docker_rootless
Docker rootless Ansible role
An Ansible role to configure install and configure a Docker daemon running as a non-root user.
Do not use any of this without first testing in a non-operational environment.
Rootless mode allows running the Docker daemon and containers as a non-root user to mitigate potential vulnerabilities in the daemon and the container runtime. (docker)
Note There is a SLSA artifact present under the slsa action workflow for verification.
Requirements
---
roles:
- name: konstruktoid.docker_rootless
version: v0.53.0
src: https://github.com/konstruktoid/ansible-role-docker-rootless.git
scm: git
Playbook example
---
- hosts: all
any_errors_fatal: true
tasks:
- name: Include the konstruktoid.docker_rootless role
ansible.builtin.import_role:
name: konstruktoid.docker_rootless
Role Variables with defaults
---
docker_add_alias: true
docker_allow_ping: false
docker_allow_privileged_ports: false
docker_compose: false
docker_compose_arch: x86_64
docker_compose_release: v2.29.2
docker_compose_release_shasum: d037bd4937bf18fba67cff4366e084ee125a3e15c25657ee1aeceff8db3672b4
docker_compose_url: https://github.com/docker/compose/releases/download
docker_daemon_json_template: daemon.json.j2
docker_driver_network: slirp4netns
docker_driver_port: builtin
docker_release: 27.1.2
docker_release_rootless_shasum: 5565502b4fab26266327f5a018185f5a98cc1714c975b943dcb7c4365cdcdb25
docker_release_shasum: a7fff574037af22bd0239e7e5601c312d9fe9c55e2b9cf5ddea86d5499a4de88
docker_repository_template: docker.repo.j2
docker_rootful_enabled: false
docker_rootful: false
docker_rootful_opts: false
docker_rootful_service_template: docker_rootful.service.j2
docker_rootless_script_template: docker_rootless.sh.j2
docker_rootless_service_template: docker_rootless.service.j2
docker_service_restart: true
docker_url: https://download.docker.com/linux/static/stable/x86_64
docker_user_bashrc: false
docker_user: dockeruser
Before using this role you first have to decide if you want to install Docker
using the packages available to the distribution, also known as the "rootful"
installation since it requires root permissions and installs the upstream
Docker daemon or if you want to download the static binaries and do a manual
install.
If you set docker_rootful: false you will download the static binaries and do
a manual install, not requiring any root permissions.
If docker_rootful: true, then docker_rootful_enabled will decide if the
daemon should be enabled as a service or not.
docker_service_restart will restart the rootless service after the Docker
binaries has been extracted. This may affect any running containers.
Using docker_rootful: true and docker_rootful_enabled: true, will result in
a standard Docker installation, with an additional Docker daemon, running as a
non-root user.
Note that Debian 10 and earlier requires
docker_rootful: falsedue to missing dependencies.
The docker_url, docker_release, docker_compose_url and docker_compose_release
variables define where you find the relevant binaries and which version you
should use when doing a manual installation.
You define the name of the Docker user that will be created with the
docker_user variable. This user will download and install the binaries if
docker_rootful: false or else the user will be the one running the
rootless installation script and starting a isolated daemon.
Note that the sole purpose of the
docker_useris to run the Docker daemon and related containers, and not for system administration or used as a regular user.
docker_release_shasum, docker_release_rootless_shasum and
docker_compose_release_shasum are used to verify the files when
downloaded using the get_url
module. The docker_release_shasum is used for the Docker .tgz file and
docker_release_rootless_shasum for the docker-ce-rootless-extras package.
docker_rootful_opts is the options to apply to the Docker daemon if
running in rootful mode, if unset the settings in
docker_rootful_service_template will be used.
If docker_add_alias: true, then a docker alias will be added to either .bashrc
or .bash_aliases of the Ansible user. If false, a shell script named docker_rootless.sh is
created in the Ansible user home directory. This works as a substitute to the
docker command so that the Ansible user can execute the rootless Docker installation from the docker_user.
If docker_compose: true, then the Docker compose plugin or docker-compose
will be installed. docker_compose_arch are used to define the architecture of
the docker-compose binary.
If docker_user_bashrc: true, a .bashrc with completion for the docker and
docker compose command will be placed inside the docker_user home.
The docker_allow_privileged_ports variable configures if exposing
privileged ports (< 1024)
is allowed.
The docker_allow_ping variable configures if unprivileged users can open
ICMP echo sockets.
On some distributions, this is not allowed, and thereby containers cannot ping
to the outside.
The docker_driver_network and docker_driver_port variables configure RootlessKit's
network driver or
port driver,
respectively. This is useful for
optimising network performance
and necessary if
source IP propagation
is required. By default, the builtin port driver does not expose the actual source IP; instead,
all connections appear to the container as originating from the Docker gateway (e.g. 172.19.0.1).
Set docker_driver_port: slirp4netns to enable source IP propagation.
The variables named *_template are the locations of the
templates
in use, this to make it easier to replace them with custom ones.
The most important template is most likely
docker_daemon_json_template: daemon.json.j2, which is the location of the
Docker daemon.json configuration file template.
Container management
Standalone container
Running containers is not that much different from when a rootful Docker daemon is used, but you still need to become the unprivileged user and adapt any paths to the user working directores.
If docker_add_alias: true is used, the docker command will be
available as usual for the Ansible user, too. Type alias in the shell to see the keyword
configuration.
- name: Register Docker user info
become: true
ansible.builtin.user:
name: "{{ docker_user }}"
check_mode: true
register: docker_user_info
- name: Example container block
environment:
XDG_RUNTIME_DIR: "/run/user/{{ docker_user_info.uid }}"
PATH: "{{ docker_user_info.home }}/bin:{{ ansible_env.PATH }}"
DOCKER_HOST: "unix:///run/user/{{ docker_user_info.uid }}/docker.sock"
block:
- name: Nginx container
become: true
become_user: "{{ docker_user }}"
community.docker.docker_container:
name: nginx
image: konstruktoid/nginx
state: started
cap_drop: all
capabilities:
- chown
- dac_override
- net_bind_service
- setgid
- setuid
pull: true
hostname: "{{ ansible_nodename }}"
container_default_behavior: compatibility
Docker compose service
- name: Register Docker user info
become: true
ansible.builtin.user:
name: "{{ docker_user }}"
check_mode: true
register: docker_user_info
- name: Example docker compose block
become: true
become_user: "{{ docker_user }}"
environment:
XDG_RUNTIME_DIR: /run/user/{{ docker_user_info.uid }}
PATH: "{{ docker_user_info.home }}/bin:{{ ansible_env.PATH }}"
DOCKER_HOST: "unix:///run/user/{{ docker_user_info.uid }}/docker.sock"
block:
- name: Install pip dependencies
ansible.builtin.pip:
name:
- docker<7 # https://github.com/docker/docker-py/issues/3194
- docker-compose
- name: Create and start services
community.docker.docker_compose:
project_src: /var/tmp/
files: "{{ docker_user }}-docker-compose.yml"
register: compose_output
Testing with molecule
If Ansible Molecule
with the vagrant plugin
and related software is installed, running molecule test is supported.
tox -l will list all available tox test environments.
Contributing
Do you want to contribute? Great! Contributions are always youlcome, no matter how large or small. If you found something odd, feel free to submit a issue, improve the code by creating a pull request, or by sponsoring this project.
License
Apache License Version 2.0
