-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
qm.container mounts /var/tmp as tmpfs #723
Labels
Comments
@rhatdan does this make sense to you? |
Yes. Since /var is already a r/w mount point, this will leave the directory writeable. Does this work with a file system rootfs? I did not know that we implemented a read/only --rootfs feature. |
dougsland
added a commit
that referenced
this issue
Feb 21, 2025
Resolves: #723 Signed-off-by: Douglas Schilling Landgraf <[email protected]>
@rhatdan @alexlarsson I asked QE to test this. cc @pengshanyu |
See-Also: #722 |
I verified that the following configuration works:
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
qm.container has
ReadOnly=true
, which maps topodman run --read-only
.This tells podman to mount the container image read-only, and then mount a tmpfs on top of /tmp, /run and /var/tmp.
However, in QM, /var/tmp is generally on top of the /var volume (which comes from /var/qm on the host), and we don't want this part to be a tmpfs, because that limits the size of /var/tmp files in the qm partition, and this is not expected (e.g. it is different than on what normally happens in rhel, where /tmp is ram and /var/tmp is disk based).
I think we need to pass some extra argument to manually configure /tmp and /run as tmpfs, with not special options for /var/tmp (so its just picked up from the volume).
I think what we want is
ReadOnly=true
ReadOnlyTmpfs=false
Mount=type=tmpfs,tmpfs-size=512M,destination=/tmp
Mount=type=tmpfs,tmpfs-size=512M,destination=/run
The text was updated successfully, but these errors were encountered: