mirror of
				https://gitea.com/gitea/act_runner.git
				synced 2025-10-31 04:47:58 +01:00 
			
		
		
		
	This PR creates a rootless Docker image that runs both `dockerd` and `act_runner` using `supervisord`. It has been tested locally for a few days and seems stable. Co-authored-by: ccureau <ccureau@noreply.gitea.io> Reviewed-on: https://gitea.com/gitea/act_runner/pulls/208 Reviewed-by: Jason Song <i@wolfogre.com> Co-authored-by: ccureau <ccureau@noreply.gitea.com> Co-committed-by: ccureau <ccureau@noreply.gitea.com>
		
			
				
	
	
		
			12 lines
		
	
	
		
			866 B
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			12 lines
		
	
	
		
			866 B
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| ## Kubernetes Docker in Docker Deployment with `act_runner`
 | |
| 
 | |
| NOTE: Docker in Docker (dind) requires elevated privileges on Kubernetes. The current way to achieve this is to set the pod `SecurityContext` to `privileged`. Keep in mind that this is a potential security issue that has the potential for a malicious application to break out of the container context.
 | |
| 
 | |
| Files in this directory:
 | |
| 
 | |
| - [`dind-docker.yaml`](dind-docker.yaml)
 | |
|   How to create a Deployment and Persistent Volume for Kubernetes to act as a runner. The Docker credentials are re-generated each time the pod connects and does not need to be persisted.
 | |
| 
 | |
| - [`rootless-docker.yaml`](rootless-docker.yaml)
 | |
|   How to create a rootless Deployment and Persistent Volume for Kubernetes to act as a runner. The Docker credentials are re-generated each time the pod connects and does not need to be persisted.
 |