Need to make sure that `arbitrary-users-patch` images work on OpenShift v4
See original GitHub issueWe have to do arbitrary-users-patch
[1] of the community images been supported on OpenShift. During the discussion on https://github.com/openshift/origin/issues/23369 it appeared to be that CRI-O now has support for adding the entry of the user to the /etc/password if it does not exists in /etc/passwd.
Assuming that CRI-O is the default contianer engine for OpenShift v4 we need to verify that our patched images work correctly on both OpenShift v3 and OpenShift v4 and there are no side-effects.
[1] https://github.com/eclipse/che-devfile-registry/tree/master/arbitrary-users-patch
Issue Analytics
- State:
- Created 4 years ago
- Comments:10 (10 by maintainers)
Top Results From Across the Web
Images OpenShift Container Platform 4.6 | Red Hat Customer ...
The image stream and its tags allow you to see what images are available and ensure that you are using the specific image...
Read more >Managing Images | OpenShift Container Platform 3.11
There are many ways you can interact with images and set up image streams, depending on where the images' registries are located, any...
Read more >Setting up an image registry - IBM Cloud Docs
Private registries are a good choice to protect your images from unauthorized users. Private registries must be set up by the cluster administrator...
Read more >Configuring GitLab Runner on OpenShift
As a result, the build image used in the job would need to run as a non-root user to be able to complete...
Read more >Setup CodeReady Containers for OpenShift 4.x with internal ...
Download and install CrC · Gaining access to the internal image registry. Instruct CrC to accept an insecure registry; Instruct Docker to accept ......
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Have tested with the following devfiles form the registry against OCP v4 and was not able to spot any issues:
java-maven
- https://github.com/eclipse/che-devfile-registry/tree/master/devfiles/java-mavengo
- https://raw.githubusercontent.com/eclipse/che-devfile-registry/master/devfiles/go/devfile.yamlpython
- https://raw.githubusercontent.com/eclipse/che-devfile-registry/master/devfiles/python/devfile.yamlphp-web-simple
- https://raw.githubusercontent.com/eclipse/che-devfile-registry/master/devfiles/php-web-simple/devfile.yamlBasically, all the workspaces started from those devfiles have a dedicated
/etc/passwd
entry andwhoami
returnuser
, wittid
like uid=1000820000(user) gid=0(root) groups=0(root),1000820000@rhopp @l0rd I believe we can close this issue as done.
@ibuziuk cool!