-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
rootless containers with libpod #675
Comments
currently not. The biggest issue is to get rootless support in containers/storage. The only driver that could currently work without requiring root access is I thought of adding a |
@giuseppe I'd love to see a way to specify that a Libpod container does not use an image-based root filesystem, and just respect whatever directory the user passes to us. That was an original goal of the library, but it was dropped early on to get things out the door faster. |
Hi @rhatdan thanks. Is there already a place on github or elsewhere, where rootless overlay is discussed / worked on? As for pointing podman to already unpacked rootfs directories, that's also a nice possibility. This is currently one of the dominant way, for example, that singularity is used where images are distributed in a unpacked form using a globally cached filesystem (CERN VM FileSystem -- CVMFS) -- e.g. https://github.com/opensciencegrid/cvmfs-singularity-sync |
@lukasheinrich I've hacked something together here: https://github.com/giuseppe/libpod/tree/rootfs It is incomplete and I am not really happy how the API looks like (the image name arg becomes argv0) and we need to discuss it. Anyway, it is the first step to make it usable with a non privileged user:
|
@giuseppe Suggestion there - instead of patching |
@lukasheinrich Internal emails discussing the steps to make Overlay Safe enough to allow non priv users to mount them. Talked to Eric Biederman and Storage Engineers at Red Hat. |
I'd like to work on this once userNS support lands in as some of the added code is duplicated to get the userNS part working. I've some WIP but it requires a change in conmon (the runc-wrapper script is to circumvent this limitation): https://github.com/giuseppe/libpod/tree/rootfs-rootless I could do something like:
EDIT: |
Looks great. |
The open issue for that is containers/storage#96. |
This is continuing to be worked on, but there is some support, so I am closing this issue. |
Description
Hi, is it possible to run rootless containers using libpod? I did not find a corresponding option in https://github.com/projectatomic/libpod/blob/master/docs/podman-run.1.md.
We're essentially looking for a solution that provides much of the Docker CLI to a unprivileged user on a shared academic cluster, without the user having to worry about low-level runc commands of unpacking the image, preparing the config.json (like we do currently with skopeo, umoci and friends). My understanding is libpod is what we're looking for, but lacks the rootless option.
e.g. a tool that wraps
image building
container execution
The text was updated successfully, but these errors were encountered: