I'm having trouble sussing out the underlying principle here that
warrants special-casing plymouth in a container.  Plymouth is the
standard boot-time I/O multiplexer; any upstart jobs that need to
interact with the user at boot time should be using plymouth.  Now for
the most part, this currently consists of mountall and cryptsetup, and I
can understand how it might be that neither of those are relevant in the
context of a container.  But what about things like
/etc/init/failsafe.conf?  Or a hypothetical apache job that prompts for
an SSL passphrase through plymouth?

So it's not clear to me that disabling plymouth in the container is the
right answer, as opposed to fixing any problems plymouth has when
running.  "Writing errors to the console" seems to be part and parcel of
plymouth's responsibilities.

** Changed in: plymouth (Ubuntu)
       Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/925513

Title:
  plymouth should not run in container

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/925513/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to