-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Permissions inside container result in root owned files externally #1
Comments
I will try to get a workaround for it, but it seems hard at the moment. moby/moby#3124 |
Hmmm, yeah that is tough. If there's a way we can pass the container our uid/gid and just chown the files, that might be an option. |
We could save them in /import/ and before we kill ipython (in the monitor_traffic script) we could chmod the entire /import/ directory.... uh dirty ... |
That's actually a decent suggestion:
Therefore, chowning them once we're done is perfectly acceptable. Thoughts? |
Thinking about that a little bit more, is there any reason why we can't delete all from within docker? |
No reason we couldn't do that, especially if we're doing persistence via creation of a new galaxy history element. Let's clean up properly after ourselves. On July 26, 2014 1:35:59 PM CDT, "Björn Grüning" notifications@github.com wrote:
Sent from my Android device with K-9 Mail. Please excuse my brevity. |
Let's see if that fixes the problem: 43c8ac8 |
Works correctly except if the container was intentionally killed before shutdown. This is completely acceptable. |
The notebook process runs as root internally, so whenever it generates checkpoints, those retain those permissions in the shared directory, and as a result cannot be cleaned up by galaxy.
The text was updated successfully, but these errors were encountered: