cross-posted from: https://programming.dev/post/39212874
I recently migrated my services from rootful
docker
to rootlesspodman quadlets
. It went smoothly, since nothing I use actually needs to be rootful. Well, except forcaddy
. It needs to be able to attach to privileged ports 80 and 443.My current way to bypass it is using
HAProxy
running as root and forwarding connections using proxy protocol. (Tried to usefirewalld
but that makes the client IP opaque tocaddy
.) But that adds an extra layer, which means extra latency. It’s perfectly usable, but I’d like to get rid of it, if possible.I’m willing to run
caddy
in rootfulpodman
if needed. But from what I understand, that means I can’t have it in the same rootless network as my other containers. I really don’t wanna open most of my containers’ ports, so that’s not an option.So, I’m asking whether any of these three things are possible.
- Use
firewalld
to forward ports tocaddy
without obscuring the client’s IP.- Make rootful
caddy
share a network with other rootless containers.- Assign privileged ports to caddy somehow, in rootless mode. (I know there’s a way to make all these ports unprivileged, but is it possible to only assign these 2 ports as unprivileged?)
Or maybe there’s a fourth way that I’m missing. I feel like this is a common enough setup, that there must be a way to do it. Any pointers are appreciated, thanks.
I’m not running your configuration so can’t tell you with the assurance that I have it working but Forwarding ports with firewalld appears to address port forwarding to rootless podman using firewalld. If that doesn’t work for you you might need to clarify what your firewalld configuration is that obscures the client IP. I wouldn’t expect a simple port mapping to affect IP address.
Be aware you might have to resort to nftables if firewalld doesn’t work. I use localhost a lot and the routing rules are different in that case.
I think it’s the masquerade that’s causing problems for me. I have to keep it enabled since I’m running a
tailscale
exit node. But maybe I can selectively disable it here.