-
Notifications
You must be signed in to change notification settings - Fork 241
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document running nested in docker/podman #284
Comments
/cc @giuseppe |
the issue is that |
Ahh, right. Ugh. It feels like what we need is a |
Alternatively...audit everything in Or yet another approach: An option for |
Ah right: https://lkml.org/lkml/2018/5/11/155 |
I have added container_userns_t which allows some of the access that was denied by container_t. Like mounting of a tmpfs. I would love to know if this would work for your use case, and leave SELinux in enforcing container separation. |
Probably, I'll try it at some point, but the real blocker here is the |
This is actually SELinux. See this issue.
Now, this will work:
Note if one wants to pass through devices (e.g.
--device /dev/kvm
on the docker/podman side) you'll also want--dev-bind /dev /dev
.Now the problem I'm hitting is around
/proc
. Which if one is using--unshare-pid
, you really need to do, or all of the PIDs are wrong in/proc
and things will get confused.Adding
--proc /proc
gets me:bwrap: Can't mount proc on /newroot/proc: Operation not permitted
Which...I'm confused by this right now; why doesn't that work? It looks like our test suite does
--bind /proc proc
but that gets me the same issue with incorrect pids.The text was updated successfully, but these errors were encountered: