[pkg-go] Bug#1042090: podman: fails to start container with userns mapping

2023-10-30 Thread Sebastian Sams
Hi,

I’ve just stumbled across this bug when upgrading to bookworm, had the same 
issue with a container using the „userns“ on version 4.3.1+ds1-8.

For me simply upgrading to the package from testing (-> currently 4.6.2+ds1-2) 
as suggested worked and solved the issue, no further actions required.

Is it planned to backport the fix to bookworm?

Best,
Sebastian

On Mon, 18 Sep 2023 08:24:06 -0400 Reinhard Tartler  wrote:
> Control: tag -1 +upstream +moreinfo
>
> Hi Hristo,
>
> Thanks for taking the time to report this issue. In the meantime, podman
> 4.5 is now in debian/testing (and 4.6.2 in debian/experimental). Can you
> please upgrade your package and give it another try? If you're right, you
> shouldn't see this issue anymore. Please report back so that I can mark
> this as fixed in the Debian bug tracker.
>
> Best,
> -rt
>
___
Pkg-go-maintainers mailing list
Pkg-go-maintainers@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-go-maintainers


[pkg-go] Bug#1042090: podman: fails to start container with userns mapping

2023-09-18 Thread Reinhard Tartler
Control: tag -1 +upstream +moreinfo

Hi Hristo,

Thanks for taking the time to report this issue. In the meantime, podman
4.5 is now in debian/testing (and 4.6.2 in debian/experimental). Can you
please upgrade your package and give it another try? If you're right, you
shouldn't see this issue anymore. Please report back so that I can mark
this as fixed in the Debian bug tracker.

Best,
-rt

On Wed, Jul 26, 2023 at 10:51 AM Hristo Venev  wrote:

> Package: podman
> Version: 4.3.1+ds1-8+b1
> Severity: normal
> X-Debbugs-Cc: hri...@venev.name
>
> Dear Maintainer,
>
> When trying to run a container using podman (as root) with a uid/gid
> mapping specified via `--userns`, it fails to start:
>
> > # podman run --rm --userns
> auto:uidmapping=1000:1001:1,gidmapping=1000:1001:1 debian:12
> > ERRO[] Unmounting
> /var/lib/containers/storage/overlay/INSERT_ID_HERE/merged: invalid argument
> > Error: mounting storage for container INSERT_ANOTHER_ID_HERE: creating
> overlay mount to /var/lib/containers/storage/overlay/INSERT_ID_HERE/merged,
> mount_data="lowerdir=/var/lib/containers/storage/overlay/INSERT_ID_HERE/mapped/0/l/INSERT_SHORT_ID_HERE:/var/lib/containers/storage/overlay/INSERT_ID_HERE/mapped/0/l/diff1:/var/lib/containers/storage/overlay/INSERT_ID_HERE/mapped/0/l/INSERT_ANOTHER_SHORT_ID_HERE,upperdir=/var/lib/containers/storage/overlay/INSERT_ID_HERE/diff,workdir=/var/lib/containers/storage/overlay/INSERT_ID_HERE/work,,volatile":
> permission denied
>
> The following appears in the kernel log:
> > [TIME] overlayfs: failed to resolve
> '/var/lib/containers/storage/overlay/INSERT_ID_HERE/mapped/0/l/INSERT_SHORT_ID_HERE':
> -13
>
> The outcome is listed above. The expected outcome was that the container
> would start, with most IDs mapped from those delegated to the
> `containers` user, except uid/gid 1000 inside the container which
> correspond to 1001 outside.
>
> Running the container with just `--userns auto` works. However, then all
> files passed to the container via bind mounts would be owned by
> nobody:nogroup instead of 1000:1000.
>
> This seems similar to https://github.com/containers/podman/issues/18435,
> which was probably fixed in podman 4.5.0.
>
> -- System Information:
> Debian Release: trixie/sid
>   APT prefers testing
>   APT policy: (500, 'testing')
> Architecture: amd64 (x86_64)
>
> Kernel: Linux 6.3.0-1-amd64 (SMP w/24 CPU threads; PREEMPT)
> Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
> Shell: /bin/sh linked to /usr/bin/dash
> Init: systemd (via /run/systemd/system)
>
> Versions of packages podman depends on:
> ii  conmon   2.1.6+ds1-1
> ii  crun 1.8.5-1
> ii  golang-github-containers-common  0.50.1+ds1-4
> ii  libc62.37-6
> ii  libdevmapper1.02.1   2:1.02.185-2
> ii  libgpgme11   1.18.0-3+b1
> ii  libseccomp2  2.5.4-1+b3
> ii  libsubid41:4.13+dfsg1-1+b1
>
> Versions of packages podman recommends:
> pn  buildah   
> pn  catatonit | tini | dumb-init  
> pn  dbus-user-session 
> pn  fuse-overlayfs
> pn  slirp4netns   
> pn  uidmap
>
> Versions of packages podman suggests:
> pn  containers-storage  
> pn  docker-compose  
> ii  iptables1.8.9-2
>
> -- no debconf information
>
>

-- 
regards,
Reinhard
___
Pkg-go-maintainers mailing list
Pkg-go-maintainers@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-go-maintainers


[pkg-go] Bug#1042090: podman: fails to start container with userns mapping

2023-07-26 Thread Hristo Venev
Package: podman
Version: 4.3.1+ds1-8+b1
Severity: normal
X-Debbugs-Cc: hri...@venev.name

Dear Maintainer,

When trying to run a container using podman (as root) with a uid/gid
mapping specified via `--userns`, it fails to start:

> # podman run --rm --userns auto:uidmapping=1000:1001:1,gidmapping=1000:1001:1 
> debian:12
> ERRO[] Unmounting 
> /var/lib/containers/storage/overlay/INSERT_ID_HERE/merged: invalid argument
> Error: mounting storage for container INSERT_ANOTHER_ID_HERE: creating 
> overlay mount to /var/lib/containers/storage/overlay/INSERT_ID_HERE/merged, 
> mount_data="lowerdir=/var/lib/containers/storage/overlay/INSERT_ID_HERE/mapped/0/l/INSERT_SHORT_ID_HERE:/var/lib/containers/storage/overlay/INSERT_ID_HERE/mapped/0/l/diff1:/var/lib/containers/storage/overlay/INSERT_ID_HERE/mapped/0/l/INSERT_ANOTHER_SHORT_ID_HERE,upperdir=/var/lib/containers/storage/overlay/INSERT_ID_HERE/diff,workdir=/var/lib/containers/storage/overlay/INSERT_ID_HERE/work,,volatile":
>  permission denied

The following appears in the kernel log:
> [TIME] overlayfs: failed to resolve 
> '/var/lib/containers/storage/overlay/INSERT_ID_HERE/mapped/0/l/INSERT_SHORT_ID_HERE':
>  -13

The outcome is listed above. The expected outcome was that the container
would start, with most IDs mapped from those delegated to the
`containers` user, except uid/gid 1000 inside the container which
correspond to 1001 outside.

Running the container with just `--userns auto` works. However, then all
files passed to the container via bind mounts would be owned by
nobody:nogroup instead of 1000:1000.

This seems similar to https://github.com/containers/podman/issues/18435,
which was probably fixed in podman 4.5.0.

-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.3.0-1-amd64 (SMP w/24 CPU threads; PREEMPT)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages podman depends on:
ii  conmon   2.1.6+ds1-1
ii  crun 1.8.5-1
ii  golang-github-containers-common  0.50.1+ds1-4
ii  libc62.37-6
ii  libdevmapper1.02.1   2:1.02.185-2
ii  libgpgme11   1.18.0-3+b1
ii  libseccomp2  2.5.4-1+b3
ii  libsubid41:4.13+dfsg1-1+b1

Versions of packages podman recommends:
pn  buildah   
pn  catatonit | tini | dumb-init  
pn  dbus-user-session 
pn  fuse-overlayfs
pn  slirp4netns   
pn  uidmap

Versions of packages podman suggests:
pn  containers-storage  
pn  docker-compose  
ii  iptables1.8.9-2

-- no debconf information

___
Pkg-go-maintainers mailing list
Pkg-go-maintainers@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-go-maintainers