-
Notifications
You must be signed in to change notification settings - Fork 136
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Inability to work with CI processes that use nested Docker containers #1282
Comments
Can you refactor your example, so it's actually able to run on our machines, so we can get a better understanding of what the issue is? |
Sure - here's a set of steps:
So, the nested docker instance (debian:bookworm) is asked to map the current folder to In the Gitlab installation it does work, because the What can I do to get gitlab-ci-local to end up listing the same contents as the first level container does? Passing
|
This is still labeled as "elaborate". Is the example I gave above sufficient, or do you need me to provide some additional information about the issue? |
Minimal .gitlab-ci.yml illustrating the issue
This works fine if the gitlabrunner's config.toml has the "/builds" folder and the "/var/run/docker.sock" inside the "volumes" key for the "runners.docker". The "/builds" is basically in the host filesystem, so the nested docker can access the CI_PROJECT_DIR just as much as the initial (DockerImageA) could.
Expected behavior
Expected behavior is to execute commands from inside DockerImageB that can see the CI_PROJECT_DIR.
Host information
Not really relevant. It's an issue with how host-based folders need to be used (bind-mounted) for this to function.
Containerd binary
Docker.
Additional context
I did try passing --volume /gcl-builds but I got an error that this folder is already mapped. Indeed it is, with a transient mapping; one that can't allow the nested Docker invocation to map it further inside the container made for DockerImageB.
The text was updated successfully, but these errors were encountered: