-
Notifications
You must be signed in to change notification settings - Fork 691
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
container_run_and_extract
does not work with Podman
#2251
Comments
I forgot to mention that a workaround is to use different sandboxing and with |
The appliance used Kubevirt is missing some packages we need. For legal reasons it is not possible to include the missing packages there. We need to build our own fixed appliance. We imitate multi-stage Dockerfile build in Bazel. Unfortunately container_run_and_extract() does not work with Podmana [1] and Bazel's linux-sandbox. Slightly less secure but working processwrapper sandbox is used as a workaround. [1] bazelbuild/rules_docker#2251 Signed-off-by: Tomáš Golembiovský <[email protected]>
The appliance from Kubevirt [1] is missing some packages we need. For legal reasons it is not possible to include the missing packages there. We need to build our own fixed appliance. We imitate multi-stage Dockerfile build in Bazel. Unfortunately container_run_and_extract() does not work with Podmana [2] and Bazel's linux-sandbox. Slightly less secure but working processwrapper sandbox is used as a workaround. [1] kubevirt/libguestfs-appliance#17 [2] bazelbuild/rules_docker#2251 Signed-off-by: Tomáš Golembiovský <[email protected]>
The appliance from Kubevirt [1] is missing some packages we need. For legal reasons it is not possible to include the missing packages there. We need to build our own fixed appliance. We imitate multi-stage Dockerfile build in Bazel. Unfortunately container_run_and_extract() does not work with Podmana [2] and Bazel's linux-sandbox. Slightly less secure but working processwrapper sandbox is used as a workaround. [1] kubevirt/libguestfs-appliance#17 [2] bazelbuild/rules_docker#2251 Signed-off-by: Tomáš Golembiovský <[email protected]>
The appliance from Kubevirt [1] is missing some packages we need. For legal reasons it is not possible to include the missing packages there. We need to build our own fixed appliance. We imitate multi-stage Dockerfile build in Bazel. Unfortunately container_run_and_extract() does not work with Podman [2] and Bazel's linux-sandbox. Slightly less secure but working processwrapper sandbox is used as a workaround. [1] kubevirt/libguestfs-appliance#17 [2] bazelbuild/rules_docker#2251 Signed-off-by: Tomáš Golembiovský <[email protected]>
The appliance from Kubevirt [1] is missing some packages we need. For legal reasons it is not possible to include the missing packages there. We need to build our own fixed appliance. We imitate multi-stage Dockerfile build in Bazel. Unfortunately container_run_and_extract() does not work with Podman [2] and Bazel's linux-sandbox. Slightly less secure but working processwrapper sandbox is used as a workaround. [1] kubevirt/libguestfs-appliance#17 [2] bazelbuild/rules_docker#2251 Signed-off-by: Tomáš Golembiovský <[email protected]>
The appliance from Kubevirt [1] is missing some packages we need. For legal reasons it is not possible to include the missing packages there. We need to build our own fixed appliance. We imitate multi-stage Dockerfile build in Bazel. Unfortunately container_run_and_extract() does not work with Podman [2] and Bazel's linux-sandbox. Slightly less secure but working processwrapper sandbox is used as a workaround. [1] kubevirt/libguestfs-appliance#17 [2] bazelbuild/rules_docker#2251 Signed-off-by: Tomáš Golembiovský <[email protected]>
This issue has been automatically marked as stale because it has not had any activity for 180 days. It will be closed if no further activity occurs in 30 days. |
🐞 bug report
Affected Rule
The issue is caused by the rule:
container_run_and_extract
when run with Podman.Is this a regression?
I don't have prior experience and I cannot answer this.
Description
When Podman is used instead of Docker to run containers together with
linux-sandbox
in Bazel, the execution ofcontainer_run_and_extract
command fails with errors because of read-only mounts. E.g.:When I try to workaround it by adding several
--sandbox_writable_path
arguments the build further fails with:I am running it as a non-root user if that is relevant.
🔬 Minimal Reproduction
🔥 Exception or Error
See the description above.
🌍 Your Environment
Operating System:
Output of
bazel version
:Rules_docker version:
Anything else relevant?
The text was updated successfully, but these errors were encountered: