You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Running containers with systemd as init system currently requires privileged:true to be set in the containers SecurityContext. The container will by default run in the user namespace of the host.
cri-o has added support for UID mappings (since TODO) in /etc/crio/crio.conf and sets them to the OCI runtime spec LinuxIDMapping
# The UID mappings for the user namespace of each container. A range is
# specified in the form containerUID:HostUID:Size. Multiple ranges must be
# separated by comma.
uid_mappings = ""
# The GID mappings for the user namespace of each container. A range is
# specified in the form containerGID:HostGID:Size. Multiple ranges must be
# separated by comma.
gid_mappings = ""
crio-lxc in turn uses the mapping from the runtime spec to set lxc.idmap in the container config.
Currently I did not manage to get a plain lxc container running in user namespaces.
See lxc/lxc#3669
The text was updated successfully, but these errors were encountered:
Running containers with
systemd
as init system currently requiresprivileged:true
to be set in the containers SecurityContext. The container will by default run in the user namespace of the host.Since process limits are set per user namespace, changing process limits in the container will affect the host.
https://systemd.io/CONTAINER_INTERFACE/#fully-unprivileged-container-payload
cri-o
has added support for UID mappings (since TODO) in/etc/crio/crio.conf
and sets them to the OCI runtime specLinuxIDMapping
crio-lxc
in turn uses the mapping from the runtime spec to setlxc.idmap
in the container config.Currently I did not manage to get a plain lxc container running in user namespaces.
See lxc/lxc#3669
The text was updated successfully, but these errors were encountered: