyctl is namespaced. This seccomp statement is dated. |
OK, thanks to figure out the solution. Some old ci systems are still used to build images inside a docker container, so we need nested containers. And this system communicate to daemon via unix sock. Later we would like to try the new podman rest api, this way should introduce the native rootless nested containers to our systems. |
@rhatdan |
Well we do a small patch for Fedora to allow it. I attempted to get this in the upstream,but was blocked since some older kernels still did not do a decent job of namespacing keyctl. RHEL7 age kernels. |
@rhatdan since keyctl is not merged in the upstream, and RHEL7 is still widely deployed, so native nested podman container still needs the option describe in this issue. can we re-open this issue and consider again? |
A friendly reminder that this issue had no activity for 30 days. |
This should be in the main branch now. |
@rhatdan do you mean that the master branch of podman already has a new |
There is support in containers.conf for setting all container engines to create or not create the keyring. keyring tells the container engine whether to createa kernel keyring for use within the container.keyring = trueI believe creating $HOME/.config/containers/containers.conf or /etc/containers/containers.conf should do this, if it is fully wired up. [containers] |
for |
This was not wired down the stack. |
We have a new field in containers.conf that tells whether or not we want to generate a new keyring in a container. This field was being ignored. It now will be followed and passed down to conmon. Fixes: containers#8384 Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
A friendly reminder that this issue had no activity for 30 days. |
Looks like this is done in the main branch and podman 3.0. |
I'm not able to execute a private registry within a container via podman without having the same keyring error. I have added keyring=false, but still the same error:
Any feedback on this or how to output what podman is sending to the |
Is this a BUG REPORT or FEATURE REQUEST? (leave only one on its own line)
/kind feature
Description
In a rootless container with lean capabilities, to create a container by
podman run
, we have problems of no permissions to call pivot_root and create new keyring. In containers.conf, we could disable pivot_root, but we miss an option to disable keyring.The text was updated successfully, but these errors were encountered: