Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make use of remoting support consistent between platforms (CONTAINER_HOST) #11196

Closed
ssbarnea opened this issue Aug 11, 2021 · 11 comments · Fixed by #11978
Closed

Make use of remoting support consistent between platforms (CONTAINER_HOST) #11196

ssbarnea opened this issue Aug 11, 2021 · 11 comments · Fixed by #11978
Labels
kind/bug Categorizes issue or PR as related to a bug. locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments.

Comments

@ssbarnea
Copy link
Collaborator

ssbarnea commented Aug 11, 2021

/kind bug

Description

Based on discussions made yesterday on irc, I will try to describe what we should do in order to ensure that podman command line works similarly across all platforms.

At this moment on non-linux platforms we do not install podman-remote and instead we have a podman executable which is acting like podman --remote. If I understood @mheon correctly, there are no differences between calling podman-remote and podman --remote on platforms that have both executables. On non-linux platforms, we can consider that the --remote argument is implicit and that some other commands are obviously not available.

For example on non-linux hosts, if you define something like CONTAINER_HOST=ssh://root@hostname/run/podman/podman.sock, podman will start using it right away for all commands.

That is great because it does match the behavior or docker, which does the same for DOCKER_HOST, were even the APIs do respect the environment variable.

Sadly, the same is not true for Linux podman, were podman will continue to use local host. This creates an undesired divergence in behavior across platforms.

My proposal is to minimic docker behavior which maximizes flexibility and allow users to determine the backend to be used only by environment variables and avoiding the need to add complex conditions in their code like: if not-on-linux and CONTAINER_HOST in environ do add --remote to all podman commands. These kind of hacks to make code complex and prone to bugs.

Describe the results you received:

Describe the results you expected:

As a podman user, I expect to be able to use one or more environment variables to control which backend will be used by podman on all supported platforms. No code that makes use of podman cli or api should need changes in order to be able to do that.

We are aware that this change would need to be introduced in v4.0.0 because it counts as major. Mainly presence of the variable will tell podman to use a different host, something that is not happening how on linux. While I think that the risk is very low (to have the var defined and not to use it already), is better to do it like this.

This change has no impact on macos/windows, as this is already happening there.

PS. Feel free to edit this proposal.

@openshift-ci openshift-ci bot added the kind/bug Categorizes issue or PR as related to a bug. label Aug 11, 2021
@ssbarnea ssbarnea added the 4.0 label Aug 11, 2021
@afbjorklund
Copy link
Contributor

afbjorklund commented Aug 11, 2021

Pretty sure we talked about this before.(#4390 #8070) And that it ended up being required, and different:

e.g. https://minikube.sigs.k8s.io/docs/handbook/pushing/#3-pushing-directly-to-in-cluster-cri-o-podman-env

podman-tabs

I think the end solution was going away from using environment variables altogether, and invent "connections"* ?

The podman-remote or podman --remote was still required, though. That is, podman is still local on Linux.


* there is actually a undocumented CONTAINER_CONNECTION to choose between them.

 -c, --connection string   Connection to use for remote Podman service
      --identity string     path to SSH identity file, (CONTAINER_SSHKEY)
      --url string          URL to access Podman service (CONTAINER_HOST) (default "unix:/run/user/1000/podman/podman.sock")

@mheon
Copy link
Member

mheon commented Aug 11, 2021

We are coming up on 4.0, so if there is a time to revisit this and make breaking changes, it is now.

I do wonder if this should be configurable - have a containers.conf field to set a preference between local Podman and remote connections.

@afbjorklund
Copy link
Contributor

afbjorklund commented Aug 11, 2021

We are coming up on 4.0, so if there is a time to revisit this and make breaking changes, it is now.

Wouldn't that just mean having one instruction for podman3 and one for podman4, in Python-style ?

Currently we got stuck on podman2, since someone reverted my go compiler upgrade (that was needed)
Eventually that will be solved and we can upgrade, but I thought some were stuck on podman 3.0 forever.

