mirror of
https://github.com/nektos/act.git
synced 2026-04-26 01:15:51 +03:00
[GH-ISSUE #1997] KVM based containers #959
Labels
No labels
area/action
area/cli
area/docs
area/image
area/runner
area/workflow
backlog
confirmed/not-planned
kind/bug
kind/discussion
kind/external
kind/feature-request
kind/question
meta/duplicate
meta/invalid
meta/need-more-info
meta/resolved
meta/wontfix
meta/workaround
needs-work
pull-request
review/not-planned
size/M
size/XL
size/XXL
stale
stale-exempt
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/act#959
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @HuJK on GitHub (Sep 11, 2023).
Original GitHub issue: https://github.com/nektos/act/issues/1997
Act version
0.2.50
Feature description
In the github action, we have the full root permissions and kernel capabilities , like /dev/net/tun or mount/umount or load kernel modules in it.
But we can't access these permissions in the act runner because docker engine running codes on the host kernel, all dangerous operaion are blocked because it may crash the host OS.
In my opinion, it would be better if we can support kata container or KubeVirt because kata container/KubeVirt uses QEMU or KVM to virtualize a guest kernel and running codes on it. We can get better isolation and securites, and make it more close to github action.
We can even run a isolated docker engine in the kata container/KubeVirt!
I think this issue is differ from https://github.com/nektos/act/issues/303 because podman is a runC based container and it also blocks dangerous operaion. But we can use custom kernel in kata container and get full kernel capabilities in it. We can even write a action to build and test kernel modules without the risk to crash host system which is impossible in runC based containers.
@septatrix commented on GitHub (Dec 31, 2024):
This would also be a great addition for those hosting public Forgejo/Gitea instances which use Act for their Actions/CI. With containers there is a higher risk of escaping the sandbox compared to proper VMs