Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate running tests via docker:dind-rootless #190

Closed
fkorotkov opened this issue Dec 10, 2020 · 3 comments
Closed

Investigate running tests via docker:dind-rootless #190

fkorotkov opened this issue Dec 10, 2020 · 3 comments
Assignees
Labels
enhancement New feature or request

Comments

@fkorotkov
Copy link
Contributor

fkorotkov commented Dec 10, 2020

As an additional container rather then using full fledged Docker Builder VM

Related guide: https://cirrus-ci.org/guide/docker-builds-on-kubernetes/?h=+docker

@fkorotkov fkorotkov added the enhancement New feature or request label Dec 10, 2020
@edigaryev edigaryev self-assigned this Dec 10, 2020
@edigaryev
Copy link
Contributor

The preliminary results are that it's not possible to run rootless in Docker without a --privileged flag (or without enabling certain capabilities and disabling security confinements):

% docker run -it --rm docker:dind-rootless | tail -n 1
[rootlesskit:parent] error: failed to start the child: fork/exec /proc/self/exe: operation not permitted

Related RootlessKit issues:

In the Docker's rootless guide the docker:dind-rootless is also started with the --privileged flag, see https://docs.docker.com/engine/security/rootless/#rootless-docker-in-docker.

@edigaryev
Copy link
Contributor

The preliminary results are that it's not possible to run rootless in Docker without a --privileged flag (or without enabling certain capabilities and disabling security confinements)

This seems to be freshly confirmed by the Podman project too: containers/podman#4131 (comment).

@edigaryev
Copy link
Contributor

I'm going to close this one for now because there's no straightforward way ATM to do this without turning off Docker's security features.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants