-
Notifications
You must be signed in to change notification settings - Fork 403
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(dev): fix uid/gid mapping for non-vscode devs #3981
Conversation
I still see these errors when I build a new container with
and later on
and then finally
But despite the above, the container works again! |
@larseggert I'm looking into the first one (groupmod error). For the yarn warnings, they can be ignored. Some parcel packages are simply using different versions of the same dependency and yarn is warning us about it. It doesn't prevent the packages from installing and being used. As for the last one, that error is coming from bash / zsh directly (running |
The groupmod error should be silenced now (group already exists and mapped) and allow the build to continue. I wasn't able to figure out where exactly is the nvm command is triggered (happens when calling |
I think this change causes python modules to be installed in |
I think we should enable CI for changes like this to catch these issues. |
@larseggert It wouldn't catch anything since the dev and test images are completely different. The test image runs as root (while the dev image does not) and is based off the leaner python image (rather than the vscode dev python image). |
Ah. We'll, then you should run the tests manually :-) |
I just ran the tests and didn't get any pyang errors. I can also see Have you rebuilt the container? |
I think I did. Maybe merge this and see if issues remain? |
I think it would be good if changes to the dev container configs triggered a separate kind of CI test if possible - one that would be slow, of course, because it should build the affected container(s) from scratch and exercise them to the point that at least |
The dev container is now leaking permission changes out onto the host, which is really not ok for many reasons, but just to point at one:
|
The permissions change leak happens when running as root on the host, which no dev should be in theory? It happens because of this line: which I guess could technically be removed if we assume the host user id and container user id are the same... |
No description provided.