-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Discuss] unprivileged rootful podman in kubernetes #2
Comments
👋 Hi, @saschagrunert and @giuseppe. Is there currently any reference or something on running Podman within pods without |
FYI: We need to take the rootless network and some system calls(mount(2)) into consideration. |
It seems fuse-overlayfs calls low-level api I think this plugin can mount fuse-overlayfs, but its mount destination is statically defined in pod's manifest. |
in this case you'd need to be able to create a user namespace. Podman can run in a pod without privileges as long as |
👍 I didn't know
|
Having read about different ways of operating podman in various environments, it certainly feels like getting this CSI project to work with podman in unprivileged container in kubernetes would be a very interesting and strong use case which will benefit many.
The challenge ahead may be getting the fusermount proxy to somehow “work” with fuse-overlayfs when podman is configured to use overlay as the storage driver. And currently without granting SYS_ADMIN rootful podman simply does not work in a unprivileged container in a kubernetes pod.
The text was updated successfully, but these errors were encountered: