Podman-in-podman without privileged and with host mounts #28307
Replies: 1 comment 1 reply
-
|
The rootful-in-rootless approach is the right direction for your use case, and you can avoid Rootful-in-rootless without
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I'd love to run podman-in-podman, but I also want to seamlessly share a host mount from the user.
This is possible with rootless-in-rootless, but necessitates very long (30+ minute) container starts on first run with UID/GID remapping/chown. e.g.
(or similarly doing
--userns=keep-id,uid=1000,gid=1000)(I am notably using an image built on top of
quay.io/podman/stablewhich is much larger/many more files.)Similar to #16541
Running rootful-in-rootless seemed like the next acceptable step in my case - easy UID mapping and no issues with the file access! However it seems to necessitate
--privilegedor else root fails to run containers. e.g.I'd prefer to not assign privileged, but is a concession which seems necessary currently.
It may well be that the podman image config I'm relying on simply is not configured for rootful-in-rootless and it's an easy fix. https://github.com/containers/image_build/tree/main/podman
I haven't figured out an ideal solution here between 1) need podman-in-podman, 2) don't necessarily want it to be a privileged container, 3) need to share host directory to container seamlessly.
Is there a configuration to make root podman invocations behave more like rootless to enable root-run containers for rootful-in-rootless podman?
Beta Was this translation helpful? Give feedback.
All reactions