Replies: 3 comments 12 replies
-
rootless Podman is entering a user namespace before configuring and launching the container. Your App must be setuid to launch or process with a separate UID,without using the user namespace. |
Beta Was this translation helpful? Give feedback.
3 replies
-
|
Beta Was this translation helpful? Give feedback.
0 replies
-
What do you see? |
Beta Was this translation helpful? Give feedback.
9 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hello!
I've built podman & all its dependencies (e.g. crun, slirp4netns, etc.) for an embedded project I have and compared to any other traditional installation (e.g. Fedora, Ubuntu), when using
podman run --user someuid:somegid ...
the process running inside the container still shows up as owned by the host user (unprivileged) which started the container.e.g.:
Fedora, expected behavior

My project:

I would've expected to see the UID change to that which was specified (of course, subuid+offset) as it happens in Fedora/Ubuntu.
I am still digging around to understand what is different in my setup compared to a traditional distro installation.
Do you have any ideas?
Thank you!
Beta Was this translation helpful? Give feedback.
All reactions