Devuan bug report logs - #597
debian-podman-config-override: Podman missing cgroup mount

version graph

Package: debian-podman-config-override; Maintainer for debian-podman-config-override is Mark Hindley <mark@hindley.org.uk>; Source for debian-podman-config-override is src:debian-config-override.

Reported by: Hannah Rittich <void@rittich.net>

Date: Thu, 5 Aug 2021 11:32:02 UTC

Severity: normal

Found in version 2.1

Fixed in version 2.2

Done: dak@devuan.org

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.devuan.org
Subject: bug#597: debian-podman-config-override: Podman missing cgroup mount
Reply-To: Hannah Rittich <void@rittich.net>, 597@bugs.devuan.org
Resent-From: Hannah Rittich <void@rittich.net>
Resent-To: devuan-bugs@lists.dyne.org
Resent-CC: Mark Hindley <mark@hindley.org.uk>
X-Loop: owner@bugs.devuan.org
Resent-Date: Thu, 05 Aug 2021 14:22:02 +0000
Resent-Message-ID: <handler.597.B597.162817320328489@bugs.devuan.org>
Resent-Sender: owner@bugs.devuan.org
X-Devuan-PR-Message: followup 597
X-Devuan-PR-Package: debian-podman-config-override
X-Devuan-PR-Keywords: 
References: <c8f7dab3-90a0-e249-e437-d5fbb9432d11@rittich.net> <YQvb7pmusI9LmZaa@hindley.org.uk> <c8f7dab3-90a0-e249-e437-d5fbb9432d11@rittich.net>
Received: via spool by 597-submit@bugs.devuan.org id=B597.162817320328489
          (code B ref 597); Thu, 05 Aug 2021 14:22:02 +0000
Received: (at 597) by bugs.devuan.org; 5 Aug 2021 14:20:03 +0000
Delivered-To: devuanbugs@dyne.org
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Thu, 05 Aug 2021 14:20:03 +0000 (UTC)
Received: from mout-p-201.mailbox.org (mout-p-201.mailbox.org [80.241.56.171])
	(using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 6087DF60B98
	for <597@bugs.devuan.org>; Thu,  5 Aug 2021 16:12:10 +0200 (CEST)
Received: from smtp1.mailbox.org (smtp1.mailbox.org [IPv6:2001:67c:2050:105:465:1:1:0])
	(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
	 key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256)
	(No client certificate requested)
	by mout-p-201.mailbox.org (Postfix) with ESMTPS id 4GgVt10tz1zQkFN
	for <597@bugs.devuan.org>; Thu,  5 Aug 2021 16:12:09 +0200 (CEST)
X-Virus-Scanned: amavisd-new at heinlein-support.de
Received: from smtp1.mailbox.org ([80.241.60.240])
	by spamfilter05.heinlein-hosting.de (spamfilter05.heinlein-hosting.de [80.241.56.123]) (amavisd-new, port 10030)
	with ESMTP id rv9hSNpnPWBh for <597@bugs.devuan.org>;
	Thu,  5 Aug 2021 16:12:06 +0200 (CEST)
To: 597@bugs.devuan.org
From: Hannah Rittich <void@rittich.net>
Message-ID: <d7551b6c-c61f-0f28-7216-a134339b7e73@rittich.net>
Date: Thu, 5 Aug 2021 16:12:05 +0200
MIME-Version: 1.0
In-Reply-To: <YQvb7pmusI9LmZaa@hindley.org.uk>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: de-DE
Content-Transfer-Encoding: 7bit
X-Rspamd-Queue-Id: 4C2E918B8
X-Rspamd-UID: de2839
X-Spam-Status: No, score=-0.7 required=5.0 tests=RCVD_IN_DNSWL_LOW,SPF_PASS
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org
Am 05.08.21 um 14:39 schrieb Mark Hindley:
> Yes, I think allowing any is the way to go which should provide the greatest
> flexibility.
> 
> I note that cgmanager is not present in debian bullseye or later so appears to
> be on its way out[1]. The best solution is probably to depend on (or recommend?)
> elogind | cgroupfs-mount | cgmanager.

Sounds good. I would say, recommending is enough, because if the user 
wants they can still mount cgroupfs manually.

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Sat Apr 20 00:25:34 2024;