Skip to content

Make podman first class citizens for quarkus usecases #31253

@maxandersen

Description

@maxandersen

Description

Recent podman desktop (0.12) and podman (4.4) by default now activates docker compatibility making it simple to setupand start across all three major os's.

This issue is to capture outstanding issues in quarkus, testcontainers, podman,devsevices containers etc that prevents a smooth podman experience.

Overall setup

Issues that makes installation and setup problematic/challenging/more difficult than we would prefer

  • have docker socket enabled by default on windows and OSX (Fixed since podman 4.4.1+ and desktop 0.12.0+)
  • test containers requiring enabling privileged ryuk to be enabled

Privileged vs non-priviliged by default

In general docker runs in a setup that defaults to risky/unsafe; where as podman does the opposite. runs in non-priviliged mode. We can probably explicitly make our usage enable unsafe running for both docker and podman.

Downside is that security concerned podman users would not like to do that by default; but on the other hand users running on docker already run it this way.

A classic security first vs usability first issue.

What approach we take here is yet unlcear

Affected Devservices

  • Elasticsearch (chroot: cannot change root directory to '/': Operation not permitted)
  • DB2 (multitude of root / syscall issues)

Affected container centric usecases

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions