-
Notifications
You must be signed in to change notification settings - Fork 25
Bug: Linux file perms + localhost access #133
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Related to #87 |
Validated in #136 |
Which part is this? Is this the |
@ferranbt yes, basically using an external block builder was not possible on a linux machine |
To add more context, we had a builder listening on we also tried to point it at the |
But is this a problem with the example? or with the playground? |
seems like a playground thing. Unless im missing something the only way to use the external builder flag as is, is with |
Two issues arise in Linux:
File permissions
Due to containers running as
root
in Linux, whatever files they create in the binded volumes, can't be cleaned up by the user. That means that it's impossible to run the playground, unless you manually delete these files. On MacOs, Docker Desktop automagically spawns the containers with user permissions so that issue doesn't arise.Attempted Fixes:
user
field in every service of the docker compose with the uid and guid of the user who runs the go binary. It made services crash.rm -rf $HOME/.playground
after every run. Works, but it's a workaround.host.docker
doesn't seem to work on linux.I see that the final docker compose has the extra flags that are needed to make it work on Linux, as per Stack Overflow, but so far this hasn't worked for us. Haven't spent huge amount of time in debugging it, probably using
host
network mode would solve it.The text was updated successfully, but these errors were encountered: