-
Notifications
You must be signed in to change notification settings - Fork 3.7k
Use path based unix socket for shims #4343
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Build succeeded.
|
91a9d95
to
af42ed3
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Build succeeded.
|
runtime/v2/shim/util_unix.go
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This breaks running multiple daemons
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's put runtime dir string into the hash
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ok, let me see if I can get that data easily.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also could you:
- add a code comment to explain that
/run/containerd/s
is hard coded for the sake of avoiding hitting the SUN_PATH length limit - add
MkdirAll("/run/containerd/s")
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's put runtime dir string into the hash
We can also consider putting the daemon UUID into the hash, not sure which one is better.
The new shim socket path convention hardcodes `/run/containerd`: containerd/containerd#4343 `dockerd-rootless.sh` is updated to hide the rootful `/run/containerd` from the mount namespace of the rootless dockerd. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
af42ed3
to
578337f
Compare
Build succeeded.
|
578337f
to
1839f67
Compare
Build succeeded.
|
Ok, it looks like we have 1-2 test to fix. The handling and timeouts of using file based unix sockets seem to be different than an abstract socket. I'm guessing this has to be something about if there is someone listening on the other end or not. If anyone else has time to look into this go for it, I'll try to debug Monday. |
How can we help moving this forward? |
1839f67
to
ab432f6
Compare
Build succeeded.
|
ab432f6
to
d286d0c
Compare
Build succeeded.
|
Build succeeded.
|
6c38d36
to
1a7f61d
Compare
Build succeeded.
|
1a7f61d
to
1b4a94c
Compare
Build succeeded.
|
1b4a94c
to
5fff748
Compare
Build succeeded.
|
5fff748
to
e35a351
Compare
Build succeeded.
|
e35a351
to
d7dab44
Compare
Build succeeded.
|
This allows filesystem based ACLs for configuring access to the socket of a shim. Signed-off-by: Michael Crosby <michael@thepasture.io>
d7dab44
to
68cd97e
Compare
Build succeeded.
|
68cd97e
to
7ec135c
Compare
Build succeeded.
|
Moved to v1.5 milestone. We can consider backporting to v1.4 after the PR gets stabilized. |
The new shim socket path convention hardcodes `/run/containerd`: containerd/containerd#4343 `dockerd-rootless.sh` is updated to hide the rootful `/run/containerd` from the mount namespace of the rootless dockerd. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> Upstream-commit: 794aa20983c9384726721e1c5d3a552ef7f8f4cf Component: engine
The new shim socket path convention hardcodes `/run/containerd`: containerd/containerd#4343 `dockerd-rootless.sh` is updated to hide the rootful `/run/containerd` from the mount namespace of the rootless dockerd. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> (cherry picked from commit 794aa20) Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
The new shim socket path convention hardcodes `/run/containerd`: containerd/containerd#4343 `dockerd-rootless.sh` is updated to hide the rootful `/run/containerd` from the mount namespace of the rootless dockerd. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> (cherry picked from commit 794aa20983c9384726721e1c5d3a552ef7f8f4cf) Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> Upstream-commit: c7253a0e1ac88bd8eb0db409570a685a5f6258f3 Component: engine
This allows filesystem based ACLs for configuring access to the socket of a
shim.
Signed-off-by: Michael Crosby michael@thepasture.io