Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Don't use systemd defaults if /proc/1/comm != systemd #585

Merged
merged 1 commit into from
May 27, 2021

Conversation

rhatdan
Copy link
Member

@rhatdan rhatdan commented May 26, 2021

Currently we have users failing to run containers within containers
or on systems without systemd support. This change will give us
better defaults on these systems.

Fixes: #580

Signed-off-by: Daniel J Walsh dwalsh@redhat.com

Currently we have users failing to run containers within containers
or on systems without systemd support.  This change will give us
better defaults on these systems.

Fixes: containers#580

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
@rhatdan
Copy link
Member Author

rhatdan commented May 26, 2021

@giuseppe @vrothberg @mheon PTAL

Copy link
Member

@giuseppe giuseppe left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@openshift-ci
Copy link
Contributor

openshift-ci bot commented May 26, 2021

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: giuseppe, rhatdan

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link
Member

@vrothberg vrothberg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code LGTM but I think we need to do more to fix #580. At the moment we do a presence check but we do not yet do an access check.

The access check is important to improve on the error reporting. For instance, if the environment is not set up correctly (XDG_, DBUS_, etc.), Podman can fail at various places. If those are set but the user isn't in the right group to access DBUS, Podman can fail again at various places.

Checking that here would be amazing

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

check access rights for systemd-related config options
4 participants