On 27 April 2018 at 17:47, Pavel Raiskup <praiskup@xxxxxxxxxx> wrote: > On Friday, April 27, 2018 5:41:19 PM CEST Lennart Poettering wrote: >> On Fr, 27.04.18 17:27, Pavel Raiskup (praiskup@xxxxxxxxxx) wrote: >> >> > Hi all, >> > >> > just wanted to let you know about trivial experiment [1] with systemd in >> > container. Non-privileged systemd can now pretty fine run in docker >> > container (tested on Fedora 27 box). >> >> Hmm, IIRC there were at least two isues still, did they get resolved? >> Specifically: >> >> 1. docker fakes a /dev/console that doesn't behave like a console >> usually works, i.e. if a hangup is seen on it then it will destroy >> the pty behind it, instead of keeping it around... > > There't toy work-around to have at least something: > https://github.com/praiskup/systemd-container/blob/master/fedora-rawhide-x86_64/systemd > > Pavel > >> 2. docker sends SIGTERM to the container's PID 1 when it wants it to >> go down even though SIGTERM to PID 1 on SysV systems generally >> means "please reexecute", and not "please shut down". >> >> What's the current state on that? >> Did a bunch of related activities at my work recently ... If you are using Red Hat docker (eg from the RHEL/CentOS extras repo) then this will get a systemd container running for you: Dockerfile: FROM centos:7 ENV container docker STOPSIGNAL SIGRTMIN+3 ENTRYPOINT ["/sbin/init"] RUN yum -y update && yum clean all Run statement: docker run -dt --name mycontainer mysystemdimage If you are using upstream docker then you need to do the following: mkdir /etc/docker echo '{"seccomp-profile": "/etc/docker/seccomp.json"}' > /etc/docker/daemon.json wget -O /etc/docker/seccomp.json https://src.fedoraproject.org/rpms/docker/raw/master/f/seccomp.json Same dockerfile Run statement: docker run -dt --tmpfs /tmp:exec --tmpfs /run -v /sys/fs/cgroup:/sys/fs/cgroup:ro --name mycontainer mysystemdimage _______________________ The real problem here is docker engines you don't control as the seccomp filter is a potential blocker and potentially the run mount options _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx