-
-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deployment as Non-Root - CHOWN capability problems #112
Comments
Hi, I was having the same issue in my cluster and by applying the workaround the pod stopped from going into a crash loop. Regardless, it seems that when you try to create a lane or a card, the server tries to execute a chown, which still produces an error I think that it will be easier to change the user of the container which executes all commands to other than root, so when the directories/files are created they have already assign the correct owner I am making tests in a local environment with docker by using the flag Great app btw |
I dont seem to have that issue @jgomez14 . Exploring the filesystem shows proper owner ownership by my user code of 568. I would be concerned that the deployment isn't correct or the persistent storage backing the deployment is creating new files with the wrong owner. Can you share your deployment.yaml? |
Hi, while reviewing the deployment and pod i discover that for some reason, one of the PUID/PGID env variables was not loaded into the pod and that was the cause of the problem. After deployment recreation all works fine. I have also set a security context for executing the pod as a regular user instead of root, but I don't know if it is neccesary. The env variables and security context is set to 1000:1000 ids. This is the deployment:
Thank you! |
Thanks for creating this app.
Wanted to share my experience with the deployment of this application in my K3S cluster;
Bascially, the Entry point of this application uses the chown to ensure that files within the container are owned by the ENV provided PUID and PGID.
For some reason, K3S would not allow the usage of chown, while not allowing privilaged access to the container. This would cause the container to continously restart.
After ensuring, that copying from the image to the task/config directories retained/set the PUID/PGID correctly, the following overrides were placed in the deployment.yaml
additionally some logs were provided to see if any point failed.
The text was updated successfully, but these errors were encountered: