From f711f5a68de98b911ef31676843e6d463cc47f69 Mon Sep 17 00:00:00 2001 From: Giuseppe Scrivano Date: Fri, 11 Dec 2020 15:35:41 +0100 Subject: podman: drop checking valid rootless UID do not check whether the specified ID is valid in the user namespace. crun handles this case[1], so the check in Podman prevents to get to the OCI runtime at all. $ podman run --user 10:0 --uidmap 0:0:1 --rm -ti fedora:33 sh -c 'id; cat /proc/self/uid_map' uid=10(10) gid=0(root) groups=0(root),65534(nobody) 10 0 1 [1] https://github.com/containers/crun/pull/556 Signed-off-by: Giuseppe Scrivano --- pkg/util/utils_unsupported.go | 5 ----- 1 file changed, 5 deletions(-) (limited to 'pkg/util/utils_unsupported.go') diff --git a/pkg/util/utils_unsupported.go b/pkg/util/utils_unsupported.go index f8d5a37c1..62805d7c8 100644 --- a/pkg/util/utils_unsupported.go +++ b/pkg/util/utils_unsupported.go @@ -10,8 +10,3 @@ import ( func FindDeviceNodes() (map[string]string, error) { return nil, errors.Errorf("not supported on non-Linux OSes") } - -// CheckRootlessUIDRange is not implemented anywhere except Linux. -func CheckRootlessUIDRange(uid int) error { - return nil -} -- cgit v1.2.3-54-g00ecf