Test Runner on OpenShift with Podman
Overview
In GitLab 15.3, we officially added support for Podman as a drop-in replacement for Docker as the container run time with the Docker Executor.
The testing at that time was focused solely on the Runner + Docker executor. Customers using the runner on Kubernetes and specifically OpenShift have asked for guidance on scenarios such as building containers using Podman on OpenShift.
Note - CRI-O is used as the container engine in OpenShift 4.
Scope
-
Test scenarios
- Running podman as root, with processes in the container running as root
- Running podman as root, with processes in the container running as non-root
- Running podman as an unprivileged user (rootless), with processes in the container running as root
- Running podman as an unprivileged user (rootless), with processes in the container running as non-root (also known as rootless as a non-root user)
-
Deliverables
- Create documentation on how to use Podman to build containers in GitLab CI/CD jobs on OpenShift.