This image provides an easy way to try out podman and a base for nested containerization scenarios where the child container should run as unprivileged user.
The alpine-based image contains the following statically linked binaries:
Containers must be run as --privileged
.
The container process is still started with the root user to allow
the entrypoint script to change the storage volume mount point's
(/podman/.local/share/containers/storage
) owner to the unprivileged
podman
user.
Please note that this podman build does not provide systemd support.
docker run --privileged mgoltzsche/podman docker run alpine:3.9 echo hello from nested podman container
./make.sh build run