New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Docker toolchain build artifacts are created under the root user on Linux #175
Comments
Okay so this is because we are invoking the toolchain that, by default, runs as root and the mounted volume ends up written by root. It looks like we are missing something to the tune of @jagger27 not sure what would be the Go-ism for pulling the currently executing UID/GID from the environment here (or maybe we want to sample the owner/group of the project directory and use those?), but otherwise would be happy to give this PR a Go (hehe). |
Discussed this in chat. The error is Linux-specific, as Docker on Mac OS uses NFS mounts which just "happened to work correctly here". There were previous attempts on fixing this, but we should explore if the Me (and @jagger27) will do some testing, if going rootless doesn't break the toolchains than we will try to find a way to get this fixed. |
Current draft PR (see above) fixes the issue and the breakage introduced in the Rust builder image, will need to make sure the rest of the images are working. |
I'm seeing a weird issue on Linux (Ubuntu 20.04, running as my own user
flaki
) wheresubo build .
would use the docker build method to build the Rust runnables, and while therunnables.wasm.zip
bundle comes out perfectly fine (flaki:flaki
user/group), the build artifacts end up in folders that areroot:root
-owned and cannot be deleted without usingsudo
.As a result,
subo clean
fails also without asudo
:The text was updated successfully, but these errors were encountered: