Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Get the OpenShift Pod running as rootless #2

Open
adelton opened this issue Dec 13, 2023 · 1 comment
Open

Get the OpenShift Pod running as rootless #2

adelton opened this issue Dec 13, 2023 · 1 comment

Comments

@adelton
Copy link
Owner

adelton commented Dec 13, 2023

Tests show that

--- a/kind-cluster-pod-openshift.yaml
+++ b/kind-cluster-pod-openshift.yaml
@@ -15,14 +15,21 @@ metadata:
   name: kind-cluster
   labels:
     app: kind-cluster
+  annotations:
+    io.openshift.builder: "true"
+    io.kubernetes.cri-o.userns-mode: auto
 spec:
+  securityContext:
+    runAsUser: 200000
+    fsGroup: 200000
+    fsGroupChangePolicy: OnRootMismatch
   initContainers:

should enable the Pod to run in a user namespace, making uid 0 in the containers uid 200000 on the OpenShift worker hosts.

However, the whole setup fails because kind runs systemd in the podman containers and we hit containers/podman#21008.

Filing this issue as a placeholder to continue the investigation of rootless kind in OpenShift once we know how systemd in rootless podman in OpenShift should be run.

@adelton
Copy link
Owner Author

adelton commented Dec 21, 2023

The issue is currently most likely in CRI-O: cri-o/cri-o#7623.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant