-
-
Notifications
You must be signed in to change notification settings - Fork 819
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature] non-privileged user in Docker build #684
Comments
I would love to see that feature as well. Either by allowing the --user option or by having environment variables PUID and PGID. |
I used this and it worked for a lot of use cases. There are some things that don't work when stash uses/edits system files that are owned by root. Would love to see native support for this. |
I am using |
While that's an option, it's known to cause issues from time to time so use at your own risk. |
Added a $20 bounty to this issue on OpenCollective. |
$20 bounty assigned (txn number 725161) |
I believe this causes issues with any scrapers that use py_common. I recieved this in the logs during an attempted scrape:
If you try and run the TL;DR I think stash can't create the '/.cache/pip' directory without being root |
Is your feature request related to a problem? Please describe.
at present,
stash
is running as root in the Docker container.Describe the solution you'd like
ideally, a new non-privileged user should be created to execute
stash
, so that root permissions are dropped asap.a non-root user for
stash
would agree with best practices and provide tighter security.if possible, it would be great to be able to control both UID and GID of any created file.
The text was updated successfully, but these errors were encountered: