mirror of
https://github.com/spr-networks/super.git
synced 2026-04-24 20:35:55 +03:00
[GH-ISSUE #451] [Enhancement] Relax Docker dependencies to enable other container engines. #226
Labels
No labels
blocked
bug
documentation
enhancement
fixed
fixed ✅
hardening
implemented
installer
multicast
p1
p2
pending
podman
pull-request
security
testing
v1
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/super#226
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @MrDrMcCoy on GitHub (Oct 7, 2025).
Original GitHub issue: https://github.com/spr-networks/super/issues/451
I was very nearly successful in getting SPR running with Podman / systemd Quadlets, but ran into some issues:
docker composebinary to try and restart the container. Why do that when theapiandsuperdcontainers already bind to the Docker control socket? If the restart is initiated via the control socket, it can target the desired containers by name and not rely on brittle shell commands. Podman provides a compatible control socket, so no special handling is needed beyond not talking to the Docker CLI.For now, I will wipe my setup and try again with official Docker.
@lts-rad commented on GitHub (Oct 7, 2025):
This is awesome! Feel free to make a PR even if it isnt working yet.
When I last worked on podman there was some question on how to work with docker networks as defined by compose, that was one area where podman+compose seemed lacking. I know podman has been very actively developed but have not checked in if this is resolved yet. Another path to try might be moving into systemd defined networks and services from docker compose. I would say the main value add for compose right now is building, and everything else is not really needed
Regarding 1, we use nftables rather than iptables and manage the network ourselves to block 1-hop forwarding attacks as well as have more control over containers, are you referring to this or something else?
@MrDrMcCoy commented on GitHub (Oct 7, 2025):
Indeed, the first point was about the nftables configs. Some of them specifically target the docker0 interface, which of course doesn't exist without actually running Docker. I didn't look too closely to see if the errors surrounding the attempts to create rules for the non-existent interface caused any of the other rules to not be applied. It may be worth re-visiting this to see if there is a good way to apply these rules with dynamic targeting, both to handle missing Docker interfaces and potentially additional interfaces that may exist from other configs.