Replies: 3 comments
-
The volume is created via root of the user namespace, which you changed to be the first UID of the /etc/subuid with the line Userns: keep-id:u=%U Which tells Podman to not use the default usernamespace but an alternative one where your UID (1000) is mapped to %U in the quadlet. podman unshare cat /proc/sys/uid_map Is showing the default user namesapace, but your container was remapped to the keep-id one. In order to manipulate the volume, from your homedir, you need to enter the default user namespace with Do you want the volumes to be created with the default UID of the container? IE Your UID (1000)? and not root of the container, you could try to add
Not sure if this will work unless the container is defaulting to run as the : %U user. |
Beta Was this translation helpful? Give feedback.
-
Thank you very much for the additional explaination @rhatdan I have misunderstand that part of the userns documentation. Anyhow, that is all fine then. I do not really have to access the volumes from the host, so will leave it like it is. But then onto the second issue. Why is the "_data" folder inside created with UID 999 instead of 1000 ? (and 100999 instead of 101000 on the host)
The ovos user with UID 1000 in the container does not have permission to write to the volume? |
Beta Was this translation helpful? Give feedback.
-
Thank you. Using;
together with;
Works as expected. The volumes are created with UID 100000 and within the volume the _data folder and everything recursive underneath that with UID 101000 which resolves to the user ovos both on the host and the container. |
Beta Was this translation helpful? Give feedback.
-
Issue Description
I am using Podman to rootless run our framework containerized. For this we have the below quadlet .container file;
If I start the container with the above configuration, the Volumes are created with the first available UID from /etc/subuid and /etc/subgid
However I can not get in because of that and the _data folder inside those volumes are using starting subuid + UID -1
Also confirmed by executing into the container
As a remark the host and the container/image use the same username "ovos" and userid "1000"
Searching online does show similar issues with quadlet and volumes always quickly followed by a PR to fix it, so I am not sure this is a new bug, an old bug that has resurfaced or that I am just missing something or misconfigured something on either the podman configuration, the host or both. Hence the reason I started this issue.
Steps to reproduce the issue
Steps to reproduce the issue
Describe the results you received
The volume itself and the _data folder inside are created with uid 100000 and 101000
Describe the results you expected
I expect the volume including the _data folder inside to be created with subuid starting number + UID ( 101000 in my case )
podman info output
Podman in a container
No
Privileged Or Rootless
Rootless
Upstream Latest Release
No
Additional environment details
Custom build minimal-OS utilizing Buildroot.
https://github.com/OpenVoiceOS/ovos-buildroot
Additional information
No response
Beta Was this translation helpful? Give feedback.
All reactions