You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Typically it's easiest to just ignore the user and be careful to not install anything in root's home, which means it will be root for the base when run with Docker, but more likely just the user on the cluster in the case of Singularity. So I'm wondering if this is needed:
And if so, if there should be a standard RADIUSS user like radius? Under what scenario do we need a user named axom that has sudo? ping @davidbeckingsale
The text was updated successfully, but these errors were encountered:
My instinct is that the base containers should be agnostic to users, e.g., if a special user or permission is needed, said user can be added on the level of the project repo (and probably not the base). But wanted to just open an issue to discuss in case there was a reason for a global one!
* first shot at adding/testing github workflow to update containers.
After this we will want to have builds for all the newly generated (or changed) files,
but just to test. Only on merge will they be build -> deploy
Signed-off-by: vsoch <[email protected]>
Typically it's easiest to just ignore the user and be careful to not install anything in root's home, which means it will be root for the base when run with Docker, but more likely just the user on the cluster in the case of Singularity. So I'm wondering if this is needed:
And if so, if there should be a standard RADIUSS user like radius? Under what scenario do we need a user named axom that has sudo? ping @davidbeckingsale
The text was updated successfully, but these errors were encountered: