Skip to content
Branch: master
Find file Copy path
Find file Copy path
4 contributors

Users who have contributed to this file

@TomSweeneyRedHat @rhatdan @msekletar @jwflory
45 lines (41 sloc) 3.58 KB

Shortcomings of Rootless Podman

The following list categorizes the known issues and irregularities with running Podman as a non-root user. Although currently functional, there is still a number of work items that are under consideration to be added. These proposed changes are in varying degrees of design and development.

Contributors are more than welcomed to help with this work. If you decide to carve off a piece and work on it, please create an issue in GitHub, and assign it to yourself. If you find other unexpected behavior with rootless Podman and feel it’s warranted, please feel free to update this document.

  • Podman can not create containers that bind to ports < 1024.
    • The kernel does not allow processes without CAP_NET_BIND_SERVICE to bind to low ports.
  • “How To” documentation is patchy at best.
  • If /etc/subuid and /etc/subgid are not setup for a user, then podman commands can easily fail
    • This can be a big issue on machines using Network Based Password information (FreeIPA, Active Directory, LDAP)
    • We are working to get support for NSSWITCH on the /etc/subuid and /etc/subgid files.
  • No cgroup V1 Support
    • cgroup V1 does not safely support cgroup delegation.
    • However, cgroup V2 provides cgroup delegation and is available on Fedora starting with version 29 and other Linux distributions.
  • Some systemd's unit configuration options do not work in the rootless container
    • systemd fails to apply several options and failures are silently ignored (e.g. CPUShares, MemoryLimit).
    • Use of certain options will cause service startup failures (e.g. PrivateNetwork).
  • Can not share container images with CRI-O or other users
  • Difficult to use additional stores for sharing content
  • Does not work on NFS or parallel filesystem homedirs (e.g. GPFS)
    • NFS and parallel filesystems enforce file creation on different UIDs on the server side and does not understand User Namespace.
    • When a container root process like YUM attempts to create a file owned by a different UID, NFS Server/GPFS denies the creation.
  • Does not work with homedirs mounted with noexec/nodev
    • User can setup storage to point to other directories they can write to that are not mounted noexec/nodev
  • Can not use overlayfs driver, but does support fuse-overlayfs
    • Ubuntu supports non root overlay, but no other Linux distros do.
  • Only other supported driver is VFS.
  • No KATA Container support
  • No CNI Support
    • CNI wants to modify IPTables, plus other network manipulation that requires CAP_SYS_ADMIN.
    • There is potential we could probably do some sort of blacklisting of the relevant plugins, and add a new plugin for rootless networking - slirp4netns as one example and there may be others
  • Cannot use ping out of the box.
  • Requires new shadow-utils (not found in older (RHEL7/Centos7 distros) Should be fixed in RHEL7.7 release)
  • A few commands do not work.
    • mount/unmount (on fuse-overlay)
      • Only works if you enter the mount namespace with a tool like buildah unshare
    • podman stats (Without cgroup V2 support)
    • Checkpoint and Restore (CRIU requires root)
    • Pause and Unpause (no freezer cgroup)
  • Issues with higher UIDs can cause builds to fail
    • If a build is attempting to use a UID that is not mapped into the user namespace mapping for a container, then builds will not be able to put the UID in an image.
You can’t perform that action at this time.