Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for rootless podman #765

Open
josecastillolema opened this issue Dec 25, 2024 · 4 comments
Open

Support for rootless podman #765

josecastillolema opened this issue Dec 25, 2024 · 4 comments

Comments

@josecastillolema
Copy link

Kcli does not seem to work on rootless podman:

> alias kclishell
alias kclishell='podman run --net host -it --rm --security-opt label=disable -v $HOME/.ssh:/root/.ssh -v $HOME/.kcli:/root/.kcli -v /var/lib/libvirt/images:/var/lib/libvirt/images -v /var/run/libvirt:/var/run/libvirt -v $PWD:/workdir --entrypoint=/bin/bash quay.io/karmab/kcli'

> kclishell
jose@think:/$ ls /root/
ls: cannot open directory '/root/': Permission denied
@josecastillolema
Copy link
Author

Using docker instead of podman as a workaround seems to work.

@karmab
Copy link
Owner

karmab commented Jan 6, 2025

default user within kcli container is root indeed, how do you access with a different user?

@josecastillolema
Copy link
Author

I don't do anything special, guess it is the default for Fedora Atomic distributions:

$ podman run --entrypoint=/usr/bin/whoami quay.io/karmab/kcli
jose

Not for docker though (this is rootless docker also):

$ docker run --entrypoint=/usr/bin/whoami quay.io/karmab/kcli
root

@josecastillolema
Copy link
Author

Looking at this doc:

By default, rootless Podman containers map the user's user ID (UID) into the container as root of the user namespace.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants