Skip to content
This repository has been archived by the owner on Mar 28, 2018. It is now read-only.

(pseudo)tty not properly setup with the -t option #133

Closed
dlespiau opened this issue Aug 19, 2016 · 4 comments
Closed

(pseudo)tty not properly setup with the -t option #133

dlespiau opened this issue Aug 19, 2016 · 4 comments

Comments

@dlespiau
Copy link
Contributor

dlespiau commented Aug 19, 2016

$ docker run  -t debian tty
/dev/console
$ docker run --runtime cc -t debian tty
not a tty
@amshinde
Copy link
Contributor

While experimenting with systemd options for another bug, I realised that if we mount the /dev from the VM into the workload and avoid creating a new dev namespace with PrivateDevices=Yes, the above issue is resolved. This needs some more investigation to rootcause what is happening.
If we go with the above, we can restrict access to just certain pseudo devices using systemd cgroup mechanism(DevicePolicy=Strict, DeviceAllow..), although all the devices will be visible to the workload since we don't change dev namespace.

@dlespiau
Copy link
Contributor Author

I arrived at the same conclusion and did find we were missing /dev/console as well, haven't checked it that was enough for that one as well.

@chavafg
Copy link
Contributor

chavafg commented Dec 12, 2016

added test on #523

@chavafg
Copy link
Contributor

chavafg commented Jan 5, 2017

closing this issue as tests are already merged.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

6 participants