Replies: 9 comments 6 replies
-
Try with |
Beta Was this translation helpful? Give feedback.
-
the second command worked (--privileged=false --cap-add=all) the first did not. |
Beta Was this translation helpful? Give feedback.
-
can that be passed to the docker via a helm chart? or is it a k8 system thing? |
Beta Was this translation helpful? Give feedback.
-
That means it is not a seccomp issue but a capability issue. |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
(Hi, same issue over here with Debian rootfs 👋)
Indeed, FROM debian:bookworm
# ...
RUN apt-get install -y libcap2-bin && \
chmod 0755 /usr/bin/newuidmap /usr/bin/newgidmap && \
setcap cap_setuid=ep /usr/bin/newuidmap && \
setcap cap_setgid=ep /usr/bin/newgidmap && \
apt-get autoremove --purge -y libcap2-bin @rhatdan What do you think about this ? I can't manage to understand why rootless runtime fails to inherit "privileges" through setuid flags ( |
Beta Was this translation helpful? Give feedback.
-
SGTM and much better then using CAP_SYSADMIN. |
Beta Was this translation helpful? Give feedback.
-
with
podman version with spit a chown error on the storage of the container.
While stuffing podman into the jenkins:lts docker may seem weird, I see it as a common use case: |
Beta Was this translation helpful? Give feedback.
-
I am alos getting this issue Error: creating runtime static files directory: mkdir /var/lib/containers: read-only file system which makes sense as the root of the docker is readonly |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Issue Description
Running podman without the --privileged in a debian container fails with
works fine with the --privileged flag
Steps to reproduce the issue
Describe the results you received
I tried all the 'hacks' in the various other issues and no change.
eg added to dockerfile
same result
Describe the results you expected
Expect it to run.
Works with the --privileged flag passed in.
Note that neither of this commands will work without the above flag.
podman info output
Podman in a container
Yes
Privileged Or Rootless
Rootless
Upstream Latest Release
Yes
Additional environment details
Additional environment details
Beta Was this translation helpful? Give feedback.
All reactions