You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Client:
Cloud integration: v1.0.35+desktop.10
Version: 25.0.3
API version: 1.44
Go version: go1.21.6
Git commit: 4debf41
Built: Tue Feb 6 21:13:26 2024
OS/Arch: darwin/arm64
Context: desktop-linux
Server: Docker Desktop 4.27.2 (137060)
Engine:
Version: 25.0.3
API version: 1.44 (minimum version 1.24)
Go version: go1.21.6
Git commit: f417435e5f6216828dec57958c490c4f8bae4f98
Built: Wed Feb 7 00:39:16 2024
OS/Arch: linux/arm64
Experimental: false
containerd:
Version: 1.6.28
GitCommit: ae07eda36dd25f8a1b98dfbf587313b99c0190bb
runc:
Version: 1.1.12
GitCommit: v1.1.12-0-g51d5e94
docker-init:
Version: 0.19.0
GitCommit: de40ad0
Docker info
Client:
Version: 25.0.3
Context: desktop-linux
Debug Mode: false
Plugins:
buildx: Docker Buildx (Docker Inc.)
Version: v0.12.1-desktop.4
Path: /Users/admin/.docker/cli-plugins/docker-buildx
compose: Docker Compose (Docker Inc.)
Version: v2.24.5-desktop.1
Path: /Users/admin/.docker/cli-plugins/docker-compose
debug: Get a shell into any image or container. (Docker Inc.)
Version: 0.0.24
Path: /Users/admin/.docker/cli-plugins/docker-debug
dev: Docker Dev Environments (Docker Inc.)
Version: v0.1.0
Path: /Users/admin/.docker/cli-plugins/docker-dev
extension: Manages Docker extensions (Docker Inc.)
Version: v0.2.21
Path: /Users/admin/.docker/cli-plugins/docker-extension
feedback: Provide feedback, right in your terminal! (Docker Inc.)
Version: v1.0.4
Path: /Users/admin/.docker/cli-plugins/docker-feedback
init: Creates Docker-related starter files for your project (Docker Inc.)
Version: v1.0.0
Path: /Users/admin/.docker/cli-plugins/docker-init
sbom: View the packaged-based Software Bill Of Materials (SBOM) for an image (Anchore Inc.)
Version: 0.6.0
Path: /Users/admin/.docker/cli-plugins/docker-sbom
scout: Docker Scout (Docker Inc.)
Version: v1.4.1
Path: /Users/admin/.docker/cli-plugins/docker-scout
WARNING: Plugin "/Users/admin/.docker/cli-plugins/docker-scan" is not valid: failed to fetch metadata: fork/exec /Users/admin/.docker/cli-plugins/docker-scan: no such file or directory
Server:
Containers: 0
Running: 0
Paused: 0
Stopped: 0
Images: 9
Server Version: 25.0.3
Storage Driver: stargz
driver-type: io.containerd.snapshotter.v1
Logging Driver: json-file
Cgroup Driver: cgroupfs
Cgroup Version: 2
Plugins:
Volume: local
Network: bridge host ipvlan macvlan null overlay
Log: awslogs fluentd gcplogs gelf journald json-file local splunk syslog
Swarm: inactive
Runtimes: io.containerd.runc.v2 runc
Default Runtime: runc
Init Binary: docker-init
containerd version: ae07eda36dd25f8a1b98dfbf587313b99c0190bb
runc version: v1.1.12-0-g51d5e94
init version: de40ad0
Security Options:
seccomp
Profile: unconfined
cgroupns
Kernel Version: 6.6.12-linuxkit
Operating System: Docker Desktop
OSType: linux
Architecture: aarch64
CPUs: 4
Total Memory: 7.756GiB
Name: docker-desktop
ID: 03e91416-0253-48e2-9e1b-10cd533ce5e9
Docker Root Dir: /var/lib/docker
Debug Mode: false
HTTP Proxy: http.docker.internal:3128
HTTPS Proxy: http.docker.internal:3128
No Proxy: hubproxy.docker.internal
Experimental: false
Insecure Registries:
hubproxy.docker.internal:5555
127.0.0.0/8
Live Restore Enabled: false
WARNING: daemon is not using the default seccomp profile
What happened?
While trying to use the Elasticsearch module in an integration test I wanted to bind a volume to pre-load an index.
For some reasons, the /usr/share/elasticsearch/config/certs directory does not exist when I bind the volume. This is probably something in the init of the ES container that does not run (couldn't find why).
Thus when the module tries to fetch the CaCerts in the postStarts hook readCloser, err := container.CopyFileFromContainer(ctx, defaultCaCertPath) it throws an error.
Update the module code to make the cert retrieval optional
Personaly I don't need the security features as testcontainers is used in tests and thus we could disable the cert retrieval if needed using a flag. I'm open to help pushing a PR to fix this issue.
In the meantime, I am able to use a GenericContainer as expected (but it's a bit sad).
The text was updated successfully, but these errors were encountered:
Hey 👋
On the repro repository there are no env var passed.
But it means that the volume mapping is not the only thing triggering the failure to retrieve this file.
So we should probably fix it.
I am down to submit a PR that make this retrieval optional but I would like some kind of approval to avoid doing it and not getting merged.
Testcontainers version
0.27.0
Using the latest Testcontainers version?
Yes
Host OS
Mac
Host arch
ARM M1
Go version
1.22.0
Docker version
Client: Cloud integration: v1.0.35+desktop.10 Version: 25.0.3 API version: 1.44 Go version: go1.21.6 Git commit: 4debf41 Built: Tue Feb 6 21:13:26 2024 OS/Arch: darwin/arm64 Context: desktop-linux Server: Docker Desktop 4.27.2 (137060) Engine: Version: 25.0.3 API version: 1.44 (minimum version 1.24) Go version: go1.21.6 Git commit: f417435e5f6216828dec57958c490c4f8bae4f98 Built: Wed Feb 7 00:39:16 2024 OS/Arch: linux/arm64 Experimental: false containerd: Version: 1.6.28 GitCommit: ae07eda36dd25f8a1b98dfbf587313b99c0190bb runc: Version: 1.1.12 GitCommit: v1.1.12-0-g51d5e94 docker-init: Version: 0.19.0 GitCommit: de40ad0
Docker info
What happened?
While trying to use the Elasticsearch module in an integration test I wanted to bind a volume to pre-load an index.
For some reasons, the
/usr/share/elasticsearch/config/certs
directory does not exist when I bind the volume. This is probably something in the init of the ES container that does not run (couldn't find why).Thus when the module tries to fetch the CaCerts in the postStarts hook
readCloser, err := container.CopyFileFromContainer(ctx, defaultCaCertPath)
it throws an error.Relevant log output
Additional information
I created a repository to reproduce the issue here -> https://github.com/ImFlog/repro-testcontainer-es.
To fix this issue I see two ways:
Personaly I don't need the security features as testcontainers is used in tests and thus we could disable the cert retrieval if needed using a flag. I'm open to help pushing a PR to fix this issue.
In the meantime, I am able to use a GenericContainer as expected (but it's a bit sad).
The text was updated successfully, but these errors were encountered: