Skip to content
Discussion options

You must be logged in to vote

Docker only runs as root and allows rootless users to interact with the docker.sock if they are in the docker group. I wrote years ago that this was the most dangerous thing you can do on linux.

https://projectatomic.io/blog/2015/08/why-we-dont-let-non-root-users-run-docker-in-centos-fedora-or-rhel/

I would advise you to just allow users to run sudo podman exec -i or sudo podman ps. If you want the same feature as Docker you could add a podman group to the system and then add users to the podman group, finally configure podman.sock to run in rootful mode as 660 with root:podman. Note this will give everyone on the system full root access to the host.

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by dj-mc
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants