Use path based unix socket for shims#4343
Use path based unix socket for shims#4343crosbymichael wants to merge 1 commit intocontainerd:masterfrom
Conversation
|
Build succeeded.
|
91a9d95 to
af42ed3
Compare
|
Build succeeded.
|
runtime/v2/shim/util_unix.go
Outdated
There was a problem hiding this comment.
This breaks running multiple daemons
There was a problem hiding this comment.
Let's put runtime dir string into the hash
There was a problem hiding this comment.
ok, let me see if I can get that data easily.
There was a problem hiding this comment.
Also could you:
- add a code comment to explain that
/run/containerd/sis hard coded for the sake of avoiding hitting the SUN_PATH length limit - add
MkdirAll("/run/containerd/s")
There was a problem hiding this comment.
Let's put runtime dir string into the hash
We can also consider putting the daemon UUID into the hash, not sure which one is better.
The new shim socket path convention hardcodes `/run/containerd`: containerd/containerd#4343 `dockerd-rootless.sh` is updated to hide the rootful `/run/containerd` from the mount namespace of the rootless dockerd. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
af42ed3 to
578337f
Compare
|
Build succeeded.
|
578337f to
1839f67
Compare
|
Build succeeded.
|
|
Ok, it looks like we have 1-2 test to fix. The handling and timeouts of using file based unix sockets seem to be different than an abstract socket. I'm guessing this has to be something about if there is someone listening on the other end or not. If anyone else has time to look into this go for it, I'll try to debug Monday. |
|
How can we help moving this forward? |
1839f67 to
ab432f6
Compare
|
Build succeeded.
|
ab432f6 to
d286d0c
Compare
|
Build succeeded.
|
|
Build succeeded.
|
6c38d36 to
1a7f61d
Compare
|
Build succeeded.
|
1a7f61d to
1b4a94c
Compare
|
Build succeeded.
|
1b4a94c to
5fff748
Compare
|
Build succeeded.
|
5fff748 to
e35a351
Compare
|
Build succeeded.
|
e35a351 to
d7dab44
Compare
|
Build succeeded.
|
This allows filesystem based ACLs for configuring access to the socket of a shim. Signed-off-by: Michael Crosby <michael@thepasture.io>
d7dab44 to
68cd97e
Compare
|
Build succeeded.
|
68cd97e to
7ec135c
Compare
|
Build succeeded.
|
|
Moved to v1.5 milestone. We can consider backporting to v1.4 after the PR gets stabilized. |
The new shim socket path convention hardcodes `/run/containerd`: containerd/containerd#4343 `dockerd-rootless.sh` is updated to hide the rootful `/run/containerd` from the mount namespace of the rootless dockerd. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> Upstream-commit: 794aa20983c9384726721e1c5d3a552ef7f8f4cf Component: engine
The new shim socket path convention hardcodes `/run/containerd`: containerd/containerd#4343 `dockerd-rootless.sh` is updated to hide the rootful `/run/containerd` from the mount namespace of the rootless dockerd. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> (cherry picked from commit 794aa20) Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
The new shim socket path convention hardcodes `/run/containerd`: containerd/containerd#4343 `dockerd-rootless.sh` is updated to hide the rootful `/run/containerd` from the mount namespace of the rootless dockerd. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> (cherry picked from commit 794aa20983c9384726721e1c5d3a552ef7f8f4cf) Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> Upstream-commit: c7253a0e1ac88bd8eb0db409570a685a5f6258f3 Component: engine
This allows filesystem based ACLs for configuring access to the socket of a
shim.
Signed-off-by: Michael Crosby michael@thepasture.io