Skip to content

gopls cannot run becuase it uses a custom user #65

@WhyNotHugo

Description

@WhyNotHugo

gopls uses a custom user inside the container. This user will never match the uid of the user running the container on the host (the uid of the containerised users is mapped to an uid in the host in the range definedin /etc/subuid).

Since my projects are in my $HOME, the user inside gopls can't access it, and fails with Permission denied. It's only really possible to work on project that are world readable.

I'm looking at #63, and I don't think this change really makes sense; it you use root inside the container, that root user will have the uid of the user running docker / podman on the host. #63 would only make sense if you're running docker/podman as root, but that doesn't seem like a very sensible thing to do, especially for LSPs. I think if you do so, it'd be possible for the LSP to read-write files on the host that are only readable by root.

I think it's probably best to revert #63, and discourage users from running the LSP containers as root in the first place.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions