Replies: 4 comments 15 replies
-
also see #18425 |
Beta Was this translation helpful? Give feedback.
-
Does an incompatibility with Docker Desktop count as a podman bug? I believe the VM used by Docker Desktop on Mac configures binfmt_misc in a way that allows this to work. Is the podman machine image customized for podman? If so ought we be able to change the config file? |
Beta Was this translation helpful? Give feedback.
-
I don't actually see this issue anymore. Sudo+podman+qemu are working fine together on both my local Arch Linux machine and Ubuntu+GitHub Actions (using the PPA to get something semi recent). podman infohost:
arch: amd64
buildahVersion: 1.32.0
cgroupControllers:
- cpu
- memory
- pids
cgroupManager: systemd
cgroupVersion: v2
conmon:
package: /usr/bin/conmon is owned by conmon 1:2.1.8-1
path: /usr/bin/conmon
version: 'conmon version 2.1.8, commit: 00e08f4a9ca5420de733bf542b930ad58e1a7e7d'
cpuUtilization:
idlePercent: 97.99
systemPercent: 0.54
userPercent: 1.47
cpus: 8
databaseBackend: boltdb
distribution:
distribution: manjaro
version: unknown
eventLogger: journald
freeLocks: 2048
hostname: manjaro-2212
idMappings:
gidmap:
- container_id: 0
host_id: 1000
size: 1
- container_id: 1
host_id: 165536
size: 65536
uidmap:
- container_id: 0
host_id: 1000
size: 1
- container_id: 1
host_id: 165536
size: 65536
kernel: 6.5.5-1-MANJARO
linkmode: dynamic
logDriver: journald
memFree: 217669632
memTotal: 8046858240
networkBackend: netavark
networkBackendInfo:
backend: netavark
dns:
package: Unknown
package: /usr/lib/podman/netavark is owned by netavark 1.8.0-1
path: /usr/lib/podman/netavark
version: netavark 1.8.0
ociRuntime:
name: crun
package: /usr/bin/crun is owned by crun 1.9.2-1
path: /usr/bin/crun
version: |-
crun version 1.9.2
commit: 35274d346d2e9ffeacb22cc11590b0266a23d634
rundir: /run/user/1000/crun
spec: 1.0.0
+SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +YAJL
os: linux
pasta:
executable: ""
package: ""
version: ""
remoteSocket:
exists: false
path: /run/user/1000/podman/podman.sock
security:
apparmorEnabled: false
capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT
rootless: true
seccompEnabled: true
seccompProfilePath: /etc/containers/seccomp.json
selinuxEnabled: false
serviceIsRemote: false
slirp4netns:
executable: /usr/bin/slirp4netns
package: /usr/bin/slirp4netns is owned by slirp4netns 1.2.2-1
version: |-
slirp4netns version 1.2.2
commit: 0ee2d87523e906518d34a6b423271e4826f71faf
libslirp: 4.7.0
SLIRP_CONFIG_VERSION_MAX: 4
libseccomp: 2.5.4
swapFree: 1789652992
swapTotal: 4294963200
uptime: 50h 57m 43.00s (Approximately 2.08 days)
plugins:
authorization: null
log:
- k8s-file
- none
- passthrough
- journald
network:
- bridge
- macvlan
- ipvlan
volume:
- local
registries: {}
store:
configFile: /home/brenainn/.config/containers/storage.conf
containerStore:
number: 0
paused: 0
running: 0
stopped: 0
graphDriverName: overlay
graphOptions: {}
graphRoot: /home/brenainn/.local/share/containers/storage
graphRootAllocated: 126227120128
graphRootUsed: 118104498176
graphStatus:
Backing Filesystem: extfs
Native Overlay Diff: "true"
Supports d_type: "true"
Supports shifting: "false"
Supports volatile: "true"
Using metacopy: "false"
imageCopyTmpDir: /var/tmp
imageStore:
number: 42
runRoot: /run/user/1000/containers
transientStore: false
volumePath: /home/brenainn/.local/share/containers/storage/volumes
version:
APIVersion: 4.7.1
Built: 1696583554
BuiltTime: Fri Oct 6 10:12:34 2023
GitCommit: ef83eeb9c7482826672f3efa12db3d61c88df6c4-dirty
GoVersion: go1.21.1
Os: linux
OsArch: linux/amd64
Version: 4.7.1 |
Beta Was this translation helpful? Give feedback.
-
Are you saying that |
Beta Was this translation helpful? Give feedback.
-
Issue Description
Running
sudo
as the non-root user in a container for the native architecture works fine. However when running a non-native container, thesudo
command fails.Steps to reproduce the issue
Examples via this StackOverflow question from @bwoodsend.
In this example, my native architecture is Arm64.
Describe the results you received
In the native container, the user with ID 1000 is able to invoke
sudo whoami
successfully. In the non-native container,sudo
complains.Describe the results you expected
sudo
should work for non-native containers.podman info output
Podman in a container
No
Privileged Or Rootless
Rootless
Upstream Latest Release
Yes
Additional environment details
No response
Additional information
A number of workarounds were tried in the above-linked StackOverflow post, including running with a rootful machine VM; none worked.
Beta Was this translation helpful? Give feedback.
All reactions