It's about a rather technical issue in using docker containers that interact with the docker host computer, generally related to using the host filesystem inside the container.
That happens in particular in reproducible research context.
I developed an opensource utility that helps tackling that issue.
The initial and main use case of a docker container: a self-contained application that only interacts with the host system with some network ports.
Think of a web application: the docker container typically contains a web server and a web application, running for example on port 80 (inside the container). The container is then run on the host, by binding the container internal port 80 to a host port (e.g. 8000).
Then the only interaction between the containerized app and the host system is via this bound network port.
Containers as execution environments are completely different:
But, in order to use those execution environments, those containers must have access to the host system, in particular to the host user filesystem.
Suppose you have containerized an IDE, e.g. Rstudio.
Your Rstudio is installed and running inside the docker container, but it needs to read and edit files in your project folder.
For that you bind mount your project folder (in your host filesystem) using the docker run --volume option.
Then your files are accessible from withing the docker container.
The challenge now are the file permissions. Suppose your host user has userid 1001, and suppose that the user owning the Rsudio process in the container is either 0 (root), or 1002.
If the container user is root, then it will have no issue in reading your files.
But as soon as you edit some existing files, are produce new ones (e.g. pdf, html), these files will belong to root also on the host filesystem!.
Meaning that your local host user will not be able to use them, or delete them, since they belong to root.
Now if the container user id is 1002, Rstudio may not be able to read your files, edit them or produce new files.
Even if it can, by settings some very permissive permissions, your local host user may not be able to use them.
Of course one bruteforce way of solving that issue is to run with root both on the host computer and withing the docker container. This is not always possible and raise some obvious critical security concerns.
Because we can not know in advance what will be the host userid (here 1001), we can not pre-configure
the userid of the docker container user.
docker run now provides a --user option that enables to create a pseudo user with some supplied userid
at runtime. For example, docker run --user 1001 ... will create a docker container running with processes
belonging to a user with userid 1001.
So what are we still discussing this issue? Isn't it solved?
Here some quirks about that dynamically created user:
これらの問題を回避することはできますが、退屈でイライラする可能性があります。
私たちが本当に望んでいるのは、Docker コンテナ ユーザーを事前設定し、
実行時... でその userid を動的に変更できるようにすることです。
docker エントリポイント として使用することを目的としたオープン ソース ユーティリティです。 使用方法を見てみましょう: これを docker ENTRYPOINT として設定し、使用するユーザーを指定し、その
userid を動的に変更します:
リーリー
用語を正確に言いましょう:
target
ユーザーIDが(すでに)
target
小さな実行可能ファイル (17k) をビルドまたはダウンロードします
短いメモをいくつか入れました https://github.com/kforner/docker_userid_fixer#how-it-works
でも、言い換えてみます に対してのみその特権実行を有効にします。
docker_userid_fixerプログラム、そしてそれは非常に短期間です。
リクエストされたユーザー (およびユーザー ID) に送信します。
これらのトピック (Docker、再現可能な研究、R パッケージ開発、アルゴリズム、パフォーマンスの最適化、並列処理など) に興味がある場合は、仕事やビジネスの機会について話し合うために、お気軽に私に連絡してください。
The above is the detailed content of an elegant way to fix user IDs in docker containers using docker_userid_fixer. For more information, please follow other related articles on the PHP Chinese website!