Test Podman with the Runner Kubernetes Executor

Overview

In GitLab 15.3, we officially added support for Podman as a drop-in replacement for Docker as the container run time with the Docker Executor.

The testing at that time was focused solely on the Runner + Docker executor. Customers using the runner on Kubernetes and specifically OpenShift have asked for guidance on scenarios such as building containers using Podman on OpenShift.

Note - CRI-O is used as the container engine in OpenShift 4..

Scope

  • Test scenarios

    • Running podman as root, with processes in the container running as root
    • Running podman as root, with processes in the container running as non-root
    • Running podman as an unprivileged user (rootless), with processes in the container running as root
    • Running podman as an unprivileged user (rootless), with processes in the container running as non-root (also known as rootless as a non-root user)
  • Deliverables

    • Create documentation on how to use Podman to build containers in GitLab CI/CD jobs on OpenShift.