-
**Describe the bug**
Images (at least Debian 12 variants) seem to add `/home/nonroot` layer that modifies the ownership of `/home`:
> ![image](https://github.com/user-attachments/assets/8de621fa…
-
### Ticket Contents
## Description
The basic skeletal works great as a first timer setup but now issues such as #26 and #12 involve non-trivial layers and add more IO sophistication that we cannot…
-
- [x] This is a bug report
### Expected behavior
should not return DL3002
### Actual behavior
return DL3002
### Steps to reproduce the behavior
```
FROM openjdk:11-jre-slim
USER root
…
-
This is not an issue but a query. But it could be an issue that it is not mentioned in the play store description.
I create an account using `adduser` from the (fake)root account. I am stuck there.
…
-
### What is the issue?
Given the following group, SSH and SSH tests ACL section, where communication is allowed in all ports between all devices listed below, the expected behaviour is for the SSH …
-
I have an issue with running a function in a Docker image based on Node and Go (Custom Handler). We have also enabled authentication with Microsoft as the provider. Basically, everything works until I…
-
I use the same username on most of my machines so I normally don't bother to define per-host user parameters. I encountered this error:
```
__________________________________________________________…
-
For the pu/pu image to support non-root execution (a security best practice, and supported by PKOv2), we need to add a local user to the image.
Ideally we wouldn't have separate "nonroot" images (see…
-
Why:
On namespaces with security policy, Postgres cannot be deployed as the security context cannot be customized on the CRD.
Postgres CRD allow only to setup a custom user with _spiloRunAsUser_, t…
-
When users mount their local directories and write output from jobs running in the container, it is desirable for the output to be owned by the same user running the container.