-
Notifications
You must be signed in to change notification settings - Fork 101
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
userns_mode option is not honoured #493
Comments
Make sure the service side is restarted? |
I apologize, but I'm not sure I understand what you mean. If you are asking me whether I tried to restart the service to check if it would fix it, I did. In the meanwhile, I have also noticed that the Finally, while trying to mitigate the I apologize for reporting everything in this issue; please do let me know if I should split the three things (userns, remove, replace) into three different issues. |
Again -- sorry for going off-topic. I was under the impression that the other issues might have been related, but I no longer think that's the case. I have addressed the other issues in additional issues/PRs. To recap where we're at, the issue I'm reporting is that, as shown by this minimal example, the userns_mode parameter is not being honored. |
I have now submitted PR #499, which addresses the underlying reason for the flag not being honored. |
Hi,
It seems like userns mode is not honoured by either podman-py or the podman API.
Running podman 4.9.3 on an up-to-date Ubuntu 24.04.1 LTS virtual machine.
When creating and running the same exact container with
podman-py
and with the Podman CLI, it is apparent that in the former case theuserns_mode='auto'
option is not honoured.I attach this test case which shows the issue clearly: https://gist.github.com/vmsh0/f32b137b6d4bf1d3dbf5b6745e92911c
One unit test creates a container using
podman-py
: the test fails as after inspecting the container you can see thatUsernsMode
is empty. The other unit test creates the same container by calling the podman CLI: in this case, the test succeeds and you can see thatUsernsMode
is set to'private'
as expected.As far as I can see, this fails silently. I noticed the issue by pure chance while investigating a different problem. This might potentially have security implications, as users might be expecting their containers to run in a separate user namespace while they are really running in the root namespace.
The text was updated successfully, but these errors were encountered: