Greetings @TimSiegrist,
Where is the user actually set?
Is this the same when using the vscode inline debugging, deploying the release (via vscode extension) and when starting the application from the docker compose (having the container added in the TorizonCore builder)?
So this one is kind of a “it depends” type of answer.
If you are running the debug version through our extension then the user that executes the application is controlled by the torizon_run_as
setting found in your project’s settings.json
file.
If you are running the release version then it depends on your Dockerfile
. The executing user will be whatever the last USER
statement was in the Dockerfile: Dockerfile reference | Docker Docs
If your Dockerfile
does not have an explicit USER
statement, then it’s whatever the last USER
statement was in the base container images that your Dockerfile is sourcing. If you trace it all the way back and there was no USER
statements ever, not even in the base container images then it defaults to the root
user.
So in your case let’s look. For the cmake template I see the base container image is torizon/debian:4
as per: vscode-torizon-templates/cmakeConsole/Dockerfile at dev · torizon/vscode-torizon-templates · GitHub
Let’s look at the source container image for this from our other repo here: torizon-containers/base/Dockerfile at stable · torizon/torizon-containers · GitHub
We see there is no explicit USER
statement, therefore it defaults to root
, which is what you observe.
Now for the slint rust template. I can see the base container image here is torizon/wayland-base-imx8:4
. Looking at the source for this I also can’t see any explicit USER
statement: torizon-containers/wayland-base/Dockerfile at stable · torizon/torizon-containers · GitHub
So actually I’m a little confused myself how the torizon
user is set as the default user in your case. Unless you’re running it under debug, which as I said earlier uses torizon_run_as
which defaults to torizon
user.
We do not want to give the applications root access, so we probably want to have a separate group which has access to the unix socket. What would be the easiest way to achieve in a docker environment? Can I somehow do this in my docker-compose (where I have all my containers specified) in the Torizoncore builder?
Just to clarify. This is some socket file I assume, correct?
Off the top of my head I suppose when the socket file is created, you could create it so that it has permissions that allow it to be used by the user that will be accessing it. For example if the torizon
user will access the socket you could create the socket with wide permissions, or permissions specifically for the torizon
user. Maybe something along the lines like this would be helpful: Permission for -v /var/run/docker.sock - Docker Desktop - Docker Community Forums
Best Regards,
Jeremias