-
Notifications
You must be signed in to change notification settings - Fork 34
Description
gopls uses a custom user inside the container. This user will never match the uid of the user running the container on the host (the uid of the containerised users is mapped to an uid in the host in the range definedin /etc/subuid).
Since my projects are in my $HOME, the user inside gopls can't access it, and fails with Permission denied. It's only really possible to work on project that are world readable.
I'm looking at #63, and I don't think this change really makes sense; it you use root inside the container, that root user will have the uid of the user running docker / podman on the host. #63 would only make sense if you're running docker/podman as root, but that doesn't seem like a very sensible thing to do, especially for LSPs. I think if you do so, it'd be possible for the LSP to read-write files on the host that are only readable by root.
I think it's probably best to revert #63, and discourage users from running the LSP containers as root in the first place.