mirror of
https://github.com/containers/podman.git
synced 2025-10-25 02:04:43 +08:00
podman: drop checking valid rootless UID
do not check whether the specified ID is valid in the user namespace.
crun handles this case[1], so the check in Podman prevents to get to
the OCI runtime at all.
$ podman run --user 10:0 --uidmap 0:0:1 --rm -ti fedora:33 sh -c 'id; cat /proc/self/uid_map'
uid=10(10) gid=0(root) groups=0(root),65534(nobody)
10 0 1
[1] https://github.com/containers/crun/pull/556
Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
This commit is contained in:
@ -424,11 +424,6 @@ func (c *Container) generateSpec(ctx context.Context) (*spec.Spec, error) {
|
||||
}
|
||||
|
||||
if c.config.User != "" {
|
||||
if rootless.IsRootless() {
|
||||
if err := util.CheckRootlessUIDRange(execUser.Uid); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
// User and Group must go together
|
||||
g.SetProcessUID(uint32(execUser.Uid))
|
||||
g.SetProcessGID(uint32(execUser.Gid))
|
||||
|
||||
Reference in New Issue
Block a user