-
Notifications
You must be signed in to change notification settings - Fork 3.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
podman: out of box podman run
failures on both 24.10.0-rc5 and 23.05.5
#25730
Comments
As for the 23.05.5 which has
The workaround seems to be to
The file gets recreated upon the next podman operation with updated paths, so after that the This seems to be an instance of containers/podman#20872 which got fixed in 4.8 branch with containers/podman#20888 and the fix released in https://github.com/containers/podman/releases/tag/v4.8.1. I wonder if OpenWrt 23 podman package could / should get upgraded to the latest 4.8 release, which at this time seems to be https://github.com/containers/podman/releases/tag/v4.8.3, a security release. |
On 24.10.0-rc5, the
suggests that netavark decided to use iptables driver even if iptables is not installed, and
shows that it is not explicitly configured. The https://github.com/containers/common/blob/main/docs/containers.conf.5.md says
so the fact that podman 5.2 on OpenWrt 24 picks wrong is worrying. Luckily the solution to move us forward on OpenWrt 24 seems quite simple -- just force the use of nftables:
For comparison, the default configuration on 23.05.5 is the same
but netavark says it was forced to use
I wouldn't call it "forced" but maybe back then the default were different. |
So we are able to solve the firewall_driver problem on OpenWrt 24 but we have a new one -- the UDP port 53. Clearly podman (or rather, aardvark-dns) clashes with dnsmasq:
But people will often want to have both dnsmasq and podman, so the wholesale stop (and disable) of dnsmasq is likely not the ideal solution. |
Checking with The solution seems to be to mark that interface as excluded for dnsmasq:
This configuration seems to work but is not beautiful because it cannot be configured (nor seen) on the LuCI UI -- since the
This also then exposes the interface for firewall setup; for example, to allow traffic from the podman containers to the world:
|
A few of your points are already covered in that guide: https://openwrt.org/docs/guide-user/virtualization/docker_host?s[]=podman#podman |
I'm aware of that document and tried to follow it but AFAICS, the software has evolved and the document no longer describes a frictionless experience. So in a way I'm trying to figure out how to update that document with up-to-date expectations, besides potentially updating the packages. For example, the So there are parts there that don't need to be and there don't seem to be points documented that are on the critical path to a working setup. |
Yes it's outdated in some points. The firewall driver "none" needs to set in the container.conf https://forum.openwrt.org/t/podman-pod-briefly-available-then-unreachable/220561/11?u=kirdes |
Maintainer: @oskarirauta
Environment: (put here arch, model, OpenWrt version)
x86_64 VM, OpenWrt 24.10.0-rc5 (r28304-6dacba30a7) or OpenWrt 23.05.5 (r24106-10cc5fcd00)
Description:
On freshly installed / reset OpenWrt 24.100-rc5 or 23.05.5 with
podman
installed, basicpodman run
fails:OpenWrt 24.10.0-rc5
OpenWrt 23.05.5
I can likely debug and fix either of these issues but before doing that I'd like to calibrate expectations about the behaviour in the default configuration. Are these unheard of / unexpected, or expected after-fresh-install results?
The text was updated successfully, but these errors were encountered: