-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Docker 1.7 cannot mount secrets #3072
Comments
@csrwng @smarterclayton was there a fix for the boot2docker tmpfs issue? |
The containerized flag in the kubelet should allow you to mount.
|
curious that the kubelet doesn't complain about creating the mount |
What is that
|
Looks like this is what is keeping me from docker pulling latest and having the build successfully publish to the registry. My happy path dev exp based on docker launched origin isn't happy :( |
I have a todo to fix this - basically we need to set the containerized flag and then add it to the e2e tests so it doesn't break. ----- Original Message -----
|
Any workaround available for this, until it's fixed for good? |
You have to write out a node config file and then set a kubeletArguments of "containerized" with "true" as the argument (you need to specify it as a nested string array in the yaml - kubeletArgument is map [string] -> []string) kubeletArguments:
----- Original Message -----
|
I can't write a difference node config, as it is created when the container starts :) |
It'll probably be in 0.6.1 ----- Original Message -----
|
Ok thanks. The sooner the better, we're stuck with this :) |
Try #3112 - you'll need to build your own openshift/origin image from the branch with hack/build-release.sh and then hack/build-images.sh. Still testing myself. ----- Original Message -----
|
👍 will test that. Thanks! |
Rah, I can't compile a new version using boot2docker:
I could raise the memory on vbox, but this implies destroying the current vm, and I can't remove everything... I will wait for your tests then. Let me know if the new image can be pulled from somewhere. |
I have just rebuilt the image from master, and the registry won't start either:
I'm running openshift with:
Should I open another issue? |
Can you repro with --loglevel=5 and look for the same log line? It should print the mount output. Did you rebuild the base images as well?
|
Relevent part I think: |
|
If it's the host |
after aliasing
|
It says it's shared:
Did you get different output? |
no, that's what it looks like for me as well. |
Any ideas someone why docker doesn't validate it? |
Do you use systemd to run docker? |
@gravis Yeah
|
Make sure your service file contains the line
|
systemd defaults MountFlags to 'shared', so mount propagation (and secrets) would also work by removing MountFlags or setting to empty string. A nice way to set this is via a drop in unit file (e.g.
|
@marun @gravis @csrwng Thanks for your help! Managed now to run it... on a Raspberry Pi! I didn't tell you that, but all these commands ran on my Pi. Resetting |
Wow, nice!
|
@pmorie is this still valid? |
as of today, on |
closing due to age and lack of activity |
When we started using secrets for deployments, we noticed that containers are not able to read mounted secrets.
The pod definitions contain Volume and VolumeMount definintions, and
docker inspect
shows the volumes as expected, but the container cannot read files from the mount point.This surfaces (in the case of the deployer pod) as this error:
docker inspect <container>
shows the volume mount:The text was updated successfully, but these errors were encountered: