-
-
Notifications
You must be signed in to change notification settings - Fork 9
Description
My use case is to use singularity in a docker image for testing of singularity images in gitlab CI with the docker executor.
Our sysadmins don't want to start the gitlab runners in privileged model for security reasons, so this looks like a non-starter unless there is a way to run the docker image without --privileged. My singularity images don't need to start any special services or open network ports, they just need to mount one directory which is in the same userspace as the user executing singularity run.
What is the fundamental limitation here that requires the --privileged mode of docker ? My niave understanding is that singularity only requires root access to install (which is already done within the docker image) but not to run, but maybe this is over-simplistic.
Would it make a difference if we install singularity into the Docker image without setuid and started the docker daemon with namespaces ?