File: faq.rst

package info (click to toggle)
charliecloud 0.43-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 3,116 kB
  • sloc: python: 6,021; sh: 4,284; ansic: 3,863; makefile: 598
file content (1579 lines) | stat: -rw-r--r-- 61,598 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
Frequently asked questions (FAQ)
********************************

.. contents::
   :depth: 3
   :local:


About the project
=================

Where did the name Charliecloud come from?
------------------------------------------

*Charlie* — Charles F. McMillan was director of Los Alamos National Laboratory
from June 2011 until December 2017, i.e., at the time Charliecloud was started
in early 2014. He is universally referred to as “Charlie” here.

*cloud* — Charliecloud provides cloud-like flexibility for HPC systems.

How do you spell Charliecloud?
------------------------------

We try to be consistent with *Charliecloud* — one word, no camel case. That
is, *Charlie Cloud* and *CharlieCloud* are both incorrect.

How large is Charliecloud?
--------------------------

.. include:: _loc.rst


Errors
======

How do I read the :code:`ch-run` error messages?
------------------------------------------------

:code:`ch-run` error messages look like this::

  $ ch-run foo -- echo hello
  ch-run[25750]: can’t find image: foo: No such file or directory (ch-run.c:107 2)

There is a lot of information here, and it comes in this order:

1. Name of the executable; always :code:`ch-run`.

2. Process ID in square brackets; here :code:`25750`. This is useful when
   debugging parallel :code:`ch-run` invocations.

3. Colon.

4. Main error message; here :code:`can’t find image: foo`. This should be
   informative as to what went wrong, and if it’s not, please file an issue,
   because you may have found a usability bug. Note that in some cases you may
   encounter the default message :code:`error`; if this happens and you’re not
   doing something very strange, that’s also a usability bug.

5. Colon (but note that the main error itself can contain colons too), if and
   only if the next item is present.

6. Operating system’s description of the the value of :code:`errno`; here
   :code:`No such file or directory`. Omitted if not applicable.

7. Open parenthesis.

8. Name of the source file where the error occurred; here :code:`ch-run.c`.
   This and the following item tell developers exactly where :code:`ch-run`
   became confused, which greatly improves our ability to provide help and/or
   debug.

9. Source line where the error occurred.

10. Value of :code:`errno` (see `C error codes in Linux
    <http://www.virtsync.com/c-error-codes-include-errno>`_ for the full
    list of possibilities).

11. Close parenthesis.

*Note:* Despite the structured format, the error messages are not guaranteed
to be machine-readable.

:code:`ch-run` fails with “can’t re-mount image read-only”
----------------------------------------------------------

Normally, :code:`ch-run` re-mounts the image directory read-only within the
container. This fails if the image resides on certain filesystems, such as NFS
(see `issue #9 <https://github.com/hpc/charliecloud/issues/9>`_). There are
two solutions:

1. Unpack the image into a different filesystem, such as :code:`tmpfs` or
   local disk. Consult your local admins for a recommendation. Note that
   Lustre is probably not a good idea because it can give poor performance for
   you and also everyone else on the system.

2. Use the :code:`-w` switch to leave the image mounted read-write. This may
   have an impact on reproducibility (because the application can change the
   image between runs) and/or stability (if there are multiple application
   processes and one writes a file in the image that another is reading or
   writing).

:code:`ch-image` fails with "certificate verify failed"
-------------------------------------------------------

When :code:`ch-image` interacts with a remote registry (e.g., via :code:`push`
or :code:`pull` subcommands), it will verify the registry’s HTTPS certificate.
If this fails, :code:`ch-image` will exit with the error "certificate verify
failed".

This situation tends to arise with self-signed or institutionally-signed
certificates, even if the OS is configured to trust them. We use the Python
HTTP library Requests, which on many platforms `includes its own CA
certificates bundle
<https://docs.python-requests.org/en/master/user/advanced/#ca-certificates>`_,
ignoring the bundle installed by the OS.

Requests can be directed to use an alternate bundle of trusted CAs by setting
environment variable :code:`REQUESTS_CA_BUNDLE` to the bundle path. (See `the
Requests documentation
<https://docs.python-requests.org/en/master/user/advanced/#ssl-cert-verification>`_
for details.) For example::

  $ export REQUESTS_CA_BUNDLE=/usr/local/share/ca-certificates/registry.crt
  $ ch-image pull registry.example.com/image:tag

Alternatively, certificate verification can be disabled entirely with the
:code:`--tls-no-verify` flag. However, users should enable this option only if
they have other means to be confident in the registry’s identity.

"storage directory seems invalid"
---------------------------------

Charliecloud uses its *storage directory* (:code:`/var/tmp/$USER.ch` by
default) for various internal uses. As such, Charliecloud needs complete
control over this directory’s contents. This error happens when the storage
directory exists but its contents do not match what’s expected, including if
it’s an empty directory, which is to protect against using common temporary
directories like :code:`/tmp` or :code:`/var/tmp` as the storage directory.

Let Charliecloud create the storage directory. For example, if you want to use
:code:`/big/containers/$USER/charlie` for the storage directory (e.g., by
setting :code:`CH_IMAGE_STORAGE`), ensure :code:`/big/containers/$USER` exists
but do not create the final directory :code:`charlie`.

"Transport endpoint is not connected"
-------------------------------------

This error likely means that the SquashFS mount process has exited or been
killed and you’re attempting to access the mount location. This is most often
seen when a parallel launcher like :code:`srun` is used to run the mount
command. :code:`srun` will see that the mount command has exited successfully
and clean up all child processes, including that of the active mount. A
workaround is to use a tool like :code:`pdsh`. For more details see
Charliecloud issue
`#230 <https://github.com/hpc/charliecloud/issues/230>`_.

"fatal: :code:`$HOME` not set" from Git, or similar
---------------------------------------------------

For example::

  $ cat Dockerfile
  FROM alpine:3.17
  RUN apk add git
  RUN git config --global http.sslVerify false
  $ ch-image build -t foo -f Dockerfile .
    1 FROM alpine:3.17
    2 RUN ['/bin/sh', '-c', 'apk add git']
  [...]
    3 RUN ['/bin/sh', '-c', 'git config --global http.sslVerify false']
  fatal: $HOME not set
  error: build failed: RUN command exited with 128

The reason this happens is that :code:`ch-image build` executes :code:`RUN`
instructions with :code:`ch-run` options including the absence of
:code:`--home`, under which the environment variable :code:`$HOME` is unset.
Thus, tools like Git that try to use it will fail.

The reasoning for leaving the variable unset is that because Charliecloud runs
unprivileged, it isn’t really meaningful for a container to have multiple
users, and thus building images with things in the home directory is an
antipattern. In fact, with :code:`--home` specified, :code:`ch-run` sets
:code:`$HOME` to :code:`/home/$USER` and bind-mounts the user’s host home
directory at that path.

The concern with setting :code:`$HOME` to some default value during build is
that it could simply hide the problem until runtime later, where it would be
even more confusing. (That said, if this pattern is desired, it can be
implemented with an :code:`ARG` or :code:`ENV` instruction.)

The recommended workaround and best practice is to put configuration at the
system level, not the user level. In the example above, this means changing
:code:`git config --global` to :code:`git config --system`.

See the man page for :code:`ch-run` for more on environment variable
handling.

:code:`ch-run` fails with “can’t execve(2): permission denied”
--------------------------------------------------------------

For example::

  $ ch-run /var/tmp/hello -- /bin/echo foo
  ch-run[154334]: error: can’t execve(2): /bin/echo: Permission denied (core.c:387 13)

But :code:`/bin/echo` *does* have execute permission::

  $ ls -lh /var/tmp/hello/bin/echo
  -rwxr-xr-x 1 charlie charlie 51 Oct  8  2021 /var/tmp/hello/bin/echo

In this case, the error indicates the container image is on a filesystem
mounted with :code:`noexec`. To verify this, you can use e.g.
:code:`findmnt(8)`::

  $ findmnt
  TARGET      SOURCE  FSTYPE  OPTIONS
  [...]
  └─/var/tmp  tmpfs   tmpfs   rw,noexec,relatime,size=8675309k

Note :code:`noexec` under :code:`OPTIONS`.

To fix this, you can:

  1. Use a different filesystem mounted :code:`exec` (i.e., the opposite
     of :code:`noexec` and typically the default).

  2. Change the mount options for the filesystem (e.g., update
     :code:`/etc/fstab` or remount with :code:`exec`).

  3. Use SquashFS format images (only for images exported from Charliecloud’s
     storage directory).


Unexpected behavior
===================

What do the version numbers mean?
---------------------------------

Released versions of Charliecloud have a pretty standard version number, e.g.
0.9.7.

Work leading up to a released version also has version numbers, to satisfy
tools that require them and to give the executables something useful to report
on :code:`--version`, but these can be quite messy. We refer to such versions
informally as *pre-releases*, but Charliecloud does not have formal
pre-releases such as alpha, beta, or release candidate.

*Pre-release version numbers are not in order*, because this work is in a DAG
rather than linear, except they precede the version we are working towards. If
you’re dealing with these versions, use Git.

Pre-release version numbers are the version we are working towards, followed
by: :code:`~pre`, the branch name if not :code:`master` with non-alphanumerics
removed, the commit hash, and finally :code:`dirty` if the working directory
had uncommitted changes.

Examples:

  * :code:`0.2.0` : Version 0.2.0. Released versions don’t include Git
    information, even if built in a Git working directory.

  * :code:`0.2.1~pre` : Some snapshot of work leading up to 0.2.1, built from
    source code where the Git information has been lost, e.g. the tarballs
    Github provides. This should make you wary because you don’t have any
    provenance. It might even be uncommitted work or an abandoned branch.

  * :code:`0.2.1~pre+1a99f42` : Master branch commit 1a99f42, built from a
    clean working directory (i.e., no changes since that commit).

  * :code:`0.2.1~pre+foo1.0729a78` : Commit 0729a78 on branch :code:`foo-1`,
    :code:`foo_1`, etc. built from clean working directory.

  * :code:`0.2.1~pre+foo1.0729a78.dirty` : Commit 0729a78 on one of those
    branches, plus un-committed changes.

:code:`--uid 0` lets me read files I can’t otherwise!
-----------------------------------------------------

Some permission bits can give a surprising result with a container UID of 0.
For example::

  $ whoami
  reidpr
  $ echo surprise > ~/cantreadme
  $ chmod 000 ~/cantreadme
  $ ls -l ~/cantreadme
  ---------- 1 reidpr reidpr 9 Oct  3 15:03 /home/reidpr/cantreadme
  $ cat ~/cantreadme
  cat: /home/reidpr/cantreadme: Permission denied
  $ ch-run /var/tmp/hello cat ~/cantreadme
  cat: /home/reidpr/cantreadme: Permission denied
  $ ch-run --uid 0 /var/tmp/hello cat ~/cantreadme
  surprise

At first glance, it seems that we’ve found an escalation -- we were able to
read a file inside a container that we could not read on the host! That seems
bad.

However, what is really going on here is more prosaic but complicated:

1. After :code:`unshare(CLONE_NEWUSER)`, :code:`ch-run` gains all capabilities
   inside the namespace. (Outside, capabilities are unchanged.)

2. This include :code:`CAP_DAC_OVERRIDE`, which enables a process to
   read/write/execute a file or directory mostly regardless of its permission
   bits. (This is why root isn’t limited by permissions.)

3. Within the container, :code:`exec(2)` capability rules are followed.
   Normally, this basically means that all capabilities are dropped when
   :code:`ch-run` replaces itself with the user command. However, if EUID is
   0, which it is inside the namespace given :code:`--uid 0`, then the
   subprocess keeps all its capabilities. (This makes sense: if root creates a
   new process, it stays root.)

4. :code:`CAP_DAC_OVERRIDE` within a user namespace is honored for a file or
   directory only if its UID and GID are both mapped. In this case,
   :code:`ch-run` maps :code:`reidpr` to container :code:`root` and group
   :code:`reidpr` to itself.

5. Thus, files and directories owned by the host EUID and EGID (here
   :code:`reidpr:reidpr`) are available for all access with :code:`ch-run
   --uid 0`.

This is not an escalation. The quirk applies only to files owned by the
invoking user, because :code:`ch-run` is unprivileged outside the namespace,
and thus he or she could simply :code:`chmod` the file to read it. Access
inside and outside the container remains equivalent.

References:

* http://man7.org/linux/man-pages/man7/capabilities.7.html
* http://lxr.free-electrons.com/source/kernel/capability.c?v=4.2#L442
* http://lxr.free-electrons.com/source/fs/namei.c?v=4.2#L328

.. _faq_mkdir-ro:

:code:`--bind` creates mount points within un-writeable directories!
--------------------------------------------------------------------

Consider this image::

  $ ls /var/tmp/image
  bin  dev  home  media  opt   root  sbin  sys  usr
  ch   etc  lib   mnt    proc  run   srv   tmp  var
  $ ls -ld /var/tmp/image/mnt
  drwxr-xr-x 4 root root 80 Jan  5 09:52 /var/tmp/image/mnt
  $ ls /var/tmp/image/mnt
  bar  foo

That is, :code:`/mnt` is owned by root, un-writeable by us even considering
the prior question, and contains two subdirectories. Indeed, we cannot create
a new directory there::

  $ mkdir /var/tmp/image/mnt/baz
  mkdir: cannot create directory ‘/var/tmp/image/mnt/baz’: Permission denied

Recall that bind-mounting to a path that does not exist in a read-only image
fails::

  $ ch-run -b /tmp/baz:/mnt/baz /var/tmp/image -- ls /mnt
  ch-run[40498]: error: can't mkdir: /var/tmp/image/mnt/baz: Read-only file system (ch_misc.c:582 30)

That’s fine; we’ll just use :code:`--write-fake` to create a writeable overlay
on the container. Then we can make any mount points we need. Right?

::

  $ ch-run -W /var/tmp/image -- mkdir /qux      # succeeds
  $ ch-run -W /var/tmp/image -- mkdir /mnt/baz  # fails
  mkdir: can't create directory '/mnt/baz': Permission denied

Wait — why could we create a subdirectory of (container path) :code:`/` but
not a subdirectory of :code:`/mnt`? This is because the latter, which is at
host path :code:`/var/tmp/image/mnt`, is not writeable by us: the overlayfs
propagates the directory’s no-write permissions. Despite this, we can in fact
use paths that do not yet exist for bind-mount destinations::

  $ ch-run -W -b /tmp/baz:/mnt/baz /var/tmp/image -- ls /mnt
  bar  baz  foo

What’s happening is bind-mount trickery and a symlink ranch. :code:`ch-run`
creates a new directory on the overlaid tmpfs, bind-mounts the old (host path)
:code:`/var/tmp/images/mnt` to a subdirectory of it, symlinks the old
contents, and finally overmounts the old, un-writeable directory with the new
one::

  $ ch-run -W -b /tmp/baz:/mnt/baz /var/tmp/image -- ls -la /mnt
  drwxr-x---    4 reidpr   reidpr         120 Jan  5 17:11 .
  drwx------    1 reidpr   reidpr          40 Jan  5 17:11 ..
  drwxr-xr-x    4 nobody   nogroup         80 Jan  5 16:52 .orig
  lrwxrwxrwx    1 reidpr   reidpr           9 Jan  5 17:11 bar -> .orig/bar
  drwxr-x---    2 reidpr   reidpr          40 Jan  3 23:49 baz
  lrwxrwxrwx    1 reidpr   reidpr           9 Jan  5 17:11 foo -> .orig/foo
  $ ch-run -W -b /tmp/baz:/mnt/baz /var/tmp/image -- cat /proc/mounts | fgrep ' /mnt'
  none /mnt tmpfs rw,relatime,size=3943804k,uid=1000,gid=1000,inode64 0 0
  none /mnt/.orig overlay rw,relatime,lowerdir=/var/tmp/image,upperdir=/mnt/upper,workdir=/mnt/work,volatile,userxattr 0 0
  tmpfs /mnt/baz tmpfs rw,relatime,size=8388608k,inode64 0 0

This new directory is writeable, and :code:`mkdir(2)` succeeds. (The overlaid
tmpfs is mounted on *host* :code:`/mnt` during container assembly, which is
why it appears in mount options.)

There are differences from the original directory, of course. Most notably:

  * The ranched symlinks can be deleted by the user within the container,
    contrary to the old directory’s read-only permissions.

  * The contents of the “ranched” directory become symlinks rather than their
    original file type.

Software that cares about these things may break.

Why does :code:`ping` not work?
-------------------------------

:code:`ping` fails with “permission denied” or similar under Charliecloud,
even if you’re UID 0 inside the container::

  $ ch-run $IMG -- ping 8.8.8.8
  PING 8.8.8.8 (8.8.8.8): 56 data bytes
  ping: permission denied (are you root?)
  $ ch-run --uid=0 $IMG -- ping 8.8.8.8
  PING 8.8.8.8 (8.8.8.8): 56 data bytes
  ping: permission denied (are you root?)

This is because :code:`ping` needs a raw socket to construct the needed
:code:`ICMP ECHO` packets, which requires capability :code:`CAP_NET_RAW` or
root. Unprivileged users can normally use :code:`ping` because it’s a setuid
or setcap binary: it raises privilege using the filesystem bits on the
executable to obtain a raw socket.

Under Charliecloud, there are multiple reasons :code:`ping` can’t get a raw
socket. First, images are unpacked without privilege, meaning that setuid and
setcap bits are lost. But even if you do get privilege in the container (e.g.,
with :code:`--uid=0`), this only applies in the container. Charliecloud uses
the host’s network namespace, where your unprivileged host identity applies
and :code:`ping` still can’t get a raw socket.

The recommended alternative is to simply try the thing you want to do, without
testing connectivity using :code:`ping` first.

Why is MATLAB trying and failing to change the group of :code:`/dev/pts/0`?
---------------------------------------------------------------------------

MATLAB and some other programs want pseudo-TTY (PTY) files to be group-owned
by :code:`tty`. If it’s not, Matlab will attempt to :code:`chown(2)` the file,
which fails inside a container.

The scenario in more detail is this. Assume you’re user :code:`charlie`
(UID=1000), your primary group is :code:`nerds` (GID=1001), :code:`/dev/pts/0`
is the PTY file in question, and its ownership is :code:`charlie:tty`
(:code:`1000:5`), as it should be. What happens in the container by default
is:

1. MATLAB :code:`stat(2)`\ s :code:`/dev/pts/0` and checks the GID.

2. This GID is :code:`nogroup` (65534) because :code:`tty` (5) is not mapped
   on the host side (and cannot be, because only one’s EGID can be mapped in
   an unprivileged user namespace).

3. MATLAB concludes this is bad.

4. MATLAB executes :code:`chown("/dev/pts/0", 1000, 5)`.

5. This fails because GID 5 is not mapped on the guest side.

6. MATLAB pukes.

The workaround is to map your EGID of 1001 to 5 inside the container (instead
of the default 1001:1001), i.e. :code:`--gid=5`. Then, step 4 succeeds because
the call is mapped to :code:`chown("/dev/pts/0", 1000, 1001)` and MATLAB is
happy.

:code:`ch-convert` from Docker incorrect image sizes
----------------------------------------------------

When converting from Docker, :code:`ch-convert` often finishes before the
progress bar is complete. For example::

  $ ch-convert -i docker foo /var/tmp/foo.tar.gz
  input:   docker    foo
  output:  tar       /var/tmp/foo.tar.gz
  exporting ...
   373MiB 0:00:21 [============================>                 ] 65%
  [...]

In this case, the :code:`.tar.gz` contains 392 MB uncompressed::

  $ zcat /var/tmp/foo.tar.gz | wc
  2740966 14631550 392145408

But Docker thinks the image is 597 MB::

  $ sudo docker image inspect foo | fgrep -i size
          "Size": 596952928,
          "VirtualSize": 596952928,

We’ve also seen cases where the Docker-reported size is an *under*\ estimate::

  $ ch-convert -i docker bar /var/tmp/bar.tar.gz
  input:   docker    bar
  output:  tar       /var/tmp/bar.tar.gz
  exporting ...
   423MiB 0:00:22 [============================================>] 102%
  [...]
  $ zcat /var/tmp/bar.tar.gz | wc
  4181186 20317858 444212736
  $ sudo docker image inspect bar | fgrep -i size
          "Size": 433812403,
          "VirtualSize": 433812403,

We think that this is because Docker is computing size based on the size of
the layers rather than the unpacked image. We do not currently have a fix; see
`issue #165 <https://github.com/hpc/charliecloud/issues/165>`_.

My password that contains digits doesn’t work in VirtualBox console
-------------------------------------------------------------------

VirtualBox has confusing Num Lock behavior. Thus, you may be typing arrows,
page up/down, etc. instead of digits, without noticing because console
password fields give no feedback, not even whether a character has been typed.

Try using the number row instead, toggling Num Lock key, or SSHing into the
virtual machine.

Mode bits (permission bits) are lost
------------------------------------

Charliecloud preserves only some mode bits, specifically user, group, and
world permissions, and the `restricted deletion flag
<https://man7.org/linux/man-pages/man1/chmod.1.html#RESTRICTED_DELETION_FLAG_OR_STICKY_BIT>`_
on directories; i.e. 777 on files and 1777 on directories.

The setuid (4000) and setgid (2000) bits are not preserved because ownership
of files within Charliecloud images is that of the user who unpacks the image.
Leaving these bits set could therefore surprise that user by unexpectedly
creating files and directories setuid/gid to them.

The sticky bit (1000) is not preserved for files because :code:`unsquashfs(1)`
unsets it even with umask 000. However, this is bit is largely obsolete for
files.

Note the non-preserved bits may *sometimes* be retained, but this is undefined
behavior. The specified behavior is that they may be zeroed at any time.

Why is my wildcard in :code:`ch-run` not working?
-------------------------------------------------
Be aware that wildcards in the :code:`ch-run` command are interpreted by the
host, not the container, unless protected. One workaround is to use a
sub-shell. For example::

  $ ls /usr/bin/oldfind
  ls: cannot access '/usr/bin/oldfind': No such file or directory
  $ ch-run /var/tmp/hello.sqfs -- ls /usr/bin/oldfind
  /usr/bin/oldfind
  $ ls /usr/bin/oldf*
  ls: cannot access '/usr/bin/oldf*': No such file or directory
  $ ch-run /var/tmp/hello.sqfs -- ls /usr/bin/oldf*
  ls: cannot access /usr/bin/oldf*: No such file or directory
  $ ch-run /var/tmp/hello.sqfs -- sh -c 'ls /usr/bin/oldf*'
  /usr/bin/oldfind

MPI
===

Network Devices
---------------

We recommend building your container MPI with Libfabric for most use cases.
See :ref:`MPI best practices <best-practices_mpi>`.


.. _faq_mpi_cray:

Cray Slingshot Interconnect
---------------------------

There are two reliable ways to give MPI containers visibility of the Cray
Slingshot interconnect network device.

   1. Your container has access to Cray rpms at build time. You live in
      spiritual harmony, want for naught, able to freely install
      :code:`cray-{libfabric,libcxi,mpich,pmi,pals}` inside your container at
      build time. For the rest of us, we have the following option.

   2. Build a container with OpenMPI or MPICH (recommended), PMIx, Libfabric
      and add (i.e., inject) Cray Libfabric bits at runtime using explicit
      CML bind-mounts or a container device integration (CDI) JSON.

The following sub-sections will help you with option 2.

Container requirements
~~~~~~~~~~~~~~~~~~~~~~

If you use containers that extend our MPI examples, e.g.,
:code:`examples/Dockerfile.{mpich,openmpi}`, you are all set. Otherwise, build
your container with the following.

   1. OpenMPI 5.0.8 or MPICH 4.3.2 (recommended)
   2. libfabric 1.22.0
   3. PMIx ≥ 5.0.9

Below are snippets from our :code:`examples/Dockerfile.libfabric` and
:code:`examples/Dockerfile.mpich` respectively that demonstrate our example
Libfabric, PMIx, and MPICH configuration.

.. literalinclude:: ../examples/Dockerfile.libfabric
   :language: docker
   :lines: 117-136

.. literalinclude:: ../examples/Dockerfile.libfabric
   :language: docker
   :lines: 140-150

.. literalinclude:: ../examples/Dockerfile.mpich
   :language: docker
   :lines: 19-39

.. _faq_mpi_cray_bind-mounts:

Explicit bind-mounting
~~~~~~~~~~~~~~~~~~~~~~

At runtime, you must bind-mount your host Cray Libfabric library (and any
unresolved linked dependencies) into your container. For example, on a Cray EX
system with Slingshot interconnect, you can begin with the following.

.. note::
  The following assume a Container with Libfabric 1.22.0, MPICH 4.3.2, and PMIx
  5.0.9 install at :code:`/usr/local`. Adjust paths as needed.

::
   $ ch-run -W \
            -b /path/to/cray/libfabric.so.x.x.x:/usr/local/lib/libfabric.so.1 \
            -b /usr/lib64/libcxi.so.x.x.x \
            ${HOME}/mpich.sqfs -- bash -c "/sbin/ldconfig && ldd /usr/local/lib/libfabric.so" \
            | grep 'not found'

* :code:`-W` : Use a writeable overlay filesystem. This is needed to 1) create
  the bind-mount points and 2) run :code:`ldconfig(8)` without issue.

* :code:`-b /path/to/cray/libfabric.so.x.x.x:/usr/local/lib/libfabric.so.1`
  bind-mounts the Cray Libfabric shared library into the container at the
  expected path (overwrite existing). Adjust the path and shared object version
  to your host Cray Libfabric as needed.

* :code:`bash -c "/sbin/ldconfig && ldd /usr/local/lib/libfabric.so"`
  runs :code:`ldconfig(8)` to update the container’s shared library cache and
  then checks for any unresolved dependencies of Libfabric.

Add bind-mount arguments for any other unresolved dependencies reported. You can
check to ensure your container has visbility of the Cray Libfabric Interconnect
as follows.

::

  $ ch-run -W \
           -b /path/to/cray/libfabric.so.x.x.x:/usr/local/lib/libfabric.so.1 \
           -b /usr/lib64/libcxi.so.x.x.x \
           -b /path/to/cray/fi_info:/usr/local/bin/fi_info \
           ${HOME}/mpich.sqfs -- bash -c "/sbin/ldconfig \
                                           && fi_info -p cxi"
  provider: cxi
    fabric: cxi
  [...]

* Note the addition of :code:`-b /path/to/cray/fi_info:/usr/local/bin/fi_info`,
  bind-mounting the Cray Libfabric :code:`fi_info` utility into the container at
  the expected path (overwrite existing). Adjust the path as needed.

Using CDI
~~~~~~~~~

Rather than explicitly bind-mounting on the command line, you can create a CDI
JSON file and use :code:`--cdi` at runtime. For example, we can convert the
above explicit bind-mounts from the above section into a CDI JSON file as
follows.

.. note::
  The hook :code:`nvidia-ctk hook`, :code:`update-ldcache`, is currently
  necessary to run ldconfig to create the cray libfabric shared object symlinks.

.. literalinclude:: cdi-cray-libfabric.json
   :language: JSON


Run the following to ensure it works.

::

  $ ch-run --cdi=cdi-cray-libfabric.json \
           ${HOME}/mpich.sqfs -- bash -c "/sbin/ldconfig fi_info -p cxi"
  provider: cxi
    fabric: cxi
  [...]

Cray Libfabric ABI compatibility
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Libfabric versions greater than 1.22.0, e.g., 2.X.X, introduce the symbol
version :code:`FABRIC_1.8`. If your container is using a Libfabric version above
1.22.0 and your site's Cray Libfabric is missing :code:`FABRIC_1.8`, you must
downgrade your container's Libfabric to 1.22.0 (recommend) or older.

You can check both your container's and your site's Cray Libfabric for the
symbol versions as follows.

::

  $ ch-run ompi.sqfs -- bash -c 'nm -D \
                                    --defined-only \
                                    -C /usr/local/lib/libfabric.so \
                                    | grep -E "FABRIC.*" | sort -u'
  FABRIC_1.0
  FABRIC_1.1
  FABRIC_1.2
  FABRIC_1.3
  FABRIC_1.4
  FABRIC_1.5
  FABRIC_1.6
  FABRIC_1.7
  FABRIC_1.8

  $ nm -D \
       --defined-only \
       -C /path/to/cray/libfabric.so | grep -oE 'FABRIC.*' | sort -u
  FABRIC_1.0
  FABRIC_1.1
  FABRIC_1.2
  FABRIC_1.3
  FABRIC_1.4
  FABRIC_1.5
  FABRIC_1.6
  FABRIC_1.7


OpenMPI & Charliecloud
----------------------

:code:`mpirun` can’t launch jobs
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For example, you might see::

  $ mpirun -np 1 ch-run /var/tmp/mpihello-openmpi -- /hello/hello
  App launch reported: 2 (out of 2) daemons - 0 (out of 1) procs
  [cn001:27101] PMIX ERROR: BAD-PARAM in file src/dstore/pmix_esh.c at line 996

We’re not yet sure why this happens — it may be a mismatch between the OpenMPI
builds inside and outside the container — but in our experience launching with
:code:`srun` often works when :code:`mpirun` doesn’t, so try that.

.. _faq_join:

Communication between ranks on the same node fails
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

OpenMPI has many ways to transfer messages between ranks. If the ranks are on
the same node, it is faster to do these transfers using shared memory rather
than involving the network stack. There are two ways to use shared memory.

The first and older method is to use POSIX or SysV shared memory segments.
This approach uses two copies: one from Rank A to shared memory, and a second
from shared memory to Rank B. For example, the :code:`sm` *byte transport
layer* (BTL) does this.

The second and newer method is to use the :code:`process_vm_readv(2)` and/or
:code:`process_vm_writev(2)`) system calls to transfer messages directly from
Rank A’s virtual memory to Rank B’s. This approach is known as *cross-memory
attach* (CMA). It gives significant performance improvements in `benchmarks
<https://blogs.cisco.com/performance/the-vader-shared-memory-transport-in-open-mpi-now-featuring-3-flavors-of-zero-copy>`_,
though of course the real-world impact depends on the application. For
example, the :code:`vader` BTL (enabled by default in OpenMPI 2.0) and
:code:`psm2` *matching transport layer* (MTL) do this.

The problem in Charliecloud is that the second approach does not work by
default.

We can demonstrate the problem with LAMMPS molecular dynamics application::

  $ srun --cpus-per-task 1 ch-run /var/tmp/lammps_mpi -- \
    lmp_mpi -log none -in /lammps/examples/melt/in.melt
  [cn002:21512] Read -1, expected 6144, errno = 1
  [cn001:23947] Read -1, expected 6144, errno = 1
  [cn002:21517] Read -1, expected 9792, errno = 1
  [... repeat thousands of times ...]

With :code:`strace(1)`, one can isolate the problem to the system call noted
above::

  process_vm_readv(...) = -1 EPERM (Operation not permitted)
  write(33, "[cn001:27673] Read -1, expected 6"..., 48) = 48

The `man page <http://man7.org/linux/man-pages/man2/process_vm_readv.2.html>`_
reveals that these system calls require that the process have permission to
:code:`ptrace(2)` one another, but sibling user namespaces `do not
<http://man7.org/linux/man-pages/man2/ptrace.2.html>`_. (You *can*
:code:`ptrace(2)` into a child namespace, which is why :code:`gdb` doesn’t
require anything special in Charliecloud.)

This problem is not specific to containers; for example, many settings of
kernels with `YAMA
<https://www.kernel.org/doc/Documentation/security/Yama.txt>`_ enabled will
similarly disallow this access.

So what can you do? There are a few options:

* We recommend simply using the :code:`--join` family of arguments to
  :code:`ch-run`. This puts a group of :code:`ch-run` peers in the same
  namespaces; then, the system calls work. See the :doc:`ch-run` man page for
  details.

* You can also sometimes turn off single-copy. For example, for :code:`vader`,
  set the MCA variable :code:`btl_vader_single_copy_mechanism` to
  :code:`none`, e.g. with an environment variable::

    $ export OMPI_MCA_btl_vader_single_copy_mechanism=none

  :code:`psm2` does not let you turn off CMA, but it does fall back to
  two-copy if CMA doesn’t work. However, this fallback crashed when we tried
  it.

* The kernel module `XPMEM
  <https://github.com/hjelmn/xpmem/tree/master/kernel>`_ enables a different
  single-copy approach. We have not yet tried this, and the module needs to be
  evaluated for user namespace safety, but it’s quite a bit faster than CMA on
  benchmarks.

.. Images by URL only works in Sphinx 1.6+. Debian Stretch has 1.4.9, so
   remove it for now.
   .. image:: https://media.giphy.com/media/1mNBTj3g4jRCg/giphy.gif
      :alt: Darth Vader bowling a strike with the help of the Force
      :align: center

I get a bunch of independent rank-0 processes when launching with :code:`srun`
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For example, you might be seeing this::

  $ srun ch-run /var/tmp/mpihello-openmpi -- /hello/hello
  0: init ok cn036.localdomain, 1 ranks, userns 4026554634
  0: send/receive ok
  0: finalize ok
  0: init ok cn035.localdomain, 1 ranks, userns 4026554634
  0: send/receive ok
  0: finalize ok

We were expecting a two-rank MPI job, but instead we got two independent
one-rank jobs that did not coordinate.

MPI ranks start as normal, independent processes that must find one another
somehow in order to sync up and begin the coupled parallel program; this
happens in :code:`MPI_Init()`.

There are lots of ways to do this coordination. Because we are launching with
the host’s Slurm, we need it to provide something for the containerized
processes for such coordination. OpenMPI must be compiled to use what that
Slurm has to offer, and Slurm must be told to offer it. What works for us is a
something called "PMIx". You can see if your Slurm supports it with::

  $ srun --mpi=list
    cray_shasta
    none
    pmi2
    pmix

If :code:`pmix` is not in the list, you must either (a) ask your admins to
enable Slurm’s PMIx support, or (b) rebuild your container MPI against an PMI
in the list. If it is in the list, but you’re seeing this problem, that means
it is not the default, and you need to tell Slurm you want it. Try::

  $ srun --mpi=pmix ch-run /var/tmp/mpihello-openmpi -- /hello/hello
  0: init ok wc035.localdomain, 2 ranks, userns 4026554634
  1: init ok wc036.localdomain, 2 ranks, userns 4026554634
  0: send/receive ok
  0: finalize ok

How do I ...
============

My app needs to write to :code:`/var/log`, :code:`/run`, etc.
-------------------------------------------------------------

Because the image is mounted read-only by default, log files, caches, and
other stuff cannot be written anywhere in the image. You have three options:

1. Configure the application to use a different directory. :code:`/tmp` is
   often a good choice, because it’s shared with the host and fast.

2. Use :code:`RUN` commands in your Dockerfile to create symlinks that point
   somewhere writeable, e.g. :code:`/tmp`, or :code:`/mnt/0` with
   :code:`ch-run --bind`.

3. Run the image read-write with :code:`ch-run -w`. Be careful that multiple
   containers do not try to write to the same files.

How do I run X11 apps?
----------------------

X11 applications should “just work”. For example, try this Dockerfile:

.. code-block:: docker

  FROM debian:stretch
  RUN    apt-get update \
      && apt-get install -y xterm

Build it and unpack it to :code:`/var/tmp`. Then::

  $ ch-run /scratch/ch/xterm -- xterm

should pop an xterm.

If your X11 application doesn’t work, please file an issue so we can
figure out why.

How do I specify an image reference?
------------------------------------

You must specify an image for many use cases, including :code:`FROM`
instructions, the source of an image pull (e.g. :code:`ch-image pull` or
:code:`docker pull`), the destination of an image push, and adding image tags.
Charliecloud calls this an *image reference*, but there appears to be no
established name for this concept.

The syntax of an image reference is not well documented. This FAQ represents
our understanding, which is cobbled together from the `Dockerfile reference
<https://docs.docker.com/engine/reference/builder/#from>`_, the :code:`docker
tag` `documentation
<https://docs.docker.com/engine/reference/commandline/tag/>`_, and various
forum posts. It is not a precise match for how Docker implements it, but it
should be close enough.

We’ll start with two complete examples with all the bells and whistles:

1. :code:`example.com:8080/foo/bar/hello-world:version1.0`
2. :code:`example.com:8080/foo/bar/hello-world@sha256:f6c68e2ad82a`

These references parse into the following components, in this order:

1. A `valid hostname <https://en.wikipedia.org/wiki/Hostname>`_; we assume
   this matches the regular expression :code:`[A-Za-z0-9.-]+`, which is very
   approximate. Optional; here :code:`example.com`.

2. A colon followed by a decimal port number. If hostname is given, optional;
   otherwise disallowed; here :code:`8080`.

3. If hostname given, a slash.

4. A path, with one or more components separated by slash. Components match
   the regex :code:`[a-z0-9_.-]+`. Optional; here :code:`foo/bar`. Pedantic
   details:

   * Under the hood, the default path is :code:`library`, but this is
     generally not exposed to users.

   * Three or more underscores in a row is disallowed by Docker, but we don’t
     check this.

5. If path given, a slash.

6. The image name (tag), which matches :code:`[a-z0-9_.-]+`. Required; here
   :code:`hello-world`.

7. Zero or one of:

   * A tag matching the regular expression :code:`[A-Za-z0-9_.-]+` and
     preceded by a colon. Here :code:`version1.0` (example 1).

   * A hexadecimal hash preceded by the string :code:`@sha256:`. Here
     :code:`f6c68e2ad82a` (example 2).

     * Note: Digest algorithms other than SHA-256 are in principle allowed,
       but we have not yet seen any.

Detail-oriented readers may have noticed the following gotchas:

* A hostname without port number is ambiguous with the leading component of a
  path. For example, in the reference :code:`foo/bar/baz`, it is ambiguous
  whether :code:`foo` is a hostname or the first (and only) component of the
  path :code:`foo/bar`. The `resolution rule
  <https://stackoverflow.com/a/37867949>`_ is: if the ambiguous substring
  contains a dot, assume it’s a hostname; otherwise, assume it’s a path
  component.

* The only character that cannot go in a POSIX filename is slash. Thus,
  Charliecloud uses image references in filenames, replacing slash with
  percent (:code:`%`). Because this character cannot appear in image
  references, the transformation is reversible.

  Git branch names do not allow a colon. Thus, to maintain the image reference
  as both the image filename and git branch in storage, we replace the colon
  with plus (:code:`+`).

  An alternate approach would be to replicate the reference path in the
  filesystem, i.e., path components in the reference would correspond directly
  to a filesystem path. This would yield a clearer filesystem structure.
  However, we elected not to do it because it complicates the code to save and
  clean up image reference-related data, and it does not address a few related
  questions, e.g. should the host and port also be a directory level.

Usually, most of the components are omitted. For example, you’ll more commonly
see image references like:

  * :code:`debian`, which refers to the tag :code:`latest` of image
    :code:`debian` from Docker Hub.
  * :code:`debian:stretch`, which is the same except for tag :code:`stretch`.
  * :code:`fedora/httpd`, which is tag :code:`latest` of :code:`fedora/httpd`
    from Docker Hub.

See :code:`charliecloud.py` for a specific grammar that implements this.

Can I build or pull images using a tool Charliecloud doesn’t know about?
------------------------------------------------------------------------

Yes. Charliecloud deals in well-known UNIX formats like directories, tarballs,
and SquashFS images. So, once you get your image into some format Charliecloud
likes, you can enter the workflow.

For example, `skopeo <https://github.com/containers/skopeo>`_ is a tool to
pull images to OCI format, and `umoci <https://umo.ci>`_ can flatten an OCI
image to a directory. Thus, you can use the following commands to run an
Alpine 3.9 image pulled from Docker hub::

  $ skopeo copy docker://alpine:3.17 oci:/tmp/oci:img
  [...]
  $ ls /tmp/oci
  blobs  index.json  oci-layout
  $ umoci unpack --rootless --image /tmp/oci:img /tmp/alpine:3.17
  [...]
  $ ls /tmp/alpine:3.17
  config.json
  rootfs
  sha256_2ca27acab3a0f4057852d9a8b775791ad8ff62fbedfc99529754549d33965941.mtree
  umoci.json
  $ ls /tmp/alpine:3.17/rootfs
  bin  etc   lib    mnt  proc  run   srv  tmp  var
  dev  home  media  opt  root  sbin  sys  usr
  $ ch-run /tmp/alpine:3.17/rootfs -- cat /etc/alpine-release
  3.9.5

How do I authenticate with SSH during :code:`ch-image` build?
-------------------------------------------------------------

The simplest approach is to run the `SSH agent
<https://man.openbsd.org/ssh-agent>`_ on the host. :code:`ch-image` then
leverages this with two steps:

  1. pass environment variable :code:`SSH_AUTH_SOCK` into the build, with no
     need to put :code:`ARG` in the Dockerfile or specify :code:`--build-arg`
     on the command line; and

  2. bind-mount host :code:`/tmp` to guest :code:`/tmp`, which is where the
     SSH agent’s listening socket usually resides.

Thus, SSH within the container will use this existing SSH agent on the host to
authenticate without further intervention.

For example, after making :code:`ssh-agent` available on the host, which is OS
and site-specific::

  $ echo $SSH_AUTH_SOCK
  /tmp/ssh-rHsFFqwwqh/agent.49041
  $ ssh-add
  Enter passphrase for /home/charlie/.ssh/id_rsa:
  Identity added: /home/charlie/.ssh/id_rsa (/home/charlie/.ssh/id_rsa)
  $ ssh-add -l
  4096 SHA256:aN4n2JeMah2ekwhyHnb0Ug9bYMASmY+5uGg6MrieaQ /home/charlie/.ssh/id_rsa (RSA)
  $ cat ./Dockerfile
  FROM alpine:latest
  RUN apk add openssh
  RUN echo $SSH_AUTH_SOCK
  RUN ssh git@github.com
  $ ch-image build -t foo -f ./Dockerfile .
  [...]
    3 RUN ['/bin/sh', '-c', 'echo $SSH_AUTH_SOCK']
    /tmp/ssh-rHsFFqwwqh/agent.49041
    4 RUN ['/bin/sh', '-c', 'ssh git@github.com']
  [...]
  Hi charlie! You’ve successfully authenticated, but GitHub does not provide shell access.

Note this example is rather contrived — bare SSH sessions in a Dockerfile
rarely make sense. In practice, SSH is used as a transport to fetch something,
e.g. with :code:`scp(1)` or :code:`git(1)`. See the next entry for a more
realistic example.

SSH stops :code:`ch-image` build with interactive queries
---------------------------------------------------------

This often occurs during an SSH-based Git clone. For example:

.. code-block:: docker

  FROM alpine:latest
  RUN apk add git openssh
  RUN git clone git@gitlab.com:charliecloud/charliecloud.git

.. code-block:: console

  $ ch-image build -t foo -f ./Dockerfile .
  [...]
  3 RUN ['/bin/sh', '-c', 'git clone git@gitlab.com:charliecloud/charliecloud.git']
  Cloning into 'charliecloud'...
  The authenticity of host 'github.com (140.82.113.3)' can’t be established.
  RSA key fingerprint is SHA256:nThbg6kXUpJWGl7E1IGOCspRomTxdCARLviKw6E5SY8.
  Are you sure you want to continue connecting (yes/no/[fingerprint])?

At this point, the build stops while SSH waits for input.

This happens even if you have :code:`github.com` in your
:code:`~/.ssh/known_hosts`. This file is not available to the build because
:code:`ch-image` runs :code:`ch-run` without :code:`--home`, so :code:`RUN`
instructions can’t see anything in your home directory.

Solutions include:

  1. Change to anonymous HTTPS clone, if available. Most public repositories
     will support this. For example:

     .. code-block:: docker

       FROM alpine:latest
       RUN apk add git
       RUN git clone https://gitlab.com/charliecloud/charliecloud.git

  2. Approve the connection interactively by typing :code:`yes`. Note this
     will record details of the connection within the image, including IP
     address and the fingerprint. The build also remains interactive.

  3. Edit the image’s system `SSH config
     <https://man.openbsd.org/ssh_config>`_ to turn off host key checking.
     Note this can be rather hairy, because the SSH config language is quite
     flexible and the first instance of a directive is the one used. However,
     often the changes can be simply appended:

     .. code-block:: docker

       FROM alpine:latest
       RUN apk add git openssh
       RUN printf 'StrictHostKeyChecking=no\nUserKnownHostsFile=/dev/null\n' \
           >> /etc/ssh/ssh_config
       RUN git clone git@gitlab.com:charliecloud/charliecloud.git

     Check your institutional policy on whether this is permissible, though
     it’s worth noting that users `almost never
     <https://www.usenix.org/system/files/login/articles/105484-Gutmann.pdf>`_
     verify the host fingerprints anyway.

     This will not record details of the connection in the image.

  4. Turn off host key checking on the SSH command line. (See caveats in the
     previous item.) The wrapping tool should provide a way to configure this
     command line. For example, for Git:

     .. code-block:: docker

       FROM alpine:latest
       RUN apk add git openssh
       ARG GIT_SSH_COMMAND="ssh -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null"
       RUN git clone git@gitlab.com:charliecloud/charliecloud.git

  5. Add the remote host to the system known hosts file, e.g.:

     .. code-block:: docker

       FROM alpine:latest
       RUN apk add git openssh
       RUN echo 'github.com,140.82.112.4 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ==' >> /etc/ssh/ssh_known_hosts
       RUN git clone git@gitlab.com:charliecloud/charliecloud.git

     This records connection details in both the Dockerfile and the image.

Other approaches could be found with web searches such as "automate unattended
SSH" or "SSH in cron jobs".

.. _faq_building-with-docker:

How do I use Docker to build Charliecloud images?
-------------------------------------------------

The short version is to run Docker commands like :code:`docker build` and
:code:`docker pull` like usual, and then use :code:`ch-convert` to copy the
image from Docker storage to a SquashFS archive, tarball, or directory. If you
are behind an HTTP proxy, that requires some extra setup for Docker; see
below.

Security implications of Docker
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Because Docker (a) makes installing random crap from the internet simple and
(b) is easy to deploy insecurely, you should take care. Some of the
implications are below. This list should not be considered comprehensive nor a
substitute for appropriate expertise; adhere to your ethical and institutional
responsibilities.

* **Docker equals root.** Anyone who can run the :code:`docker` command or
  interact with the Docker daemon can `trivially escalate to root
  <http://web.archive.org/web/20170614013206/http://www.reventlov.com/advisories/using-the-docker-command-to-root-the-host>`_.
  This is considered a feature.

  For this reason, don’t create the :code:`docker` group, as this will allow
  passwordless, unlogged escalation for anyone in the group. Run it with
  :code:`sudo docker`.

  Also, Docker runs container processes as root by default. In addition to
  being poor hygiene, this can be an escalation path, e.g. if you bind-mount
  host directories.

* **Docker alters your network configuration.** To see what it did::

    $ ifconfig    # note docker0 interface
    $ brctl show  # note docker0 bridge
    $ route -n

* **Docker installs services.** If you don’t want the Docker service starting
  automatically at boot, e.g.::

    $ systemctl is-enabled docker
    enabled
    $ systemctl disable docker
    $ systemctl is-enabled docker
    disabled

Configuring for a proxy
~~~~~~~~~~~~~~~~~~~~~~~

By default, Docker does not work if you are behind a proxy, and it fails in
two different ways.

The first problem is that Docker itself must be told to use a proxy. This
manifests as::

  $ sudo docker run hello-world
  Unable to find image 'hello-world:latest' locally
  Pulling repository hello-world
  Get https://index.docker.io/v1/repositories/library/hello-world/images: dial tcp 54.152.161.54:443: connection refused

If you have a systemd system, the `Docker documentation
<https://docs.docker.com/engine/admin/systemd/#http-proxy>`_ explains how to
configure this. If you don’t have a systemd system, then
:code:`/etc/default/docker` might be the place to go?

The second problem is that programs executed during build (:code:`RUN`
instructions) need to know about the proxy as well. This manifests as images
failing to build because they can’t download stuff from the internet.

One fix is to configure your :code:`.bashrc` or equivalent to:

1. Set the proxy environment variables:

   .. code-block:: sh

     export HTTP_PROXY=http://proxy.example.com:8088
     export http_proxy=$HTTP_PROXY
     export HTTPS_PROXY=$HTTP_PROXY
     export https_proxy=$HTTP_PROXY
     export NO_PROXY='localhost,127.0.0.1,.example.com'
     export no_proxy=$NO_PROXY

2. Configure a :code:`docker` wrapper, e.g. this one for `fish
   <https://fishshell.com>`_:

   .. code-block:: fish

      # This file defines a docker(1) wrapper that (unconditionally) prepends
      # sudo(8) and also sets proxy environment variables if needed. Save it as
      # “~/.config/fish/functions.docker.fish”. I think it’s better than configuring
      # a proxy in config.json [1] because it’s easier to switch between the proxy
      # and no-proxy states.

      # List of environment variables we want to pass through to Docker.
      set -g _docker_vars HTTP_PROXY HTTPS_PROXY NO_PROXY
      set -a _docker_vars (string lower $_docker_vars)

      function docker \
               -d 'docker(1) wrapper with auto-sudo and proxy variables'
         set cmd $argv[1]
         set -e argv[1]
         # Build pass-thru arguments if needed.
         if set -q HTTP_PROXY
           switch $cmd
             case build
               set ea --build-arg
             case run
               set ea --env
           end
         if set -q ea
           set_color da1884
           echo "note: proxy variables found; passing through with $ea"
           set_color normal
           for v in $_docker_vars
             set -a evs "$ea=$v=$$v"
           end
         end
       end
       # Run Docker.
       sudo docker $cmd $evs $argv
    end

How can I build images for a foreign architecture?
--------------------------------------------------

QEMU
~~~~

Suppose you want to build Charliecloud containers on a system which has a
different architecture from the target system.

It’s straightforward as long as you can install suitable packages on the build
system (your personal computer?). You just need the magic of QEMU via a
distribution package with a name like Debian’s :code:`qemu-user-static`. For
use in an image root this needs to be the :code:`-static` version, not plain
:code:`qemu-user`, and contain a :code:`qemu-*-static` executable for your
target architecture. In case it doesn’t install “binfmt” hooks (telling Linux
how to run foreign binaries), you’ll need to make that work — perhaps it’s in
another package.

That’s all you need to make building with :code:`ch-image` work with a base
foreign architecture image and the :code:`--arch` option. It’s significantly
slower than native, but quite usable — about half the speed of native for the
ppc64le target with a build taking minutes on a laptop with a magnetic disc.
There’s a catch that images in :code:`ch-image` storage aren’t distinguished
by architecture except by any name you give them, e.g., a base image like
:code:`debian:11` pulled with :code:`--arch ppc64le` will overwrite a native
x86 one.

For example, to build a ppc64le image on a Debian Buster amd64 host::

  $ uname -m
  x86_64
  $ sudo apt install qemu-user-static
  $ ch-image pull --arch ppc64le alpine:3.17
  $ printf 'FROM alpine:3.17\nRUN apk add coreutils\n' | ch-image build -t foo -
  $ ch-convert alpine:3.17 /var/tmp/foo
  $ ch-run /var/tmp/foo -- uname -m
  ppc64le

PRoot
~~~~~

Another way to build a foreign image, which works even without :code:`sudo` to
install :code:`qemu-*-static`, is to populate a chroot for it with the `PRoot
<https://proot-me.github.io/>`_ tool, whose :code:`-q` option allows
specifying a :code:`qemu-*-static` binary (perhaps obtained by unpacking a
distribution package).

How can I use tarball base images from e.g. linuxcontainers.org?
----------------------------------------------------------------

If you can’t find an image repository from which to pull for the distribution
and architecture of interest, it is worth looking at the extensive collection
of rootfs archives `maintained by linuxcontainers.org
<https://uk.lxd.images.canonical.com/images/>`_. They are meant for LXC, but
are fine as a basis for Charliecloud.

For example, this would leave a :code:`ppc64le/alpine:3.17` image du jour in
the registry for use in a Dockerfile :code:`FROM` line. Note that
linuxcontainers.org uses the opposite order for “le” in the architecture name.

::

  $ wget https://uk.lxd.images.canonical.com/images/alpine/3.15/ppc64el/default/20220304_13:00/rootfs.tar.xz
  $ ch-image import rootfs.tar.xz ppc64le/alpine:3.17

.. _faq_verbosity:

How can I control Charliecloud’s quietness or verbosity?
--------------------------------------------------------

Charliecloud logs various chatter about what is going on to standard error.
This is distinct from *output*, e.g., :code:`ch-image list` prints the list of
images to standard output. We use reasonably standard log levels:

  1. **Error**. Some error condition that makes it impossible to proceed. The
     program exits soon after printing the error. Examples: unknown image
     type, Dockerfile parse error. (There is an internal distinction between
     “fatal” and “error” levels, but this isn’t really meaningful to users.)

  2. **Warning**. Unexpected condition the user needs to know about but that
     should not stop the program. Examples: :code:`ch-run --mount` with a
     directory image (which does not use a mount point), unsupported
     Dockerfile instructions that are ignored.

  3. **Info**. Chatter useful enough to be printed by default. Example:
     progress messages during image download and unpacking. (:code:`ch-run` is
     silent during normal operations and does not have any “info” logging.)

  4. **Verbose**. Diagnostic information useful for debugging user containers,
     the Charliecloud installation, and Charliecloud itself. Examples:
     :code:`ch-run --join` coordination progress, :code:`ch-image` internal
     paths, Dockerfile parse tree.

  5. **Debug**. More detailed diagnostic information useful for debugging
     Charliecloud. Examples: data structures unserialized from image registry
     metadata JSON, image reference parse tree.

  6. **Trace**; printed if :code:`-vvv`. Grotesquely detailed diagnostic
     information for debugging Charliecloud, to the extent it interferes with
     normal use. A sensible person might use a `debugger
     <https://twitter.com/wesamo__/status/1464764461831663626>`_ instead.
     Examples: component-by-component progress of bind-mount target directory
     analysis/creation, text of image registry JSON, every single file
     unpacked from image layers.

Charliecloud also runs sub-programs at various times, notably commands in
:code:`RUN` instructions and :code:`git(1)` to manage the build cache. These
programs have their own standard error and standard output streams, which
Charliecloud either suppresses or passes through depending on verbosity level.

Most Charliecloud programs accept :code:`-v` to increase logging verbosity and
:code:`-q` to decrease it. Generally:

  * Each :code:`-v` (up to three) makes Charliecloud noisier.

  * :code:`-q` suppresses normal logging.

  * :code:`-qq` also suppresses stdout for the program and its subprocesses,
    and warnings from the program.

  * :code:`-qqq` also suppresses subprocess stderr. (This means subprocesses
    are completely silenced no matter what goes wrong!)

This table list which logging is printed at which verbosity levels (✅
indicates printed, ❌ suppressed).

.. list-table::
   :header-rows: 1

   * -
     - :code:`-vvv`
     - :code:`-vv`
     - :code:`-v`
     - def.
     - :code:`-q`
     - :code:`-qq`
     - :code:`-qqq`
   * - trace
     - ✅
     - ❌
     - ❌
     - ❌
     - ❌
     - ❌
     - ❌
   * - debug
     - ✅
     - ✅
     - ❌
     - ❌
     - ❌
     - ❌
     - ❌
   * - verbose
     - ✅
     - ✅
     - ✅
     - ❌
     - ❌
     - ❌
     - ❌
   * - info
     - ✅
     - ✅
     - ✅
     - ✅
     - ❌
     - ❌
     - ❌
   * - program stdout
     - ✅
     - ✅
     - [1]
     - [1]
     - [1]
     - ❌
     - ❌
   * - subprocess stdout
     - ✅
     - ✅
     - [1]
     - [1]
     - [1] [2]
     - ❌
     - ❌
   * - warning
     - ✅
     - ✅
     - ✅
     - ✅
     - ✅
     - ❌
     - ❌
   * - subprocess stderr
     - ✅
     - ✅
     - ✅
     - ✅
     - ✅
     - ✅
     - ❌
   * - error
     - ✅
     - ✅
     - ✅
     - ✅
     - ✅
     - ✅
     - ✅

Notes:

1. Charliecloud handles subprocess stdout on case-by-case basis for these log
   levels. For example, sometimes it’s passed through by default (e.g.,
   :code:`RUN`) and sometimes it’s captured for internal use (e.g., many
   :code:`git(1)` invocations).

2. In the case of :code:`ch-run`, the user command is considered a subprocess,
   e.g. :code:`ch-run -q example -- echo foo` will produce no output.

.. _faq_xattrs:

How do I handle extended attributes in Charliecloud?
----------------------------------------------------

As noted in section :ref:`ch-image_build-cache`, Charliecloud doesn’t support
extended attributes (xattrs) by default. Support for xattrs  can be enabled for
:code:`ch-image` and :code:`ch-convert` by specifying :code:`--xattrs` or
setting :code:`$CH_XATTRS`. This will make :code:`ch-image` save and restore
xattrs via the build cache, and will make :code:`ch-convert` preserve xattrs on
conversion. Important caveats include:

1. :code:`ch-image` and :code:`ch-convert` cannot read xattrs in privileged
   namespaces (e.g. :code:`trusted` and :code:`security`). Extended attributes
   in these namespaces will never be saved or restored via the cache, and will
   never be preserved when converting between image formats.

2. :code:`ch-image import` cannot handle xattrs. This is a limitation of the
   Python `tarfile <https://docs.python.org/3/library/tarfile.html>`_ library,
   which as of version 3.12.1 doesn’t support xattrs (see CPython issue `#113293
   <https://github.com/python/cpython/issues/113293>`_).

3. :code:`ch-convert -o ch-image` uses :code:`ch-image import` under the hood.
   This in conjunction with (2) means that :code:`ch-convert` cannot preserve
   xattrs when converting to the :code:`ch-image` format.

4. :code:`ch-image pull` uses the tarfile library, so xattrs will be lost when
   pulling from a registry.

5. Support for xattrs varies among filesystems, e.g. tmpfs didn’t support xattrs
   in the :code:`user` namespace prior to Linux kernel `upstream 6.6
   <https://kernelnewbies.org/Linux_6.6#TMPFSe>`_ (Oct 2023).

.. _faq_sourcing_when_container_starts:

How do I source a file automatically when container starts?
-----------------------------------------------------------

There are ways to have Bash source an arbitrary script at start-up (`docs
<https://www.gnu.org/software/bash/manual/html_node/Invoking-Bash.html>`_).

For example, :code:`ch-run ... -- bash --rcfile /my/start.sh` will give you an
interactive shell with :code:`/my/start.sh` sourced first.

Or: :code:`ch-run ... -- bash --login` will give you an interactive login shell
and so it will source :code:`/etc/profile`.

Finally, you can have a file :code:`$HOME/.bashrc` (where :code:`$HOME` is set
by default, as described `here <ch-run#environment-variables>`_), which Bash
will source automatically with :code:`ch-run ... -- bash`.

Alternately, if you want the interactive Bash shell to source :code:`.bashrc`
of your host system, you can use :code:`ch-run --home`, which binds your home
directory into the container.


..  LocalWords:  CAs SY Gutmann AUTH rHsFFqwwqh MrieaQ Za loc mpihello mvo du
..  LocalWords:  VirtualSize linuxcontainers jour uk lxd rwxr xr qq qqq drwxr
..  LocalWords:  drwx rcfile mpich