mirror of
https://github.com/containers/podman.git
synced 2025-05-21 09:05:56 +08:00
rootless netns: move process to scope only with systemd
When you run podman on a non systemd system we should not try to move the process under a new systemd scope. [NO NEW TESTS NEEDED] Ref #13703 Signed-off-by: Paul Holzinger <pholzing@redhat.com>
This commit is contained in:
@ -498,10 +498,13 @@ func (r *Runtime) GetRootlessNetNs(new bool) (*RootlessNetNS, error) {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// move to systemd scope to prevent systemd from killing it
|
||||
err = utils.MoveRootlessNetnsSlirpProcessToUserSlice(cmd.Process.Pid)
|
||||
if err != nil {
|
||||
logrus.Errorf("failed to move the rootless netns slirp4netns process to the systemd user.slice: %v", err)
|
||||
if utils.RunsOnSystemd() {
|
||||
// move to systemd scope to prevent systemd from killing it
|
||||
err = utils.MoveRootlessNetnsSlirpProcessToUserSlice(cmd.Process.Pid)
|
||||
if err != nil {
|
||||
// only log this, it is not fatal but can lead to issues when running podman inside systemd units
|
||||
logrus.Errorf("failed to move the rootless netns slirp4netns process to the systemd user.slice: %v", err)
|
||||
}
|
||||
}
|
||||
|
||||
// build a new resolv.conf file which uses the slirp4netns dns server address
|
||||
|
Reference in New Issue
Block a user