-
-
Notifications
You must be signed in to change notification settings - Fork 14.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nixos/virtualisation.podman: Init module #85604
Conversation
eeaf9e0
to
a8d3c58
Compare
This is nice and much nicer than mine (a lot less code which is great!).
Yes please. |
Can you think of a nice interface for this? |
0696da8
to
632df11
Compare
I've opted to make subuid/subgid users a simple list:
|
|
632df11
to
83e6270
Compare
I've also moved declarative docker containers to podman in https://github.com/adisbladis/nixpkgs/tree/podman-declarative-containers. This will be a follow-up PR. |
Done! also added myself to the podman team. |
67cbe60
to
6b32212
Compare
@GrahamcOfBorg eval |
6b32212
to
3a53a4a
Compare
Unless I get some very strong objections my plan is to move fast on this and merge soon. |
Is it a good idea to map all podman users to the same 100000+65536 range? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for working on this!
Tested, works well. Looks great, just a couple of nits.
e67bd4b
to
e437fb9
Compare
No that was an oversight. I've fixed this. |
e437fb9
to
2b7ed5d
Compare
2b7ed5d
to
eed5bdc
Compare
eed5bdc
to
f0a92ef
Compare
I have created a new |
a45cfd5
to
3e5f2e7
Compare
In anticipation of the new containers module.
…ation module What's happening now is that both cri-o and podman are creating /etc/containers/policy.json. By splitting out the creation of configuration files we can make the podman module leaner & compose better with other container software.
3e5f2e7
to
43f383c
Compare
@GrahamcOfBorg test podman |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks really good! The only issue I experienced was this message:
ERRO[0520] unable to close namespace: "close /proc/335/ns/user: bad file descriptor"
when exiting a container, seemingly at random. This might just be a podman bug and it doesn't seem to cause any problems.
@talyz That looks to be containers/podman#5873. |
This pull request has been mentioned on NixOS Discourse. There might be relevant details there: https://discourse.nixos.org/t/podman-and-docker-fail-to-mount/11709/3 |
Motivation for this change
This is another stab at making a module for
podman
, a drop-in replacement for Docker.Unlike previous attempts ( #68343 & #54925 ) this tries to stay very close to upstream defaults and introduce minimal configuration.
I also have tests and release notes.
I have been running a very similar module in my own configuration for quite some time without issues.
It works just fine rootless too with the following configuration in
configuration.nix
:Should we add a config option to set up subuid/subgid ranges for users in the podman module maybe?- doneThings done
sandbox
innix.conf
on non-NixOS linux)nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
./result/bin/
)nix path-info -S
before and after)cc @vdemeester @peterhoeg @nlewo
Closes #65202