-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
podman: add uid and gid options to keep-id #15389
Merged
openshift-merge-robot
merged 3 commits into
containers:main
from
giuseppe:userns-map-user
Aug 31, 2022
+138
−180
Merged
Changes from all commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
#### **--userns**=*mode* | ||
|
||
Set the user namespace mode for the container. It defaults to the **PODMAN_USERNS** environment variable. An empty value ("") means user namespaces are disabled unless an explicit mapping is set with the **--uidmap** and **--gidmap** options. | ||
|
||
This option is incompatible with **--gidmap**, **--uidmap**, **--subuidname** and **--subgidname**. | ||
|
||
Rootless user --userns=Key mappings: | ||
|
||
Key | Host User | Container User | ||
----------|---------------|--------------------- | ||
"" |$UID |0 (Default User account mapped to root user in container.) | ||
keep-id |$UID |$UID (Map user account to same UID within container.) | ||
auto |$UID | nil (Host User UID is not mapped into container.) | ||
nomap |$UID | nil (Host User UID is not mapped into container.) | ||
|
||
Valid _mode_ values are: | ||
|
||
**auto**[:_OPTIONS,..._]: automatically create a unique user namespace. | ||
|
||
The `--userns=auto` flag, requires that the user name `containers` and a range of subordinate user ids that the Podman container is allowed to use be specified in the /etc/subuid and /etc/subgid files. | ||
|
||
Example: `containers:2147483647:2147483648`. | ||
|
||
Podman allocates unique ranges of UIDs and GIDs from the `containers` subordinate user ids. The size of the ranges is based on the number of UIDs required in the image. The number of UIDs and GIDs can be overridden with the `size` option. | ||
|
||
The rootless option `--userns=keep-id` uses all the subuids and subgids of the user. Using `--userns=auto` when starting new containers will not work as long as any containers exist that were started with `--userns=keep-id`. | ||
|
||
Valid `auto` options: | ||
|
||
- *gidmapping*=_CONTAINER_GID:HOST_GID:SIZE_: to force a GID mapping to be present in the user namespace. | ||
- *size*=_SIZE_: to specify an explicit size for the automatic user namespace. e.g. `--userns=auto:size=8192`. If `size` is not specified, `auto` will estimate a size for the user namespace. | ||
- *uidmapping*=_CONTAINER_UID:HOST_UID:SIZE_: to force a UID mapping to be present in the user namespace. | ||
|
||
**container:**_id_: join the user namespace of the specified container. | ||
|
||
**host**: run in the user namespace of the caller. The processes running in the container will have the same privileges on the host as any other process launched by the calling user (default). | ||
|
||
**keep-id**: creates a user namespace where the current rootless user's UID:GID are mapped to the same values in the container. This option is not allowed for containers created by the root user. | ||
|
||
Valid `keep-id` options: | ||
|
||
- *uid*=UID: override the UID inside the container that will be used to map the current rootless user to. | ||
- *gid*=GID: override the GID inside the container that will be used to map the current rootless user to. | ||
|
||
**nomap**: creates a user namespace where the current rootless user's UID:GID are not mapped into the container. This option is not allowed for containers created by the root user. | ||
|
||
**ns:**_namespace_: run the <<container|pod>> in the given existing user namespace. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -708,49 +708,7 @@ Without this argument, the command will run as the user specified in the contain | |
|
||
When a user namespace is not in use, the UID and GID used within the container and on the host will match. When user namespaces are in use, however, the UID and GID in the container may correspond to another UID and GID on the host. In rootless containers, for example, a user namespace is always used, and root in the container will by default correspond to the UID and GID of the user invoking Podman. | ||
|
||
#### **--userns**=*mode* | ||
|
||
Set the user namespace mode for the container. It defaults to the **PODMAN_USERNS** environment variable. An empty value ("") means user namespaces are disabled unless an explicit mapping is set with the **--uidmap** and **--gidmap** options. | ||
|
||
Rootless user --userns=Key mappings: | ||
|
||
Key | Host User | Container User | ||
----------|---------------|--------------------- | ||
"" |$UID |0 (Default User account mapped to root user in container.) | ||
keep-id |$UID |$UID (Map user account to same UID within container.) | ||
auto |$UID | nil (Host User UID is not mapped into container.) | ||
nomap |$UID | nil (Host User UID is not mapped into container.) | ||
|
||
Valid _mode_ values are: | ||
|
||
**auto**[:_OPTIONS,..._]: automatically create a unique user namespace. | ||
|
||
The `--userns=auto` flag, requires that the user name `containers` and a range of subordinate user ids that the Podman container is allowed to use be specified in the /etc/subuid and /etc/subgid files. | ||
|
||
Example: `containers:2147483647:2147483648`. | ||
|
||
Podman allocates unique ranges of UIDs and GIDs from the `containers` subordinate user ids. The size of the ranges is based on the number of UIDs required in the image. The number of UIDs and GIDs can be overridden with the `size` option. | ||
|
||
The rootless option `--userns=keep-id` uses all the subuids and subgids of the user. Using `--userns=auto` when starting new containers will not work as long as any containers exist that were started with `--userns=keep-id`. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This line does not appear in any other file (podman-create, podman-kube-play) and was not selected for the final winner. |
||
|
||
Valid `auto` options: | ||
|
||
- *gidmapping*=_CONTAINER_GID:HOST_GID:SIZE_: to force a GID mapping to be present in the user namespace. | ||
- *size*=_SIZE_: to specify an explicit size for the automatic user namespace. e.g. `--userns=auto:size=8192`. If `size` is not specified, `auto` will estimate a size for the user namespace. | ||
- *uidmapping*=_CONTAINER_UID:HOST_UID:SIZE_: to force a UID mapping to be present in the user namespace. | ||
|
||
**container:**_id_: join the user namespace of the specified container. | ||
|
||
**host**: run in the user namespace of the caller. The processes running in the container will have the same privileges on the host as any other process launched by the calling user (default). | ||
|
||
**keep-id**: creates a user namespace where the current rootless user's UID:GID are mapped to the same values in the container. This option is not allowed for containers created by the root user. | ||
|
||
**nomap**: creates a user namespace where the current rootless user's UID:GID are not mapped into the container. This option is not allowed for containers created by the root user. | ||
|
||
**ns:**_namespace_: run the container in the given existing user namespace. | ||
|
||
**private**: create a new namespace for the container. | ||
This option is incompatible with **--gidmap**, **--uidmap**, **--subuidname** and **--subgidname**. | ||
@@option userns.container | ||
|
||
@@option uts.container | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This text loses out. Someone please double-check that the new text is applicable to kube-play.