Skip symlink for /proc if inside Docker and chroot
In our use case, we have a Docker container (because of our CI) that
runs debootstrap
inside a chroot. We ran into issues with mounting
/proc in this environment. The error we were seeing was "Too many
symbolic links" because mount was detecting that /proc was a symlink to
itself.
This change skips the creation of the symlink if you are inside Docker and a chroot to avoid the above error.
Please let us know if there are any changes you'd like to make.
Co-authored-by: Joshua Aresty joshua.aresty@emc.com Co-authored-by: Nicholas Calugar ncalugar@pivotal.io
Edited by Pivotal BOSH Systems
Merge request reports
Activity
added 1 commit
- 93595402 - Skip symlink for /proc if inside Docker and chroot
added 1 commit
- d5fd6d24 - Skip symlink for /proc if inside Docker and chroot
added 1 commit
- f2fc14e4 - Detect the presence of chroot with CHROOT_CMD
mentioned in merge request !26
Is
/bin/sh
provided bydash
in this docker container? Then this may be the parsing issue in !27 (closed).
Please register or sign in to reply