Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is gloud mandatory for podman in Windows ? #25264

Closed
sunilkcs opened this issue Feb 7, 2025 · 3 comments
Closed

Is gloud mandatory for podman in Windows ? #25264

sunilkcs opened this issue Feb 7, 2025 · 3 comments
Labels
kind/bug Categorizes issue or PR as related to a bug. remote Problem is in podman-remote windows issue/bug on Windows

Comments

@sunilkcs
Copy link

sunilkcs commented Feb 7, 2025

Issue Description

I am running "podman-5.4.0-rc3-setup.exe" on my windows machine. I am getting below error
'Error: error getting credentials - err: exec: "docker-credential-gcloud": executable file not found in %PATH%, out: ``'
Is gcloud libraries mandatory for podman to run ? I dont want to use gcloud or google container registry. I am happy with default 'docker.io' .

Steps to reproduce the issue

Steps to reproduce the issue

  1. Install 'podman-5.4.0-rc3-setup.exe' in windows 11 (WSL2 enabled)
  2. Podman machine init
    3.Podman machine start
    4.podman pull redis:6.2.6

Describe the results you received

Error: error getting credentials - err: exec: "docker-credential-gcloud": executable file not found in %PATH%, out: ``

Describe the results you expected

Pull the redis:6.2.6 image successfully

podman info output

Client:
  APIVersion: 5.4.0-rc3
  Built: 1738782426
  BuiltTime: Thu Feb  6 00:37:06 2025
  GitCommit: ad54787bf09265e12d446871d2c09809a59d8f4a
  GoVersion: go1.23.6
  Os: windows
  OsArch: windows/amd64
  Version: 5.4.0-rc3
host:
  arch: amd64
  buildahVersion: 1.38.0
  cgroupControllers: []
  cgroupManager: cgroupfs
  cgroupVersion: v1
  conmon:
    package: conmon-2.1.12-2.fc40.x86_64
    path: /usr/bin/conmon
    version: 'conmon version 2.1.12, commit: '
  cpuUtilization:
    idlePercent: 99.59
    systemPercent: 0.29
    userPercent: 0.12
  cpus: 8
  databaseBackend: sqlite
  distribution:
    distribution: fedora
    variant: container
    version: "40"
  eventLogger: journald
  freeLocks: 2048
  hostname: SUNIL
  idMappings:
    gidmap:
    - container_id: 0
      host_id: 1000
      size: 1
    - container_id: 1
      host_id: 524288
      size: 65536
    uidmap:
    - container_id: 0
      host_id: 1000
      size: 1
    - container_id: 1
      host_id: 524288
      size: 65536
  kernel: 5.15.167.4-microsoft-standard-WSL2
  linkmode: dynamic
  logDriver: journald
  memFree: 8866754560
  memTotal: 9376391168
  networkBackend: netavark
  networkBackendInfo:
    backend: netavark
    dns:
      package: aardvark-dns-1.13.1-1.fc40.x86_64
      path: /usr/libexec/podman/aardvark-dns
      version: aardvark-dns 1.13.1
    package: netavark-1.13.1-1.fc40.x86_64
    path: /usr/libexec/podman/netavark
    version: netavark 1.13.1
  ociRuntime:
    name: crun
    package: crun-1.19.1-1.fc40.x86_64
    path: /usr/bin/crun
    version: |-
      crun version 1.19.1
      commit: 3e32a70c93f5aa5fea69b50256cca7fd4aa23c80
      rundir: /run/user/1000/crun
      spec: 1.0.0
      +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL
  os: linux
  pasta:
    executable: /usr/bin/pasta
    package: passt-0^20250121.g4f2c8e7-2.fc40.x86_64
    version: |
      pasta 0^20250121.g4f2c8e7-2.fc40.x86_64
      Copyright Red Hat
      GNU General Public License, version 2 or later
        <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
      This is free software: you are free to change and redistribute it.
      There is NO WARRANTY, to the extent permitted by law.
  remoteSocket:
    exists: true
    path: unix:///run/user/1000/podman/podman.sock
  rootlessNetworkCmd: pasta
  security:
    apparmorEnabled: false
    capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT
    rootless: true
    seccompEnabled: true
    seccompProfilePath: /usr/share/containers/seccomp.json
    selinuxEnabled: false
  serviceIsRemote: true
  slirp4netns:
    executable: ""
    package: ""
    version: ""
  swapFree: 3221225472
  swapTotal: 3221225472
  uptime: 0h 12m 47.00s
  variant: ""
plugins:
  authorization: null
  log:
  - k8s-file
  - none
  - passthrough
  - journald
  network:
  - bridge
  - macvlan
  - ipvlan
  volume:
  - local
registries:
  search:
  - docker.io
store:
  configFile: /home/user/.config/containers/storage.conf
  containerStore:
    number: 0
    paused: 0
    running: 0
    stopped: 0
  graphDriverName: overlay
  graphOptions: {}
  graphRoot: /home/user/.local/share/containers/storage
  graphRootAllocated: 1081101176832
  graphRootUsed: 921448448
  graphStatus:
    Backing Filesystem: extfs
    Native Overlay Diff: "true"
    Supports d_type: "true"
    Supports shifting: "false"
    Supports volatile: "true"
    Using metacopy: "false"
  imageCopyTmpDir: /var/tmp
  imageStore:
    number: 0
  runRoot: /run/user/1000/containers
  transientStore: false
  volumePath: /home/user/.local/share/containers/storage/volumes
version:
  APIVersion: 5.3.1
  Built: 1732147200
  BuiltTime: Thu Nov 21 05:30:00 2024
  GitCommit: ""
  GoVersion: go1.22.7
  Os: linux
  OsArch: linux/amd64
  Version: 5.3.1

Podman in a container

No

Privileged Or Rootless

Rootless

Upstream Latest Release

Yes

Additional environment details

Windows 11 professional with WSL 2 enabled machine.

Additional information

Additional information like issue happens only occasionally or issue happens with a particular architecture or on a particular setting

@sunilkcs sunilkcs added the kind/bug Categorizes issue or PR as related to a bug. label Feb 7, 2025
@github-actions github-actions bot added remote Problem is in podman-remote windows issue/bug on Windows labels Feb 7, 2025
@baude
Copy link
Member

baude commented Feb 7, 2025

No it is not. It's not apparent to me why you are seeing that. can you strace or equiv of that and see where the call is coming from?

@sunilkcs
Copy link
Author

sunilkcs commented Feb 8, 2025

The problem is resolved after deleing '/.docker/config.json' file in home directory. It had entries like below. I deleted this file completely. After that podman is working fine.

{
"auths": {
"https://index.docker.io/v1/": {}
},
"credHelpers": {
"gcr.io": "gcloud",
"us.gcr.io": "gcloud",
"eu.gcr.io": "gcloud",
"asia.gcr.io": "gcloud",
"staging-k8s.gcr.io": "gcloud",
"marketplace.gcr.io": "gcloud"
},
"credsStore": "desktop"
}

Who (Which application) created this file ? . I dont know. May be previously installed docker or podman could have created this file.
If this file is created by podman, Why podman using gloud in here ? I dont know
If this file is NOT created by podman, Why podman reading from a file not created by podman ? I dont know.

Anyways Problem is resolved. But i have seen engineers raising concerns with Podman mandating for Google cloud account setup.

@Luap99
Copy link
Member

Luap99 commented Feb 10, 2025

.docker/config.json is READ by podman for better docker compatibility I believe. It was not written by us.

@Luap99 Luap99 closed this as not planned Won't fix, can't repro, duplicate, stale Feb 10, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Categorizes issue or PR as related to a bug. remote Problem is in podman-remote windows issue/bug on Windows
Projects
None yet
Development

No branches or pull requests

3 participants