mirror of
https://github.com/containers/podman.git
synced 2025-10-18 03:33:32 +08:00
Allow chained network namespace containers
The code currently assumes that the container we delegate network namespace to will never further delegate to another container, so when looking up things like /etc/hosts and /etc/resolv.conf we won't pull the correct files from the chained dependency. The changes to resolve this are relatively simple - just need to keep looking until we find a container without NetNsCtr set. Fixes #4626 Signed-off-by: Matthew Heon <matthew.heon@pm.me>
This commit is contained in:
@ -1146,7 +1146,7 @@ func (c *Container) NetworkDisabled() (bool, error) {
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
return networkDisabled(container)
|
||||
return container.NetworkDisabled()
|
||||
}
|
||||
return networkDisabled(c)
|
||||
|
||||
|
@ -1016,9 +1016,24 @@ func (c *Container) makeBindMounts() error {
|
||||
// We want /etc/resolv.conf and /etc/hosts from the
|
||||
// other container. Unless we're not creating both of
|
||||
// them.
|
||||
depCtr, err := c.runtime.state.Container(c.config.NetNsCtr)
|
||||
if err != nil {
|
||||
return errors.Wrapf(err, "error fetching dependency %s of container %s", c.config.NetNsCtr, c.ID())
|
||||
var (
|
||||
depCtr *Container
|
||||
nextCtr string
|
||||
)
|
||||
|
||||
// I don't like infinite loops, but I don't think there's
|
||||
// a serious risk of looping dependencies - too many
|
||||
// protections against that elsewhere.
|
||||
nextCtr = c.config.NetNsCtr
|
||||
for {
|
||||
depCtr, err = c.runtime.state.Container(nextCtr)
|
||||
if err != nil {
|
||||
return errors.Wrapf(err, "error fetching dependency %s of container %s", c.config.NetNsCtr, c.ID())
|
||||
}
|
||||
nextCtr = depCtr.config.NetNsCtr
|
||||
if nextCtr == "" {
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
// We need that container's bind mounts
|
||||
|
Reference in New Issue
Block a user