You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This paves the way for spawning per-job tasks containers from the
container (via `job-runner`).
Getting the permissions right is unfortunately annoyingly complicated, as the
host's socket has 660 permissions, but the tasks container runs as uid 1111.
Ideally we could use something like
-v "${XDG_RUNTIME_DIR:-/run}/podman/podman.sock:/podman.sock:idmap=gids=$(id -g)-1111-1"
but that fails with "invalid mappings", and is generally not well documented.
`--mount=type=bind,[...],idmap --uidmap [...]` does not work either.
So resort to adding an ACL for user 1111 to the host. This is fine for
production hosts (where the secrets etc. are all already chmod'ed to the
container user), and does not hurt too much for a human developer: The socket
itself may be accessible to uid 1111 (which *might* be an untrusted local
user), but its directory (/run/user/uid) is not.
0 commit comments