-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Drop host requirement on skopeo
#81
Comments
Assuming |
Yeah it'd likely make sense to refactor it into a shared library that gets vendored into both projects. It's a really small amount of code and the duplication wouldn't matter too much. I'm not sure we can really move it though because I know of at least one user outside of this project who is explicitly only depending on (It's reasonable to install just |
The size difference isn't too bad given Podman has more features. The thought I had was to reduce overall dependencies assuming Podman is always required on the host. |
I just keep hitting the host skopeo requirement in corner cases; it's annoying because *otherwise* the container is self-sufficient. Change our installation instructions to add a `/var/lib/containers` bind mount. For the time being of course we continue to support forking off `skopeo` on the host. One thing I still want to investigate is dropping some requirements here and switch to *dynamically* setting up the mount points inside the container as is mentioned in https://brauner.io/2023/02/28/mounting-into-mount-namespaces.html but this currently requires relatively new host kernels. As far as test coverage, this changes the Github Action that uses ubuntu and needed to build a newer skopeo to stop doing that, and in fact we explicitly *remove* skopeo to verify it's not being used in the install process. I didn't change the other install tests to verify they keep working. Closes: containers#81 Signed-off-by: Colin Walters <[email protected]>
I just keep hitting the host skopeo requirement in corner cases; it's annoying because *otherwise* the container is self-sufficient. Change our installation instructions to add a `/var/lib/containers` bind mount. For the time being of course we continue to support forking off `skopeo` on the host. One thing I still want to investigate is dropping some requirements here and switch to *dynamically* setting up the mount points inside the container as is mentioned in https://brauner.io/2023/02/28/mounting-into-mount-namespaces.html but this currently requires relatively new host kernels. As far as test coverage, this changes the Github Action that uses ubuntu and needed to build a newer skopeo to stop doing that, and in fact we explicitly *remove* skopeo to verify it's not being used in the install process. I didn't change the other install tests to verify they keep working. Closes: containers#81 Signed-off-by: Colin Walters <[email protected]>
Today,
bootc install
runs from a privileged container, using the host kernel, but otherwise all binaries executed come from the container (including e.g.mkfs.xfs
etc.).With one glaring exception; today we need
skopeo
in the host. For more information on this, see containers/skopeo#1838One thing we could do relatively easily today is detect if the host and container are compatible, and copy the
skopeo
binary to the host if so. This would help a lot of cases, but not all.The text was updated successfully, but these errors were encountered: