Skip to content

Latest commit

 

History

History
35 lines (25 loc) · 1.09 KB

README.md

File metadata and controls

35 lines (25 loc) · 1.09 KB

podman container image

This image provides an easy way to try out podman and a base for nested containerization scenarios where the child container should run as unprivileged user.

The alpine-based image contains the following statically linked binaries:

Containers must be run as --privileged. The container process is still started with the root user to allow the entrypoint script to change the storage volume mount point's (/podman/.local/share/containers/storage) owner to the unprivileged podman user.

Please note that this podman build does not provide systemd support.

Usage example

docker run --privileged mgoltzsche/podman docker run alpine:3.9 echo hello from nested podman container

Local image build & run

./make.sh build run