-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[docker] docker run --privileged does not work #2459
Comments
This is really important. I'd like to use |
With cgroups v1 we won't be able to fix this, because they are not namespace aware. That's why cgroup v2 were added. To fix this, we would probably:
|
Current docker is fine with cgroup v2, https://www.docker.com/blog/introducing-docker-engine-20-10/ - but I don't know the gitpod architecture well enough to know if that's relevant. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Can we add the label |
I'm running a docker-compose to do some ansible testing over the docker connection. I have this as a volume mapping: volumes:
- /sys/fs/cgroup:/sys/fs/cgroup:ro This isn't permitted in gitpod. I am thinking this might never be allowed in gitpod for security reasons. Is that right? Or will we be able to do something like this in the future? |
I was encountering many issues because of this, the flutter template provided in gitpod it is not working and gets this kind of errors. |
I'm starting to record my free KCNA course and I was hoping to use Gitpod to show how to use Kubernetes. I cannot run KIND on Gitpod because of this CGroups error: Someone else attempting to run KIND on Gitpod https://community.gitpod.io/t/kind-with-rootless-docker/3862 from Jun 2021 same issue. |
Using kind would be one of the most common uses of gitpod and is not compatible with it because of this. |
@csweichel @Furisto for consideration for the cgroup v2 epic |
Describe the bug
Running anything with
docker run --privileged
fails becauseThis is in part because
/sys
is just a bind mount the workspace container's/sys
, but also because we're using cgroups v1 (i.e. they're not namespaced).Steps to reproduce
Expected behavior
The container should start and run as root
The text was updated successfully, but these errors were encountered: