Mount (accessible) host devices in --privileged rootless containers#42638
Mount (accessible) host devices in --privileged rootless containers#42638thaJeztah merged 1 commit intomoby:masterfrom eliaskoromilas:host-devices
--privileged rootless containers#42638Conversation
|
rebase |
|
Can we have integration tests too? |
|
rebase |
|
Please squash commits |
|
Should we skip these tests somehow? It fails for every privileged container test. |
This should be fixed on master; I kicked CI again, but if it fails again, try doing a rebase 👍 |
|
@AkihiroSuda ptal |
My tests pass now. CI still fails like master. |
|
Ah, yes, two tests that are failing; We can ignore those test failures |
|
I will rebase this after vendoring |
|
@thaJeztah Should we vendor github.com/containerd/containerd |
Signed-off-by: Elias Koromilas <[email protected]>
|
oh! almost forgot we had this one; thanks for the rebase, and good that it's all working as expected with the changes in containerd 👍 🎉 |
fixes #42406
- What I did
--privilegedrootless containers.Usecontainerd/oci.HostDevices()that skips device sub-directories which are not accessible by the user.Merged in daemon.WithDevices(): use containerd's HostDevices() #43053
- How I did it
containerd/oci.HostDevices()ignores permission errors when running in a user namespace.- How to verify it
Integration tests are included.
- Description for the changelog
Mount (accessible) host devices in
--privilegedrootless containers