You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'd like to be able to run a container that requires the IPC_LOCK capability (specifically HashiCorp's Vault) and it appears that cap_add: [IPC_LOCK] on the compose file service is ignored (based on the app's error "Failed to lock memory: cannot allocate memory ... This usually means that the mlock syscall is not available.")
This same issue occurs when using lima nerdctl compose up (using the default VM template) or docker-compose (using the docker VM template).
To reproduce (currently tested using lima v0.11.2):
Ah, yes, that's exactly it. Thanks a ton @AkihiroSuda for pointing me in the right direction.
For anyone else following along in the future, this is expected behavior with running the containers as non-root by default. When more permissions are needed, it's fairly simple to modify the docker template to remove the parts that make it non-root and share the root (/var/run/docker.sock) socket instead (incorporating a fix to ensure the VM user has access to the socket)
Description
I'd like to be able to run a container that requires the
IPC_LOCK
capability (specifically HashiCorp's Vault) and it appears thatcap_add: [IPC_LOCK]
on the compose file service is ignored (based on the app's error "Failed to lock memory: cannot allocate memory ... This usually means that the mlock syscall is not available.")This same issue occurs when using
lima nerdctl compose up
(using the default VM template) or docker-compose (using the docker VM template).To reproduce (currently tested using lima v0.11.2):
The text was updated successfully, but these errors were encountered: