Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ensure single UID is used inside containers #69

Merged
merged 2 commits into from
Aug 27, 2024
Merged

Ensure single UID is used inside containers #69

merged 2 commits into from
Aug 27, 2024

Commits on Aug 27, 2024

  1. base: disable APT sandbox.

    APT uses a _apt user by default for handling its files in the
    filesystem. When subuid and subgid are not set, most APT command will
    fail, since setgroups, setegid and seteuid syscalls will not succeed.
    Disable APT sandbox as it is not strictly required inside containers.
    henriquesimoes committed Aug 27, 2024
    Configuration menu
    Copy the full SHA
    49d73fc View commit details
    Browse the repository at this point in the history
  2. ioc: disable APT sandbox.

    IOC containers do not require multiple users, and thus they are commonly
    deployed without subuid and subgid to avoid creating files in volumes
    mapped to the host filesystem with a uid/gid not possible to be handled
    by its user outside the namespace. However, this breaks APT default
    configuration due to its sandbox user `_apt`. Disable its sandbox so
    that we can use APT in such deployment environments.
    henriquesimoes committed Aug 27, 2024
    Configuration menu
    Copy the full SHA
    fa37769 View commit details
    Browse the repository at this point in the history