You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Right now, I don't see a way to set Pod level annotations for pipeline build steps in Kubernetes. I need this to allow Pods in my pipeline to gain access to /dev/fuse. CRI-O includes a handy feature to enable this via annotations described in detail here.
The upshot is that after you have configured CRI-O you just need to add annotations like the following to your Pod and the /dev/fuse device from the host will be passed through:
For this particular issue, I can use another means of passing /dev/fuse into the container. For instance, there is a generic method that uses resources.limits which are already supported. That said, that option requires running a DaemonSet on the cluster referencing a 3rd party image which is not ideal.
It would be a lot cleaner/safer to use the runtime's built in features to do this. Plus, allowing generic annotations will likely enable other features/integrations down the line.
Additional context
This is part of my attempt to get buildah to run on Woodpecker. This should be the last piece of the puzzle now that securityContext and AppArmor and sorted. But, I've said that before.
Validations
Checked that the feature isn't part of the next version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]
Clear and concise description of the problem
Right now, I don't see a way to set Pod level annotations for pipeline build steps in Kubernetes. I need this to allow Pods in my pipeline to gain access to
/dev/fuse
. CRI-O includes a handy feature to enable this via annotations described in detail here.The upshot is that after you have configured CRI-O you just need to add annotations like the following to your Pod and the /dev/fuse device from the host will be passed through:
Suggested solution
The ideal solution for me would be to allow arbitrary Pod annotations to be configured in the pipeline like so:
Alternative
For this particular issue, I can use another means of passing
/dev/fuse
into the container. For instance, there is a generic method that usesresources.limits
which are already supported. That said, that option requires running a DaemonSet on the cluster referencing a 3rd party image which is not ideal.It would be a lot cleaner/safer to use the runtime's built in features to do this. Plus, allowing generic annotations will likely enable other features/integrations down the line.
Additional context
This is part of my attempt to get buildah to run on Woodpecker. This should be the last piece of the puzzle now that
securityContext
and AppArmor and sorted. But, I've said that before.Validations
next
version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]The text was updated successfully, but these errors were encountered: