Podman
podman
is:
… a daemon-less container engine for developing, managing, and running OCI Containers on your Linux System
For the most part podman
behaves very similarly to docker
, with much of the commands being identical, ie:
podman images
- lists all images in host repositorypodman ps
- lists all running containerspodman run
- run image in container (all flags work as well, ie.--rm
-it
--net=host
-v
, etc.)etc.
Enabling the Podman service
Podman comes with a optional service/API that can be enabled:
user@ubuntu-20-04:~$ systemctl --user enable podman.socket
user@ubuntu-20-04:~$ systemctl --user start podman.socket
user@ubuntu-20-04:~$ systemctl --user status podman.socket
● podman.socket - Podman API Socket
Loaded: loaded (/usr/lib/systemd/user/podman.socket; enabled; vendor preset: enabled)
Active: inactive (dead) since Thu 2022-01-06 15:59:44 PST; 16min ago
Triggers: ● podman.service
Docs: man:podman-system-service(1)
Listen: /run/user/1000/podman/podman.sock (Stream)
Jan 06 14:32:11 dustin-ThinkPad-T420 systemd[1042]: Listening on Podman API Socket.
Jan 06 15:59:44 dustin-ThinkPad-T420 systemd[1042]: podman.socket: Succeeded.
Jan 06 15:59:44 dustin-ThinkPad-T420 systemd[1042]: Closed Podman API Socket.
Makes your Podman service accessible by adding the --remote
flag to your Podman command. ex. podman --remote run <image> ...
Not sure if it behaves similarly to the docker daemon b/c podman touts itself as a daemon-less tool
Mounting /run/user/1000/podman/podman.sock
or /run/podman/podman.sock
doesn’t seem to do anything, but further research may be needed
Podman Registry
We run a local docker registry on http://localhost:5050
for internal usage
Podman stores the list of registries in registries.conf
:
/etc/containers/registries.conf
for system wide config$HOME/.config/containers/registries.conf
for a single user
Podman will enable these registries by default to allow for short name usage when pulling images
unqualified-search-registries = ['registry.fedoraproject.org', 'registry.access.redhat.com', 'registry.centos.org', 'docker.io']
To enable the local Podman image registry (after creating it):
[[registry]]
location="localhost:5000"
insecure=true
Running podman in a container
Docker has a feature where you can start a sibling container while in a container simply by mounting -v /var/run/docker.sock:/var/run/docker.sock
beforehand
It’s useful b/c
chimera
runs it workflows (or jobs) from within a container itself
Podman doesn’t quite have that feature, but it can be achieved through a workaround:
podman
isn’t ran as a daemon so mounting adocker.sock
file wouldn’t workThe user has to be
root
(but doing more research to see if it can be done without)
First activate the root
user:
user@ubuntu-20-04:~$ sudo su -
root@ubuntu-20-04:~#
Pull down some images:
root@ubuntu-20-04:~# podman pull podman:v3.3.1
Resolved "podman" as an alias (/etc/containers/registries.conf.d/000-shortnames.conf)
Trying to pull quay.io/podman/stable:v3.3.1...
podman Getting image source signatures
Copying blob bf213f2c84f8 done
Copying blob bf213f2c84f8 done
Copying blob 7c013e7a24b3 done
Copying blob 5f41ed556d45 done
Copying blob ecfb9899f4ce done
Copying blob 2447ce384253 done
Copying blob 8ba0306866b4 done
Copying blob c2749003bd4e done
Copying blob 2c7890a2c392 done
Copying blob 9d19764e964e done
Copying config 803fcf0206 done
Writing manifest to image destination
Storing signatures
803fcf0206f7751cb3a9e5b91ad53b833b649681ee51841c4deb56a855791beb
root@ubuntu-20-04:~# podman pull python:3.9.7-slim
Resolved "python" as an alias (/etc/containers/registries.conf.d/000-shortnames.conf)
Trying to pull docker.io/library/python:3.9.7-slim...
Getting image source signatures
Copying blob b489ab31cb6f done
Copying blob 76cee30eba29 done
Copying blob f8416d8bac72 done
Copying blob 567b57d5964a done
Copying blob 25db5d180001 done
Copying config 66f4843b72 done
Writing manifest to image destination
Storing signatures
66f4843b721f81413e67156177981ee800736c895d44a25c22bea05eb744baed
Images are now in the repository:
root@ubuntu-20-04:~# podman images
REPOSITORY TAG IMAGE ID CREATED SIZE
quay.io/podman/stable v3.3.1 803fcf0206f7 14 hours ago 437 MB
docker.io/library/python 3.9.7-slim 66f4843b721f 13 days ago 128 MB
According to oracle’s documentation:
… images are stored in the
/var/lib/containers
directory when Podman is run by the root user. For standard users, images are typically stored in$HOME/.local/share/containers/storage/
.
So by mounting /var/lib/containers
to the container it will give it access to the host (or parent) images
for some reason we need to mount
/run/netns
as wellmake sure to add the
--privileged
flag to let your container runpodman
commands (docs)
root@ubuntu-20-04:~# podman run --privileged \
-v /var/lib/containers:/var/lib/containers \
-v /run/netns:/run/netns \
--rm -it quay.io/podman/stable:v3.3.1 bash
[root@bcedb6a1962e /]# podman images
REPOSITORY TAG IMAGE ID CREATED SIZE
quay.io/podman/stable v3.3.1 803fcf0206f7 14 hours ago 437 MB
docker.io/library/python 3.9.7-slim 66f4843b721f 13 days ago 128 MB
If you’re receiving an error similar to this:
ERRO[0000]... error acquiring lock N for volume <image>: file exists
It can be resolved by running podman system renumber
(docs)
And the container can now spawn new podman
containers:
[root@755d60f4707a /]# podman run 66f4843b721f echo '{"foo": "bar"}' | python -m json.tool
{
"foo": "bar"
}
Running podman in a container (rootless)
Method 1:
If you mount the -v $HOME/.local/share/containers/storage:/var/lib/shared
to the container it will have access to the host images
Was unable to run a sibling container using this method, please look at method 2
more research needed to see if it behaves the same as a rootful user
user@ubuntu-20-04:~$ podman images
REPOSITORY TAG IMAGE ID CREATED SIZE
docker.io/library/python 3.9.7-slim 66f4843b721f 2 weeks ago 128 MB
quay.io/podman/stable v3.3.0 b648fbc5870f 3 weeks ago 387 MB
user@ubuntu-20-04:~$ podman run --rm -it --privileged \
-v $HOME/.local/share/containers/storage:/var/lib/shared \
quay.io/podman/stable:v3.3.0 bash
[root@feb5564e8f5a /]# podman images
REPOSITORY TAG IMAGE ID CREATED SIZE R/O
docker.io/library/python 3.9.7-slim 66f4843b721f 2 weeks ago 128 MB true
quay.io/podman/stable v3.3.0 b648fbc5870f 3 weeks ago 387 MB true
Method 2:
According to this Github issue, mount the storage directory twice:
user@ubuntu-20-04:~$ podman run -it --privileged \
-v /run/user/$UID:/run/user/$UID \
-v $HOME/.local/share/containers:$HOME/.local/share/containers \
-v $HOME/.local/share/containers:/var/lib/containers \
podman:v3.3.1 bash
inside the docker container able to see all the images (from host) and run a second container from inside
[root@9fd12376edc6 /]# podman images
REPOSITORY TAG IMAGE ID CREATED SIZE
quay.io/podman/stable v3.3.1 3758669a89c2 3 months ago 374 MB
docker.io/library/python 3.9.7-slim 66f4843b721f 4 months ago 128 MB
quay.io/podman/stable v3.3.0 b648fbc5870f 4 months ago 387 MB
[root@9fd12376edc6 /]# podman run -it podman:v3.3.1 bash
[root@9fd12376edc6 /]#
in a new tab was able to see 2 sibling containers (from host) running simultaneously:
user@ubuntu-20-04:~$ podman ps
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
9fd12376edc6 quay.io/podman/stable:v3.3.1 bash 19 seconds ago Up 20 seconds ago confident_noyce
27f952b0854b quay.io/podman/stable:v3.3.1 bash 3 seconds ago Up 3 seconds ago elegant_northcutt
Mounting work directories through multiple layers of podman containers
created a directory in /tmp/test
with .txt
files and when mounting the directory through multiple layers of podman containers the volume can still be accessed
root@ubuntu-20-04:~# podman run --rm -it --privileged \
> -v /tmp/test:/tmp/test \
> -v /var/lib/containers/storage:/var/lib/containers/storage \
> -v /run/libpod:/run/libpod \
> -v /run/containers/storage:/run/containers/storage \
> quay.io/podman/stable:v3.3.1 bash
[root@6163ad73434f /]# podman run --rm -it --privileged \
-v /tmp/test:/tmp/test \
-v /var/lib/containers/storage:/var/lib/containers/storage \
-v /run/libpod:/run/libpod \
-v /run/containers/storage:/run/containers/storage \
quay.io/podman/stable:v3.3.1 bash
[root@6163ad73434f /]# ls -l /tmp/test/
total 0
-rw-rw-r-- 1 podman podman 0 Sep 27 18:20 1.txt
-rw-rw-r-- 1 podman podman 0 Sep 27 18:20 2.txt
-rw-rw-r-- 1 podman podman 0 Sep 27 18:20 3.txt
-rw-rw-r-- 1 podman podman 0 Sep 27 18:20 4.txt
-rw-rw-r-- 1 podman podman 0 Sep 27 18:20 5.txt
-rw-rw-r-- 1 podman podman 0 Sep 27 18:20 6.txt
-rw-rw-r-- 1 podman podman 0 Sep 27 18:20 7.txt
-rw-r--r-- 1 podman podman 0 Sep 27 18:23 8.txt
According to podman documentation:
… people intend to use rootless Podman - they want their UID inside and outside the container to match. Thus, we provide the
--userns=keep-id
flag, which ensures that your user is mapped to its own UID and GID inside the container.It is also helpful to distinguish between running Podman as a rootless user, and a container which is built to run rootless. If the container you're trying to run has a
USER
which is not root, then when mounting volumes you must use--userns=keep-id
. This is because the container user would not be able to becomeroot
and access the mounted volumes.
Changes to HySDS
With HySDS needing the option of supporting both docker
and podman
(and also singularity
) there will be a large refactor required in job_worker.py
(source code)
instead of separating it
docker
podman
andsingularity
through different branches it should be config basedthis will avoid having to keep each branch up-to-date and potential merge conflicts
The container engine logic can be split into separate classes:
Docker
,Podman
&Singularity
Will replace
container_utils.py
andjob_worker.py
will use a factory function to determine which class to use
gosu
GitHub - tianon/gosu: Simple Go-based setuid+setgid+setgroups+exec
used for running non-root users in docker containers
not sure if Podman would need to use it but will need to investigate
used in
hysds-dockerfiles
: GitHub
Issues:
Unable to load the
.tar.gz
image into podman$ podman load -i /data/work/cache/docker_image.tar.gz Error: payload does not match any of the supported image formats (oci, oci-archive, dir, docker-archive)
podman load < /data/work/cache/docker_image.tar.gz
works but the<
character doesn’t work withsubprocess
Unable to map user
1011
to intopge-base
image (or any image based off ofpge-base
)same with using the
--privileged
flag; both do nothing~$ podman run -it -u 1011:1011 pge-base:latest bash ~$
By default if
podman
runs a container without--user
it will run asroot
was able to run a random docker image w/ mounting
/data/work/jobs
and able to edit the directory$ podman run -it --rm \ -w /data/work/jobs/2022/01/12/22/43/foo/bar/directory \ -v /data/work/jobs:/data/work/jobs:Z golang:latest bash
How to debug issues with volumes mounted on rootless containers
the third solution listed (adding the
--userns=keep-id
flag) seemed to work well without compromising the host directoriessecond solution changes the ownership of directories in host, makes the celery worker unable to write/create directories