summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMatthew Heon <mheon@redhat.com>2018-12-04 14:57:06 -0500
committerMatthew Heon <mheon@redhat.com>2018-12-04 14:57:06 -0500
commit32aa45e344abc3e9501b0fddbac099285869e224 (patch)
tree671bc653b8efc93ee9b5729ec9414cd9560f14ce
parentf31c1c8c09c8dd1468093e0d891ff110d48f5461 (diff)
downloadpodman-32aa45e344abc3e9501b0fddbac099285869e224.tar.gz
podman-32aa45e344abc3e9501b0fddbac099285869e224.tar.bz2
podman-32aa45e344abc3e9501b0fddbac099285869e224.zip
Don't initialize CNI when running as rootless
We don't use CNI to configure networks for rootless containers, so no need to set it up. It may also cause issues with inotify, so disabling it resolves some potential problems. Signed-off-by: Matthew Heon <mheon@redhat.com>
-rw-r--r--libpod/runtime.go10
1 files changed, 6 insertions, 4 deletions
diff --git a/libpod/runtime.go b/libpod/runtime.go
index 9feae03fc..78092536d 100644
--- a/libpod/runtime.go
+++ b/libpod/runtime.go
@@ -523,11 +523,13 @@ func makeRuntime(runtime *Runtime) (err error) {
}
// Set up the CNI net plugin
- netPlugin, err := ocicni.InitCNI(runtime.config.CNIDefaultNetwork, runtime.config.CNIConfigDir, runtime.config.CNIPluginDir...)
- if err != nil {
- return errors.Wrapf(err, "error configuring CNI network plugin")
+ if !rootless.IsRootless() {
+ netPlugin, err := ocicni.InitCNI(runtime.config.CNIDefaultNetwork, runtime.config.CNIConfigDir, runtime.config.CNIPluginDir...)
+ if err != nil {
+ return errors.Wrapf(err, "error configuring CNI network plugin")
+ }
+ runtime.netPlugin = netPlugin
}
- runtime.netPlugin = netPlugin
// Set up a firewall backend
backendType := ""