Uploaded image for project: 'Container Tools'
  1. Container Tools
  2. RUN-3656

[containers/podman] `podman --remote run --detach-keys=""` reports Error: invalid detach keys: Unknown character: ''

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Done
    • Icon: Undefined Undefined
    • None
    • None
    • podman
    • 0
    • False
    • Hide

      None

      Show
      None
    • False
    • Not Selected
    • rhel-container-tools

      [3573065353] Upstream Reporter: Fujii Hironori
      Upstream issue status: Open
      Upstream description:

      Issue Description

      According to the document https://github.com/containers/common/blob/main/docs/containers.conf.5.md, detach keys can be disabled by setting an emtpy string.

      Specifying "" disables this feature.

      This works as expected for podman run --detach-keys= -it docker.io/library/debian bash. However, it doesn't work as expected with --remote switch.

      $ podman --remote run --detach-keys= -it  docker.io/library/debian bash
      Error: invalid detach keys: Unknown character: ''

      This problem also happens by adding the following in containers.conf.

      [engine]
      detach_keys = ""

      Steps to reproduce the issue

      Steps to reproduce the issue

      1. podman --remote run --detach-keys= -it docker.io/library/debian bash

      Describe the results you received

      Error: invalid detach keys: Unknown character: ''

      Describe the results you expected

      No error. Detach keys should be disabled.

      podman info output

      host:   arch: amd64
        buildahVersion: 1.41.5
        cgroupControllers:   - cpu
        - io
        - memory
        - pids
        cgroupManager: systemd
        cgroupVersion: v2
        conmon:     package: conmon-2.1.13-1.fc42.x86_64
          path: /usr/bin/conmon
          version: 'conmon version 2.1.13, commit: '
        cpuUtilization:     idlePercent: 89.27
          systemPercent: 1.04
          userPercent: 9.7
        cpus: 64
        databaseBackend: sqlite
        distribution:     distribution: fedora
          variant: workstation
          version: "42"
        eventLogger: journald
        freeLocks: 2041
        hostname: fedora
        idMappings:     gidmap:     - container_id: 0
            host_id: 1000
            size: 1
          - container_id: 1
            host_id: 524288
            size: 65536
          uidmap:     - container_id: 0
            host_id: 1000
            size: 1
          - container_id: 1
            host_id: 524288
            size: 65536
        kernel: 6.17.4-200.fc42.x86_64
        linkmode: dynamic
        logDriver: journald
        memFree: 108940681216
        memTotal: 134870597632
        networkBackend: netavark
        networkBackendInfo:     backend: netavark
          dns:       package: aardvark-dns-1.16.0-1.fc42.x86_64
            path: /usr/libexec/podman/aardvark-dns
            version: aardvark-dns 1.16.0
          package: netavark-1.16.1-1.fc42.x86_64
          path: /usr/libexec/podman/netavark
          version: netavark 1.16.1
        ociRuntime:     name: crun
          package: crun-1.24-1.fc42.x86_64
          path: /usr/bin/crun
          version: |-
            crun version 1.24
            commit: 54693209039e5e04cbe3c8b1cd5fe2301219f0a1
            rundir: /run/user/1000/crun
            spec: 1.0.0
            +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL
        os: linux
        pasta:     executable: /usr/bin/pasta
          package: passt-0^20250919.g623dbf6-1.fc42.x86_64
          version: |
            pasta 0^20250919.g623dbf6-1.fc42.x86_64
            Copyright Red Hat
            GNU General Public License, version 2 or later
              <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
            This is free software: you are free to change and redistribute it.
            There is NO WARRANTY, to the extent permitted by law.
        remoteSocket:     exists: true
          path: /run/user/1000/podman/podman.sock
        rootlessNetworkCmd: pasta
        security:     apparmorEnabled: false
          capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT
          rootless: true
          seccompEnabled: true
          seccompProfilePath: /usr/share/containers/seccomp.json
          selinuxEnabled: true
        serviceIsRemote: false
        slirp4netns:     executable: ""
          package: ""
          version: ""
        swapFree: 0
        swapTotal: 0
        uptime: 1h 55m 44.00s (Approximately 0.04 days)
        variant: ""
      plugins:   authorization: null
        log:   - k8s-file
        - none
        - passthrough
        - journald
        network:   - bridge
        - macvlan
        - ipvlan
        volume:   - local
      registries:   search:   - registry.fedoraproject.org
        - registry.access.redhat.com
        - docker.io
      store:   configFile: /home/fujii/.config/containers/storage.conf
        containerStore:     number: 7
          paused: 0
          running: 0
          stopped: 7
        graphDriverName: overlay
        graphOptions: {}
        graphRoot: /home/fujii/.local/share/containers/storage
        graphRootAllocated: 1022505254912
        graphRootUsed: 140681408512
        graphStatus:     Backing Filesystem: btrfs
          Native Overlay Diff: "true"
          Supports d_type: "true"
          Supports shifting: "false"
          Supports volatile: "true"
          Using metacopy: "false"
        imageCopyTmpDir: /var/tmp
        imageStore:     number: 28
        runRoot: /run/user/1000/containers
        transientStore: false
        volumePath: /home/fujii/.local/share/containers/storage/volumes
      version:   APIVersion: 5.6.2
        BuildOrigin: Fedora Project
        Built: 1759190400
        BuiltTime: Tue Sep 30 09:00:00 2025
        GitCommit: 9dd5e1ed33830612bc200d7a13db00af6ab865a4
        GoVersion: go1.24.7
        Os: linux
        OsArch: linux/amd64
        Version: 5.6.2
      

      Podman in a container

      No

      Privileged Or Rootless

      None

      Upstream Latest Release

      No

      Additional environment details

      Additional environment details

      Additional information

      Additional information like issue happens only occasionally or issue happens with a particular architecture or on a particular setting


      Upstream URL: https://github.com/containers/podman/issues/27414

              jrodak Jan Rodák
              upstream-sync Upstream Sync
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: