-
Notifications
You must be signed in to change notification settings - Fork 271
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Non root user "breaks" dokku-volume #133
Comments
Yeah this is interesting. My initial reaction is it should be solved in On Tue, Feb 10, 2015 at 11:08 AM, Michael Hobbs [email protected]
Jeff Lindsay |
I definitely agree in principle. On a more meta level, I'm not sure how to allow container RW access to a volume without opening it up to all users since the container user doesn't map to a host user.... |
An idea from IRC...what if buildstep ( |
Exported how? On Tue, Feb 10, 2015 at 11:33 AM, Michael Hobbs [email protected]
Jeff Lindsay |
Though I suppose the |
If the accepted pattern is to run everything through |
Oh I see. Interesting. On Tue, Feb 10, 2015 at 11:39 AM, Michael Hobbs [email protected]
Jeff Lindsay |
I feel it would be useful to have the ability to control the uid/gid within the container - in addition to the values being exported. I'm facing an issue whereby I would like to create a Data Volume container to share data between two containers, however I am facing two problems:
|
I worked around the problem in dokku-volume with a horrible-hack: alessio/dokku-volume@d4a58b6 When you create a data volume for an app, the plugin creates the host's data directory with the dokku user as owner - that is not bad per se, afterwards the plugin didn't manage to make it writable for the container's user (is it a limitation of Docker? Dunno, it provides the '-v' option with the ':ro' flag to access data within containers read-only, however Docker's docs do never mention things like data volumes's ACLs) as the former doesn't know anything about the latter. Shortly: FWIW I second @michaelshobbs's idea to export BUILDSTEP_{GROUP,USER} Post-Scriptum: Once this is sorted, it would be great to see dokku taking the responsibility to handle data volumes rather than delegating to external plugins, but that is another story though. |
Any progress on this? |
@progrium bump. what's the new world view on this topic? |
Wasn't sure where this should go, so I'm starting here.
When the non-root user feature came to be,
/exec
was modified tochown -R <user>:<group> /app
but we do not have a way to extend this behavior to other mounted volumes in dokku (and I assume any other extension of buildstep)...example:
Should this be solved once in buildstep vs. several times throughout the plugin community or is this out of scope?
Currently dokku-logging-supervisord implemented a solution like this.
Just to throw an initial spitball out, what if plugins set/update a config variable that is a list of container paths and
/exec
chowns those as well?The text was updated successfully, but these errors were encountered: