You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jun 20, 2024. It is now read-only.
The proxy currently generates a warning when you attempt to proxy sockets whose immediate parent is /var/run, due to the issue with mount namespaces capturing network namespaces. Users are advised to make a symlink of the target socket in a subdirectory and supply that instead; this advice should be automated.
The text was updated successfully, but these errors were encountered:
Doing a symlink for any domain socket sounds cleaner. But, in order for the volumes to get unmounted (in case they are /var/run), we need the symlink-creating container to exit. To do that we could either:
Special-case /var/run, mount it into the exec_remote container, and only do the symlink dance for sockets in /var/run.
Have the proxy launch another temporary container with the dirs mounted, and have that create the symlinks.
Parse the proxy flags locally, mounting the socket dirs into the exec_remote container, and create the symlinks from there.
…unt-h"
This reverts commit 262352f, reversing
changes made to 3126913 due to a bug
whereby `weave env` returns a unix domain socket with an incorrect path.
This change will be superceeded by #1694.
The proxy currently generates a warning when you attempt to proxy sockets whose immediate parent is
/var/run
, due to the issue with mount namespaces capturing network namespaces. Users are advised to make a symlink of the target socket in a subdirectory and supply that instead; this advice should be automated.The text was updated successfully, but these errors were encountered: