vyos@vyos:~$ show system image
The system currently has the following image(s) installed:
1: 1.3-rolling-202006010117 (default boot) (running image)
vyos@vyos:~$ sudo apt-get update
Reading package lists… Done
vyos@vyos:~$ sudo curl -sSL https://get.docker.com/ | /bin/sh
Executing docker install script, commit: 26ff363bcf3b3f5a00498ac43694bf1c7d9ce 16c
- sudo -E sh -c ‘apt-get update -qq >/dev/null’
- sudo -E sh -c ‘DEBIAN_FRONTEND=noninteractive apt-get install -y -qq apt-trans port-https ca-certificates curl >/dev/null’
- sudo -E sh -c ‘curl -fsSL “https://download.docker.com/linux/debian/gpg” | apt -key add -qq - >/dev/null’
Warning: apt-key output should not be parsed (stdout is not a terminal) - sudo -E sh -c ‘echo “deb [arch=amd64] Index of linux/debian/ buster stable” > /etc/apt/sources.list.d/docker.list’
- sudo -E sh -c ‘apt-get update -qq >/dev/null’
- ‘[’ -n ‘’ ‘]’
- sudo -E sh -c ‘apt-get install -y -qq --no-install-recommends docker-ce >/dev/ null’
[ 1813.800096] overlayfs: filesystem on ‘/var/lib/docker/check-overlayfs-support913513032/upper’ not supported as upperdir
[ 1813.817957] overlayfs: filesystem on ‘/var/lib/docker/check-overlayfs-support215855879/upper’ not supported as upperdir - sudo -E sh -c ‘docker version’
Client: Docker Engine - Community
Version: 19.03.10
API version: 1.40
Go version: go1.13.10
Git commit: 9424aeaee9
Built: Thu May 28 22:17:05 2020
OS/Arch: linux/amd64
Experimental: false
Server: Docker Engine - Community
Engine:
Version: 19.03.10
API version: 1.40 (minimum version 1.12)
Go version: go1.13.10
Git commit: 9424aeaee9
Built: Thu May 28 22:15:38 2020
OS/Arch: linux/amd64
Experimental: false
containerd:
Version: 1.2.13
GitCommit: 7ad184331fa3e55e52b890ea95e65ba581ae3429
runc:
Version: 1.0.0-rc10
GitCommit: dc9208a3303feef5b3839f4323d9beb36df0a9dd
docker-init:
Version: 0.18.0
GitCommit: fec3683
If you would like to use Docker as a non-root user, you should now consider
adding your user to the “docker” group with something like:
sudo usermod -aG docker vyos
Remember that you will have to log out and back in for this to take effect!
WARNING: Adding a user to the “docker” group will grant the ability to run
containers which can be used to obtain root privileges on the
docker host.
Refer to https://docs.docker.com/engine/security/security/#docker-daemon-attack-surface
for more information.