Test Podman with the Runner Kubernetes Executor
Overview
In GitLab 15.3, we officially added support for Podman as a drop-in replacement for Docker as the container run time with the Docker Executor.
The testing at that time was focused solely on the Runner + Docker executor. Customers using the runner on Kubernetes and specifically OpenShift have asked for guidance on scenarios such as building containers using Podman on OpenShift.
Note - CRI-O is used as the container engine in OpenShift 4..
Scope
-
Test scenarios -
Running podman as root, with processes in the container running as root -
Running podman as root, with processes in the container running as non-root -
Running podman as an unprivileged user (rootless), with processes in the container running as root -
Running podman as an unprivileged user (rootless), with processes in the container running as non-root (also known as rootless as a non-root user)
-
-
Deliverables -
Create documentation on how to use Podman to build containers in GitLab CI/CD jobs on OpenShift.
-