-
Notifications
You must be signed in to change notification settings - Fork 5.9k
Run as rootless container like it is allowed in Docker ver 20.10 and Podman #3715
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@PavelSosin-320 could you please elaborate on why you want these changes? Thank you! |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no activity occurs in the next 5 days. |
Presumably because it is a standard practice in corporate clusters to avoid running containers as root. Platforms like Openshift and OKD will by default disallow running containers with elevated privileges (dropping nearly all capabilities) and even randomize runtime user IDs for containers, separately for each user namesapce. This has always restricted the choice of IDEs that are available in such environments. See also points 1 and 2 here: https://sysdig.com/blog/dockerfile-best-practices/
|
Currently most of the entrypoint.sh script requires root at runtime. The main (and only justifiable for an IDE) reason for root here is the need to support |
Get rid Docker, server, and root user use.
The gaps are:
The text was updated successfully, but these errors were encountered: