ignore_chown_errors implications #17226
ebryerwork
started this conversation in
General
Replies: 1 comment
-
The problem is 1, users might assume that there are more then on user within the container, having a non root user for example. Running a container with --user=XYZ will blow up. If you do a podman build it is likely to blow up, since the ignore_chown is only happening during the pull. If a process within the container attempts a chown it will blow up. This flag was added specifically for HPC environments where they do not worry about these issues and tend to run containers with only a single UID. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I'm curious to know under what circumstances using
--storage-opt=ignore_chown_errors=true
will cause a problem. I should say up front that I'm ok with all the container processes running on the host system as the user who called podman. I'll be using a stock Alpine, Ubuntu, or UBI image that will run the program lmgrd in the container. So far, I've found that alpine, ubuntu and ubi work, but ubi-init (has systemd) crashes. Here is what I've found regarding ignore_chown_errors:I read at https://docs.podman.io/en/latest/markdown/podman.1.html
And at https://github.com/containers/storage/blob/main/docs/containers-storage.conf.5.md
And at https://www.redhat.com/sysadmin/controlling-access-rootless-podman-users
And I see when running the podman command
The last quote, a warning message, mentions network users, but I don't understand why. What's different about a network user here? All this leaves it a little bit open as to what might cause a problem. It would be great is someone could explain in a bit more detail.
Beta Was this translation helpful? Give feedback.
All reactions