Skip to content

Conversation

@giuseppe
Copy link
Member

if slirp4netns supports sandboxing, enable it.

It automatically creates a new mount namespace where slirp4netns will
run and have limited access to the host resources.

It needs slirp4netns 0.4.1.

Signed-off-by: Giuseppe Scrivano [email protected]

if slirp4netns supports sandboxing, enable it.

It automatically creates a new mount namespace where slirp4netns will
run and have limited access to the host resources.

It needs slirp4netns 0.4.1.

Signed-off-by: Giuseppe Scrivano <[email protected]>
@openshift-ci-robot
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: giuseppe

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added approved Indicates a PR has been approved by an approver from all required OWNERS files. size/S labels Sep 16, 2019
@giuseppe
Copy link
Member Author

@lsm5 could we get an update with slirp4netns 0.4.1 in Fedora?

@TomSweeneyRedHat
Copy link
Member

Any tests you could add/update?
Code changes LGTM, I'm assuming the test error is due to the slirp4netns version being off?

@giuseppe
Copy link
Member Author

Any tests you could add/update?
Code changes LGTM, I'm assuming the test error is due to the slirp4netns version being off?

this is really done in slirp4netns. It should not fail on old versions too as the patch checks whether the feature is present before using it, I've restarted the test as it looks like a flake

}

func checkSlirpFlags(path string) (bool, bool, error) {
func checkSlirpFlags(path string) (bool, bool, bool, error) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit, it would be nice if you added names for these variables from a documentation pint of view.
checkSlirpFlags(path string) (supportsDisableLoopback, supportsMTU, supportsSandbox bool, err error)

@rhatdan
Copy link
Member

rhatdan commented Sep 16, 2019

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Sep 16, 2019
@openshift-merge-robot openshift-merge-robot merged commit 0014d6c into containers:master Sep 16, 2019
@pcahyna
Copy link

pcahyna commented Sep 18, 2020

I fixed the problem by making the link point to /run/NetworkManager/resolv.conf instead. Still, it would be good to see some error message about the problem, but this is 1) prevented by the problem pointed out in rootless-containers/slirp4netns#187 (comment) and 2) even if this is fixed, podman discards the output from slirp4netns with all the warnings if the process does not fail.

@github-actions github-actions bot added the locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. label Sep 24, 2023
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Sep 24, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants