[Date Prev][Date Next] [Thread Prev][Thread Next]
[Thread Index]
[Date Index]
[Author Index]
Re: [atomic-devel] Q: Detecting Container-ness is still container=something?
- From: Colin Walters <walters verbum org>
- To: atomic-devel projectatomic io
- Subject: Re: [atomic-devel] Q: Detecting Container-ness is still container=something?
- Date: Tue, 26 Jan 2016 11:53:29 -0500
On Thu, Jan 21, 2016, at 10:41 AM, Chris Evich wrote:
>
> All,
>
> Looking for some advice re: a tooling bug. The problem (bug) has to do
> with sosreport incorrectly determining whether or not it's not running
> w/in a SPC container. The context is always going to be from within an
> SPC, on an RHEL/Fedora/CentOS Atomic host. Sosreport needs to be useful
> in helping diagnosing __host__ problems, with container data-collection
> being a secondary use-case.
>
> To address detection, we're aware of 'container=docker',
The problem with this is that those patches never got into Docker to do
it by default, so every SPC has to to `ENV container docker`.
> For the general case (no security issue), in RHEL/Fedora/Centos Atomic
> Host, within a SPC context, is checking the container env. var still the
> preferred method?
There are lots of aspects to containers that can be toggled on or off
(for example, the pid namespace). But I suspect what almost all
applications want to know is whether they're in a separate mount
namespace.
Well, simply the presence of /host at the moment strongly implies
one is in a SPC. Maybe even better, check for /host/proc/1 or so.
[Date Prev][Date Next] [Thread Prev][Thread Next]
[Thread Index]
[Date Index]
[Author Index]