Replies: 2 comments
-
Hey @asmacdo, I am not aware of what the exact purpose of Regarding your questions:
Unless there's a good reason not to do that, I don't see why that would be a problem.
I don't think we have anything specific on our docs about requirements for the images, but you can take a look at the nebari-docker-images repo to see what things are being installed and how they're being configured. If you need to build custom images for your deployment, I'd suggest building them on top of these ones as they are the ones we test and support.
My guess is we're using |
Beta Was this translation helpful? Give feedback.
-
@marcelovilla @asmacdo The use of Since Nebari provisions users dynamically, managed via Keycloak, we need a way to define those users within the JupyterLab container so that file permissions, group-based access (e.g., shared folders), and kernel interactions behave correctly. Rather than modifying the container image or creating system users manually, This mechanism has been part of our ecosystem for over five years. Disabling it may lead to unexpected behavior in permission handling, Conda environment resolution, or kernel spawning. While plans have been made to migrate some of these responsibilities from the container image into application logic using tools like skel files, There is another open issue that might touch on this requirement in the future |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
We are using custom jupyterhub images that does not have
libnss-wrapper
installed.When I launch a user pod and open a terminal in jupyterhub, I see (maybe 20x):
This requirement seems to be hardcoded in the profiles
nebari/src/_nebari/stages/kubernetes_services/template/modules/kubernetes/services/jupyterhub/files/jupyterhub/03-profiles.py
Line 347 in 86d5d08
Questions:
Beta Was this translation helpful? Give feedback.
All reactions