-
-
Notifications
You must be signed in to change notification settings - Fork 14.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Include support for rootless container and user creation in oci-containers #112902
Comments
While I agree with the issue I don't think it's possible to do this in a way that's also compatible with the |
Perhaps, Docker 20.10 supports rootless mode, despite having some limitations it seems usable. But would it be a problem to have this only for Podman? |
No, but no other options are only supported by one backend at the moment. Ideally we'd only have options compatible with both.
That's news to me. Great! |
I will try to run some tests here, are you okay with one user per container? |
Couldn't we just run them with systemd's dynamicuser feature? It may be that this is not possible because of subuid/subgid requirements. |
Hmm, thanks for the dose of knowledge, I didn't know about the dynamic user. However I believe that at first it would not work for containers with volume, correct? I imagine that we would have many *IDs in the equation. |
Hm, maybe this feature could help us here:
I think this is a blocker for now. |
I didn't understand in this case how it would look if I used two replicas of the same container, would they conflict with the volume's UID? And I understood about the docker issue, it would be, at first, an exclusive feature of the podman. I will run some tests with the rootless docker. |
I think a service account for general management is also a possibility, for example, a podman and docker user. |
I marked this as stale due to inactivity. → More info |
Up. |
I marked this as stale due to inactivity. → More info |
some scripts use docker as build system, so it would be fast track for nixification before going nix deep |
Related: #138423 |
it is not possible to just add an option like |
Describe the bug
In the current mode with podman, we define the specifications of our container and it goes up with the root user, ideally it would have a podman user or even better, one user per container, this would help in abstraction and allow to execute the containers with a service view.
To Reproduce
Steps to reproduce the behavior:
nixos-rebuild switch
ps aux | grep mario
Mario container will be running as root.
Expected behavior
Mario container will be running under user podman or podman-tester (podman+container name).
Screenshots
If applicable, add screenshots to help explain your problem.
Additional context
Add any other context about the problem here.
Notify maintainers
@adisbladis
Metadata
Please run
nix-shell -p nix-info --run "nix-info -m"
and paste the result.Maintainer information:
The text was updated successfully, but these errors were encountered: