Running Docker in Docker on Windows (Linux containers)

Running Docker in Docker on Windows 1

Last Updated on June 29, 2021

If you need to run Docker within a container, or in other words Docker in Docker, this can sometimes be confusing, especially in Windows where it’s not obvious how Docker is setup. In this article, we’ll be lifting the covers on Docker for Windows and exploring how to run Docker commands in containers.

Note that we’ll be covering only Linux based containers in this article.

UPDATED in June 2021 to use the now default Docker for Windows WSL 2 engine.

How Docker works on Windows

When using Docker for Windows, also known as Docker Desktop, a Docker daemon is installed within a Windows Subsystem for Linux (WSL) 2 VM.

Commands that are run from the Docker CLI on a Windows command prompt are passed through to the Docker daemon:

If we run docker version we can clearly see the distinction here between client and server.

  • the client is the Docker CLI, running in Windows
  • the server is the Docker daemon, running in Linux
Docker version output shows Docker daemon running in Linux

Normally when building and running containers we don’t need to know about these details. Unless, of course, we want to run Docker inside Docker.

In this case, we need a way to:

  1. Install the Docker CLI in a container
  2. Get the Docker CLI to communicate with the Docker daemon running on the host
  3. Provide the container with the correct permissions to use that communication channel

Legacy Docker for Windows

Docker for Windows used to use a different virtualisation technology called Hyper-V. With the release of WSL 2, the Docker team switched to this new technology, which provides significant usability and performance improvements.

The WSL 2 engine is now the default for Docker for Windows, but this can be changed within the Docker for Windows settings.

Docker for Windows WSL 2 engine setting

All about /var/run/docker.sock

A Unix socket is a way for processes running on the same host to communicate with each other. It doesn’t involve the network, so is more lightweight than other protocols such as TCP/IP sockets. They are addressed using a filename, ending in a .sock extension.

The Docker daemon listens to a socket at /var/run/docker.sock, responding to calls to the Docker API. If we want to be able to issue Docker commands from a container, we’ll need to communicate with this socket.

Thankfully, since the Docker socket is described as a file, we can expose that file to the container as a volume when we run it, using the Docker run command’s -v option:

-v, –volume=[host-src:]container-dest[:]: Bind mount a volume.

from Docker run documentation

So if we want a container to have access to /var/run/docker.sock we’ll pass the argument -v "//var/run/docker.sock:/var/run/docker.sock" to expose the socket at the same location in the container.

Note that in Windows a leading double slash (//) is required to address the Docker socket on the host.

Portainer: a Docker in Docker example

An example of exposing /var/run/docker.sock as a volume inside Docker is when using the Docker management UI, Portainer. You can start it like this:

docker run -d -p 9000:9000 --name portainer -v "//var/run/docker.sock:/var/run/docker.sock" portainer/portainer

Windows Docker commands
All of the commands in this article have been tested with the Windows command prompt.

When you access the UI at http://localhost:9000, after setting a password it will ask you what Docker environment you want to manage. One of the options is to manage the local environment via the /var/run/docker.sock file:

With this configuration, Portainer then has access to the Windows Docker daemon, and can issue whatever commands it needs to. For example, below we can see a list of the running containers:

Running Docker in Docker as a root user

If you’re running a Docker image that runs as the root user, then all that is required is to mount /var/run/docker.sock as a volume, as in the case with Portainer above.

To illustrate this more concisely, let’s create a Docker image that extends the popular lightweight Alpine base image:

FROM alpine
RUN apk add docker

This Dockerfile simply installs the Docker CLI, which will later communicate with the Docker daemon running in our Docker for Windows setup. The Alpine base image by default uses the root user.

Build the image using docker build --tag docker-in-docker .:

This builds a Docker image called docker-in-docker.

Now we can try running a Docker command in a container started from this image, with:

docker run --rm -v "//var/run/docker.sock:/var/run/docker.sock" docker-in-docker /bin/sh -c "docker ps"

This output is showing all the containers that I have running in my installation of Docker for Windows. Everything’s working as expected! ✅

Running Docker in Docker as a non-root user

We don’t always want to run our container as root. There are many Docker images that setup an additional user, following the best practice of starting the container as a user that only has minimal permissions. An example of this is the Jenkins Docker image, which has the jenkins user.

Permission denied problems

To show the problems of using a non-root user when we want to run Docker in Docker, here’s another Dockerfile example:

FROM alpine
RUN apk add docker
RUN adduser -D tom
USER tom
  • we’re installing Docker on top of the Alpine Linux base image, as before
  • we’re adding a user called tom with no password (the -D option)
  • the USER instruction means that when the image is run any commands should be run as tom

Let’s build the image with docker build --tag docker-in-docker-non-root ., similar to the previous example.

Now run it with docker run --rm -v "//var/run/docker.sock:/var/run/docker.sock" docker-in-docker-non-root /bin/sh -c "docker ps"

Unfortunately this time we get a permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock error:

Permission denied error accessing /var/run/docker.sock as a non-root user

It seems like we don’t have permission to access /var/run/docker.sock. 🔒

Using --group-add to provide access to /var/run/docker.sock

The problem we have can be highlighted by running the same docker run command as before, but this time we’ll run ls -l on /var/run/docker.sock:

docker run --rm -v "//var/run/docker.sock:/var/run/docker.sock" docker-in-docker-non-root /bin/sh -c "ls -l /var/run/docker.sock"

Permissions of /var/run/docker.sock

We can see here that the file is owned by the root user and also the root group. It’s no wonder that we can’t access it.

To fix this, let’s use the --group-add argument to run a Docker image with additional groups for the user.

–group-add: Add additional groups to run as

from Docker run documentation

The root group has id 0, so to illustrate this working, let’s use the --group-add 0 argument then run the groups command in the container to see which groups we belong to.

docker run --rm --group-add 0 docker-in-docker-non-root /bin/sh -c "groups"

Docker in Docker groups

We can clearly see here that tom is now a member of both the tom and root groups.

Now let’s try to run Docker in Docker again, adding the --group-add argument:

docker run --rm --group-add 0 -v "//var/run/docker.sock:/var/run/docker.sock" docker-in-docker-non-root /bin/sh -c "docker ps"

Running Docker in Docker as a non-root user

Awesome! So we’ve got a way to run Docker in Docker as a non-root user too. ✅

Double check the group id

In the above example the group id is assumed to be 0. If you’re having any issues, or you just want to double check it, you can generate the group id with this command:

docker run --rm -v /var/run/docker.sock:/var/run/docker.sock alpine stat -c %g /var/run/docker.sock

Running Docker in Docker with Jenkins

When building images using a continuous integration server, such as Jenkins, we’ll need to run Docker in Docker in order to use the Docker daemon of the host. A Jenkins Docker container starts with the jenkins user, so let’s try the techniques learnt in this article by:

  • installing the Docker CLI in Jenkins
  • mounting a volume to allow access to the Docker socket
  • adding the root group to the Jenkins user

To install the Docker CLI we’ll use this Dockerfile:

FROM jenkins/jenkins:2.289.1-jdk11

USER root
RUN curl -sSL https://get.docker.com/ | sh
USER jenkins
  • we have to temporarily switch to the root user to install Docker
  • we run a Docker install script
  • we switch back to the jenkins user

Build this image with docker build --tag docker-in-docker-jenkins ..

Start Jenkins with docker run --rm --group-add 0 -v "//var/run/docker.sock:/var/run/docker.sock" -p 8080:8080 --name jenkins docker-in-docker-jenkins:

Docker in Docker Jenkins startup

Now let’s issue a Docker command to Jenkins using docker exec jenkins docker ps:

All good. So now we can create Jenkins jobs to build or run Docker images!

Security considerations

How secure is using --group-add 0?

Short answer, not very. Essentially we’re adding the user to the root group which means that any files owned by the root group may be read/write/executable by the user. It’s not as bad as running the container as the root user, but it’s probably not far off.

Unfortunately, when running containers such as Jenkins there’s no better alternative that I’ve found so far in Docker for Windows. Fortunately, most people running Docker containers in Windows are doing so for for development, rather than production purposes.

Also bear in mind that any risk of container breakout, where the container gets full access to the host machine, is mitigated by the fact that the Docker daemon in Docker for Windows is running inside a virtual machine.

Final thoughts

You’ve seen how it’s possible to run Docker in Docker on Windows by mounting the Docker socket inside the container. This works straightaway for containers running as root, but for those running as a non-root user we can use the --group-add argument to setup the required permissions.

These techniques are helpful when running Linux containers in a Windows environment, such as Portainer and Jenkins.

If you want to build Docker images in Jenkins without having to provide access to Docker, why not check out Using Jenkins and Kaniko to build Docker images in AWS?

Get the newsletter

Found this article helpful? Subscribe for monthly updates.

✅ All of my latest articles for the month
✅ Access to video tutorials
✅ Exclusive tips not found on my website

Resources

DOCKER
Read the official docs about Docker Desktop for WSL 2
For more info on Dockerfile instructions, check out these docs

VIDEO
If you prefer to learn in video format then check out the accompanying video below. It’s part of the Tom Gregory Tech YouTube channel.

Running Docker in Docker on Windows (Linux containers)

2 thoughts on “Running Docker in Docker on Windows (Linux containers)

  1. Hi Tom,
    I am new to Docker and I followed all the steps that you have explained to build a docker image of Jenkins. When I ran the container (docker in docker) and tried to run the “docker ps” command inside the container, I am getting the following error: “Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Get http://%2Fvar%2Frun%2Fdocker.sock/v1.40/containers/json: dial unix /var/run/docker.sock: connect: permission denied”. Any help would really be appreciated.

    Please let me know if you need any further information in order to investigate the problem.

    Thanks in advance.

  2. You don’t have permission to access the socket. As mentioned in the article, does your user have root permissions?

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to top

Get the newsletter

Found this article helpful? Subscribe for monthly updates.

✅ All of my latest articles for the month
✅ Access to video tutorials
✅ Exclusive tips not found on my website