Dan Kolepp
Dan Kolepp
No - actually it is quite compliant. Rootless containers map UID zero to a user namespace UID. This means that’s UID 0 in the container corresponds to UID of the...
Does pre-commit have a config file, that the library could read, to decide if it should leave out the “-u” option? On Mon, Dec 16, 2019 at 5:13 PM Dan...
What about if the local docker daemon is setup as so: https://docs.docker.com/engine/security/rootless/ Pretty sure the above approach by docker is using the same set of linux kernel features that podman...
Yep - I'll give it go!
Update: I installed docker 19.03 on Centos 7.7 using the instructions found here: https://docs.docker.com/engine/security/rootless/#prerequiresites This allows the docker daemon to run as a non-root user. This mode allows the docker...
I'm happy to submit a PR. Would like some ideas about what is "acceptable" for a contribution. As you say, ideally there is some way to detect rootless vs privileged,...
Update: `podman system info` produces a YAML file that has a readable key for "rootless". Am going to check docker for this too...
This is intentional moving forward with containers - that all containers are set to UID 0 inside the container, and the container runtime takes care of security and sandoxing the...
@asottile - yes I do! I try and find some time to tackle it.
I agree with @jlozadad - almost all other software development projects (Java, Python, Ruby, NodeJS, etc.) separate dependencies into their own software repository. By doing so, it ensures that the...