Closed christian-rauch closed 10 months ago
Those are problems in your system configuration, not issues with this repo. If you use useradd
or adduser
your user will get added to /etc/subuid
automatically.
Those are problems in your system configuration, not issues with this repo. If you use
useradd
oradduser
your user will get added to/etc/subuid
automatically.
It's very likely that the native system is missing some configuration. In this case, I would still like to figure out why the action is not working and how this can be fixed, potentially adding this to the documentation.
However, for the Docker container pipeline, I guess that such configuration issues should not apply since the (official) Ubuntu Docker images should have the users (the root user in this case) in place.
It's very likely that the native system is missing some configuration. In this case, I would still like to figure out why the action is not working and how this can be fixed, potentially adding this to the documentation.
Sounds like a good addition to the FAQ, yes. Can you send a PR?
However, for the Docker container pipeline, I guess that such configuration issues should not apply since the (official) Ubuntu Docker images should have the users (the root user in this case) in place.
The action will most likely not work, as far as I know Docker does not support the user namespaces used in the action.
Sounds like a good addition to the FAQ, yes. Can you send a PR?
I can share my insights but I may not be able to send a PR with my affiliation. Sorry.
This seems to work with:
sudo usermod --add-subuids 100000-165535 --add-subgids 100000-165535 $USER
I was also able to resolve the "id mapping" issue inside the privileged Docker container:
container:
image: ubuntu:22.04
options: --privileged
by setting up the sub ids:
- name: set up sub id mapping
run: |
usermod --add-subuids 100000-165535 --add-subgids 100000-165535 $(whoami)
It's important to use $(whoami)
as env USER
is not defined for the root user.
Interesting, sounds like you give the build full root rights on your host system with that. I don't think we should advertise that as a solution.
I am running the action in two different settings: 1) natively on Ubuntu 22.04 via GitHub's self-hosted runners, 2) via a privileged (
--privileged
)ubuntu:22.04
Docker image. In both cases, I encounter failures related to "ID mapping".native:
privileged docker: