Replies: 2 comments 3 replies
-
|
have you granted cap_setfcap to the Kubernetes container? |
Beta Was this translation helpful? Give feedback.
-
|
Setting |
Beta Was this translation helpful? Give feedback.
-
|
have you granted cap_setfcap to the Kubernetes container? |
Beta Was this translation helpful? Give feedback.
-
|
Setting |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
We're trying to get rootless podman running in an unprivileged container using user namespaces in kubernetes. However we're struggling to get it working due to our lack of understanding. We we're hoping to find a detailed guide but the best we found was https://www.redhat.com/en/blog/podman-inside-kubernetes which references running podman with root in k8s with user namespaces, but was written in 2021 before user namespaces in k8s were enabled by default and used more often. Also in the example the container is granted (among others) the
SYS_ADMINcapability. But I understood that with user namespaces it should be possible to run rootless container builds without additional capabilities.The "least-privileged" approach that we got working is with
allowPrivilegeEscalation: trueand theCAP_SETUIDandCAP_SETGIDcapabilities:which results in the following
podman infoWhen running the pod without
allowPrivilegeEscalation: truewe get the following error:Any help or pointers to get this working or even about the topics in general (how to configure uid mappings on the host or if privileges in namespaced container are secure) would be much appreciated!
Beta Was this translation helpful? Give feedback.
All reactions