You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hey, the documentation says about rootful UserNS=auto that I should define the subuids like containers:100000:65536
auto[:OPTIONS,…]: automatically create a unique user namespace.
rootful mode: The --userns=auto flag requires that the user name containers be specified in the /etc/subuid and /etc/subgid files, with an unused range of subordinate user IDs that Podman containers are allowed to allocate.
Example: containers:2147483647:2147483648.
This configuration errors and tells me to map root:100000:65536 (which then works fine).
Is this a mistake in the documentation or some quirk on almalinux 9.5?
Also the resulting uid:gid is 1001:1001 which is not inside my specified range?
Also tested with a fresh fedora 41 install. Same behaviour.
Steps to reproduce the issue
As root:
echo "containers:100000:65536" | tee /etc/sub{g,u}id
podman run --rm --userns=auto quay.io/podman/hello
Describe the results you received
ERRO[0000] Cannot find mappings for user "root": no subuid ranges found for user "root" in /etc/subuid
Error: creating container storage: not enough unused IDs in user namespace
Describe the results you expected
Run
podman info output
arch: amd64buildahVersion: 1.37.5cgroupControllers:
- memory
- pidscgroupManager: systemdcgroupVersion: v2conmon:
package: conmon-2.1.12-1.el9.x86_64path: /usr/bin/conmonversion: 'conmon version 2.1.12, commit: eb379dceb7efebd9a9d6b3349a57424d83483065'cpuUtilization:
idlePercent: 73.59systemPercent: 8.84userPercent: 17.58cpus: 4databaseBackend: sqlitedistribution:
distribution: almalinuxversion: "9.5"eventLogger: journaldfreeLocks: 2046hostname: podmanidMappings:
gidmap: nulluidmap: nullkernel: 6.8.12-5-pvelinkmode: dynamiclogDriver: journaldmemFree: 3134861312memTotal: 4294967296networkBackend: netavarknetworkBackendInfo:
backend: netavarkdns:
package: aardvark-dns-1.12.2-1.el9_5.x86_64path: /usr/libexec/podman/aardvark-dnsversion: aardvark-dns 1.12.2package: netavark-1.12.2-1.el9.x86_64path: /usr/libexec/podman/netavarkversion: netavark 1.12.2ociRuntime:
name: crunpackage: crun-1.16.1-1.el9.x86_64path: /usr/bin/crunversion: |- crun version 1.16.1 commit: afa829ca0122bd5e1d67f1f38e6cc348027e3c32 rundir: /run/crun spec: 1.0.0 +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +YAJLos: linuxpasta:
executable: /usr/bin/pastapackage: passt-0^20240806.gee36266-2.el9.x86_64version: | pasta 0^20240806.gee36266-2.el9.x86_64 Copyright Red Hat GNU General Public License, version 2 or later <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law.remoteSocket:
exists: falsepath: /run/podman/podman.sockrootlessNetworkCmd: pastasecurity:
apparmorEnabled: falsecapabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOTrootless: falseseccompEnabled: trueseccompProfilePath: /usr/share/containers/seccomp.jsonselinuxEnabled: falseserviceIsRemote: falseslirp4netns:
executable: /usr/bin/slirp4netnspackage: slirp4netns-1.3.1-1.el9.x86_64version: |- slirp4netns version 1.3.1 commit: e5e368c4f5db6ae75c2fce786e31eef9da6bf236 libslirp: 4.4.0 SLIRP_CONFIG_VERSION_MAX: 3 libseccomp: 2.5.2swapFree: 0swapTotal: 0uptime: 10h 48m 56.00s (Approximately 0.42 days)variant: ""plugins:
authorization: nulllog:
- k8s-file
- none
- passthrough
- journaldnetwork:
- bridge
- macvlan
- ipvlanvolume:
- localregistries:
search:
- registry.access.redhat.com
- registry.redhat.io
- docker.iostore:
configFile: /etc/containers/storage.confcontainerStore:
number: 2paused: 0running: 2stopped: 0graphDriverName: overlaygraphOptions:
overlay.mountopt: nodev,metacopy=ongraphRoot: /var/lib/containers/storagegraphRootAllocated: 8350298112graphRootUsed: 5125754880graphStatus:
Backing Filesystem: extfsNative Overlay Diff: "false"Supports d_type: "true"Supports shifting: "false"Supports volatile: "true"Using metacopy: "false"imageCopyTmpDir: /var/tmpimageStore:
number: 2runRoot: /run/containers/storagetransientStore: falsevolumePath: /var/lib/containers/storage/volumesversion:
APIVersion: 5.2.2Built: 1734439251BuiltTime: Tue Dec 17 12:40:51 2024GitCommit: ""GoVersion: go1.22.7 (Red Hat 1.22.7-2.el9_5)Os: linuxOsArch: linux/amd64Version: 5.2.2
Podman in a container
Yes
Privileged Or Rootless
Privileged
Upstream Latest Release
Yes
The text was updated successfully, but these errors were encountered:
containers is the default and is being used in our CI AFAICS. so yeas the docs are correct.
I guess you are running within a nested container (user namesapce)? The code for checking if root checks if it is not running in a user namespace and thus it then defaults to the current username in that case.
Issue Description
Hey, the documentation says about rootful UserNS=auto that I should define the subuids like
containers:100000:65536
This configuration errors and tells me to map
root:100000:65536
(which then works fine).Is this a mistake in the documentation or some quirk on almalinux 9.5?
Also the resulting uid:gid is 1001:1001 which is not inside my specified range?
Also tested with a fresh fedora 41 install. Same behaviour.
Steps to reproduce the issue
As root:
Describe the results you received
Describe the results you expected
Run
podman info output
Podman in a container
Yes
Privileged Or Rootless
Privileged
Upstream Latest Release
Yes
The text was updated successfully, but these errors were encountered: