-
Notifications
You must be signed in to change notification settings - Fork 237
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to build a devcontainer features with podman #548
Comments
some to me, I think podman does not support |
Related: microsoft/vscode-remote-release#1333 |
@chrmarti - thank you sharing the related ticket I must admit, I am not sure which rabbit hole to start with, or if the implication is that this won't work at all... an additional hint if this is possible would be appreciated I created a
followed by I then followed the above procedure, but for
This also failed, much earlier in the build process. This attempt was probably misguided. If permissive/disabled SELinux is a viable solution, I would be open to that. This is my system for personal dev only |
I'm not familiar with SELinux. Commenters in microsoft/vscode-remote-release#1333 have suggested that the For the temporary mount in the Dockerfile we could look into using these flags although it is unclear if they are supported (the command line If you can disable the filesystem level protection of your SELinux setup, maybe give that a try. (Not sure if that is possible at all.) |
@chrmarti, after looking into what the
sudo chcon -R -t container_file_t /tmp/
devcontainer build --docker-path podman --workspace-folder ./
sudo restorecon -RFv /tmp/ Disclaimer: I lack the expertise to determine if there are downsides to doing this. It seems harmless Notes for the curious:
|
@dubielt1 please consider re-opening this bug. Making changes to the security settings on /tmp is not available to non-root users. At our facility we don't give root access to developers, only the sysadmins have this right. podman fits into this approach perfectly because it allows us to build and use containers without root permission. I've already asked our sysadmins to change the SELinux settings on /tmp on our workstation build. Their response was - that is the default settings that RedHat provide so we don't want to change them. I assume at present devcontainers do not change the command line arguments they use based upon podman/docker. But really in order to support podman on its native distro of RedHat this needs to be the case. Or at least expose the arguments as a setting that we can override. In the devcontainer JSON we get to specify the arguments for building containers. But the cause of this issue (which happens when adding 'features' to your devcontainer) is not exposed in the same way. |
@gilesknap I have added a fix that will use the |
@chrmarti thanks! Sorry, I missed the mention of the commit. That is exactly the fix we were hoping for. |
@chrmarti, @n1hility of Red Hat was taking a look at this issue too. Does this fix solve for all rootless use-cases of Podman powering devcontainers? |
@worldofgeese This only takes care of the build context for adding feature scripts. |
.devcontainer/Dockerfile
:.devcontainer/devcontainer.json
:build command:
devcontainer build --docker-path podman --workspace-folder ./
devcontainer Error Encountered
podman info --debug output
env:
node --version
:v18.16.0
devcontainer --version
:0.43.0
Possibly related topics?
--mount=type=bind
can't access the mounted folder containers/podman#15423The text was updated successfully, but these errors were encountered: