-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: non root user container #1202
Conversation
MegaLinter status: ✅ SUCCESS
See errors details in artifact MegaLinter reports on CI Job page |
Codecov Report
@@ Coverage Diff @@
## master #1202 +/- ##
==========================================
+ Coverage 57.50% 61.46% +3.95%
==========================================
Files 32 40 +8
Lines 4594 5484 +890
==========================================
+ Hits 2642 3371 +729
- Misses 1729 1843 +114
- Partials 223 270 +47
📣 Codecov can now indicate which changes are the most critical in Pull Requests. Learn more |
Test added, ready for testing |
Why. You can inspect image straight from API |
Good point. |
Co-authored-by: R <[email protected]>
You can decide wether we want to go with my current approuch |
Just a note here, the Other than that I'd like your approach. |
The only images that could not have it would be distroless images.
Not sure I understand. If you mean reading As for the PR, I'm unsure about it. |
Right, but that is currently possible (not sure if that will work on github.com with custom runners).
Nevermind. I thought it might be an option for users to define the user to run act with (e.g. |
It is also possible that I can deliberately break my OS ony my PC. I don't think supporting distroless-like images as GitHub runners would be ever a good idea.
Possible but as I mentioned, I've tried for a long time to not open that can of worms which is different UIDs/GIDs as it needs to be well thought through and tested or it will bring more pain due to containers/host permissions being not fun to work with. |
I don't think that this change will prevent any currently working container distroless / broken from beeing used in act.
|
@ChristopherHX this pull request has failed checks 🛠 |
What is changed
id
posix tool after starting any container to get the current container uid / gid, otherwise assume root without failing, fails for docker actionsCloses #398
Closes #935