Was just struggling to test #3337 because of issues mounting my augur.json and logs directories into the container environment (podman) for testing. While this was an issue on my somewhat uncommon setup, it made me realize:
podman and docker have fundamentally different viewpoints when it comes to permissions and security. Docker's rootful model generally defaults to running as root and passing through mounted directories with the same permissions (uid, gid, etc) as they exist on the host machine. In other words it's a fundamentally trusting environment.
Podman on the other hand, doesn't trust things by default, and instead runs containers in userspace, mapping the users in the container to high uid numbers on the host.
As more and more people are going to want to customize their configs with the augur.json file starting in this release, especially with all the new config options, It may be worth stepping through that usecase in both podman and docker to ensure the permissions and security models of both are able to work as designed and we can either a) fix, or b) document the steps needed to mount a custom config on both container environments.
Was just struggling to test #3337 because of issues mounting my
augur.jsonand logs directories into the container environment (podman) for testing. While this was an issue on my somewhat uncommon setup, it made me realize:podman and docker have fundamentally different viewpoints when it comes to permissions and security. Docker's rootful model generally defaults to running as root and passing through mounted directories with the same permissions (uid, gid, etc) as they exist on the host machine. In other words it's a fundamentally trusting environment.
Podman on the other hand, doesn't trust things by default, and instead runs containers in userspace, mapping the users in the container to high uid numbers on the host.
As more and more people are going to want to customize their configs with the
augur.jsonfile starting in this release, especially with all the new config options, It may be worth stepping through that usecase in both podman and docker to ensure the permissions and security models of both are able to work as designed and we can either a) fix, or b) document the steps needed to mount a custom config on both container environments.