[Bug 925513] Re: plymouth should not run in container

Steve Langasek steve.langasek at canonical.com
Wed Feb 8 19:51:38 UTC 2012


I'm having trouble sussing out the underlying principle here that
warrants special-casing plymouth in a container.  Plymouth is the
standard boot-time I/O multiplexer; any upstart jobs that need to
interact with the user at boot time should be using plymouth.  Now for
the most part, this currently consists of mountall and cryptsetup, and I
can understand how it might be that neither of those are relevant in the
context of a container.  But what about things like
/etc/init/failsafe.conf?  Or a hypothetical apache job that prompts for
an SSL passphrase through plymouth?

So it's not clear to me that disabling plymouth in the container is the
right answer, as opposed to fixing any problems plymouth has when
running.  "Writing errors to the console" seems to be part and parcel of
plymouth's responsibilities.

** Changed in: plymouth (Ubuntu)
       Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to plymouth in Ubuntu.
https://bugs.launchpad.net/bugs/925513

Title:
  plymouth should not run in container

Status in “lxc” package in Ubuntu:
  Confirmed
Status in “plymouth” package in Ubuntu:
  Incomplete

Bug description:
  Once upstart knows whether it is running in a container, plymouth
  should not run in a container.  As stgraber said, "it writes some
  error messages to /var/log/upstart (when you have logging) and
  sometimes to the console".

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/925513/+subscriptions




More information about the foundations-bugs mailing list