At the moment the struggle is with github.com/docker/client, so stuck with /var/run/docker.sock 😔

minikube ssh -- sudo ln -sf /run/podman/podman.sock /var/run/docker.sock
eval $(minikube podman-env)
ssh-add $CONTAINER_SSH_KEY
export DOCKER_HOST=${CONTAINER_HOST/\/run\/podman\/podman.sock/}

But it would still be nice if CONTAINER_HOST worked on all platforms, even if it makes the binary bigger etc.

@afbjorklund
Copy link
Contributor

afbjorklund commented Aug 11, 2021

I do wonder if this should be configurable - have a containers.conf field to set a preference between local Podman and remote connections.

I think there was a "remote" flag added to containers.conf, last time around ? #8070 (comment)

remote = false Indicates whether the application should be running in remote mode. This flag modifies the --remote option on container engines. Setting the flag to true will default podman --remote=true for access to the remote Podman service.

containers/common@379e353

@ssbarnea
Copy link
Collaborator Author

We are coming up on 4.0, so if there is a time to revisit this and make breaking changes, it is now.

I do wonder if this should be configurable - have a containers.conf field to set a preference between local Podman and remote connections.

In fact configurable using config files and/or environment variables is an implementation detail. Both are good and usually env takes precedence over config files, as way to switch the implicit option.

What i find key in that feature is that calls made to podman via cli or API should not need to be patched when config is changed. For example we have some ansible code that talks with podman with both approaches and we don't really want to be forced to add conditions for local and remote mode. If podman itself would know which mode to use, we should not bother about having to update the calls. I think that https://github.com/ansible-community/molecule-podman/pull/53/files can be seen as an example that explains the current extra complexity, as the OP tried to find a workaround for allowing him to use remote connections on linux. I am sure we can do better for the v4.

I wonder if, for v3 we could maybe add support for CONTAINER_ARGS=--remote in order to allow those on linux to force use of remote without having to change existing code?

@afbjorklund
Copy link
Contributor

I guess the suggestion is for remote to be true, and then have it "fall back" on just running if no host or connection is found ?

That is, to allow for the podman-remote binary to replace the podman binary also on Linux (if it now can do both of them)

@afbjorklund
Copy link
Contributor

afbjorklund commented Aug 11, 2021

In fact configurable using config files and/or environment variables is an implementation detail. Both are good and usually env takes precedence over config files, as way to switch the implicit option.

We have a problem when running multiple "profiles" / clusters, in that the configuration file is shared between shells but the environment variable is possible to set to different things for each shell.

The environment variables are problem in that you cannot set them from the command, without having the user run eval or somesuch - different for each shell of course, and doubly so on Windows

@github-actions
Copy link

A friendly reminder that this issue had no activity for 30 days.

@github-actions
Copy link

A friendly reminder that this issue had no activity for 30 days.

@rhatdan
Copy link
Member

rhatdan commented Oct 13, 2021

Bottom line on this, you want
if $COTAINER_HOST != "", the podman --remote=true as the default correct?

@ssbarnea
Copy link
Collaborator Author

Bottom line on this, you want

if $COTAINER_HOST != "", the podman --remote=true as the default correct?

Mostly yes. The reality is that recently I configured podman config to use remote by default. Having that implicit remote would be a great benefit, making "podman" command more portable across different platforms.

rhatdan added a commit to rhatdan/podman that referenced this issue Oct 14, 2021
Users enabling CONTAINER_HOST==PATH is indicating to podman they intend
to use remote functionality.

Fixes: containers#11196

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
rhatdan added a commit to rhatdan/podman that referenced this issue Oct 14, 2021
Users enabling CONTAINER_HOST==PATH is indicating to podman they intend
to use remote functionality.

Fixes: containers#11196

Update man pages to document all of the environment variables.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
rhatdan added a commit to rhatdan/podman that referenced this issue Oct 14, 2021
Users enabling CONTAINER_HOST==PATH is indicating to podman they intend
to use remote functionality.

Fixes: containers#11196

Update man pages to document all of the environment variables.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
@github-actions github-actions bot added the locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. label Sep 21, 2023
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Sep 21, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
kind/bug Categorizes issue or PR as related to a bug. locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants