-
-
Notifications
You must be signed in to change notification settings - Fork 355
feat: Ensure EFS is owned by the posix_user to avoid permission issues #287
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Ensure EFS is owned by the posix_user to avoid permission issues #287
Conversation
@affelaffen I applied this change locally and rebuilt my ECS cluster, EFS volume and EFS Access point and I am still encountering the Any suggestion here? |
Do you run the module with |
I did - with and without. Each time deleting everything in AWS. I can run
it all again tomorrow but I would end up in 1 of 3 possible situations:
1) The original issue - git complaining about an unsafe repo
2) The container would not start because of permission issues
3) The container would start but Atlantis could not run a plan because of
permission issues
I will have to run it again tomorrow and get more specifics.
The way I have worked around the issue is to use ephemeral container
storage - not ideal but was the only way to move forward.
…On Mon, Jun 13, 2022 at 11:26 PM Brian Hansen ***@***.***> wrote:
@affelaffen <https://github.com/affelaffen> I applied this change locally
and rebuilt my ECS cluster, EFS volume and EFS Access point and I am still
encountering the unsafe repository is owned by someone else issue.
Any suggestion here?
Do you run the module with user = "100:1000"?
—
Reply to this email directly, view it on GitHub
<#287 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AABOGUJTLMOED4PGGZUQ2HTVPAQ2DANCNFSM5YTXZYUA>
.
You are receiving this because you commented.Message ID:
***@***.***
com>
|
Since I am using a slightly modified entrypoint script, I did not experience this issue. I tried with a completely new setup and the default image and also ran into the issue with permissions within the |
@affelaffen confirmed this works - thanks! |
## [3.17.0](v3.16.0...v3.17.0) (2022-06-15) ### Features * Ensure EFS is owned by the posix_user to avoid permission issues ([#287](#287)) ([61cdf8f](61cdf8f))
This PR is included in version 3.17.0 🎉 |
Thank you all for the fix and confirmation that it works! |
This is a breaking change - if you have been running this previously, and have mounted |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
When specifying a user for running the container, e.g. using the
100:1000
Atlantis user on the default image, theaws_efs_access_point
is correctly configured with saidposix_user
, but the ownership of the root directory is left as the defaultroot:root
. This can result in different permission issues, one of which is described in runatlantis/atlantis#2221. By specifying thecreation_info
, we ensure that the user provided as the executing posix user also owns the directory. If desired, this change can be put behind a feature variable.Motivation and Context
The issue described in runatlantis/atlantis#2221 is the primary motivation for this change.
Breaking Changes
No breaking changes as such, but this will force recreation of an existing aws_efs_access_point and thus the aws_ecs_task_definition.
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request