-
Notifications
You must be signed in to change notification settings - Fork 149
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Does issue with MustRunAsNonRoot and USER <user> apply to Windows? #59
Comments
Late update, sorry. After some earlier digging and testing, it appears k8s for Windows has a windows-specific method of specifying a container run-as user which according to testing, is compatible with our current method of applying non-root ownership to files for Windows images.
Source: https://kubernetes.io/docs/tasks/configure-pod-container/configure-runasusername/ Initially, Windows-builders, generated by pack, would not work with non-ContainerAdministrator users on k8s using the builder as the container image. But since this set of changes to imgutil, the builders and lifecycle operations appear to work fine, as shown in this test job example, run against a GKE 1.16.11 with a WINDOWS_LTSC node pool, using the latest sample job.yml
Output
|
Currently, the non-"root" (or non-Administrator) permissions added by imgutil for Windows image files and directories are Owner/Group = |
Summary
We need to investigate if the following issue for linux on k8s applies to Windows.
Details
Multiple users have reported an issue with the use of
USER <user>
.Issue: #44
From slack:
The following PR addresses this issue for sample linux stacks: #58
At an initial glance the solution applied to linux doesn't seem to translate directly to Windows due to the fact that UID and GID are unknown and can't be preset when creating a user. (This information was provided by @micahyoung)
Acceptance
The text was updated successfully, but these errors were encountered: