Being both nonprivileged and root inside Docker container












0














I want to use pandoc inside docker. The image looks like this:



FROM debian:buster-slim
RUN apt-get update && apt-get install -y pandoc texlive
WORKDIR /home


This is build.sh inside the project:



cp *.ttf /usr/local/share/fonts/ && fc-cache;
pandoc -o output.pdf input.md


that I want to run like this:



docker run --rm -t -v $(pwd):/home pandoc_container build.sh


This results in output.pdf being owned by root on my host. When doing:



docker run --user $(id -u) --rm -t -v $(pwd):/home pandoc_container build.sh


instead, the file will be owned by me, but the font files can not be copied to that dir, due to missing write permissions. Adding



RUN chmod a+w /usr/local/share/fonts/


to the Dockerfile solves this, but then the command fc-cache fails with a lot of failed to write cache errors also due to missing write permissions in lots of directories.



Copying the font files to ~/.fonts will not work either, because the user created by --user $(id -u) does not actually exist in the container:



I have no name!@0d9c6a272ae1:/home$


and thus does not have a home directory, which could be parsed by fc-cache.



What's an elegant way to solve this problem?










share|improve this question



























    0














    I want to use pandoc inside docker. The image looks like this:



    FROM debian:buster-slim
    RUN apt-get update && apt-get install -y pandoc texlive
    WORKDIR /home


    This is build.sh inside the project:



    cp *.ttf /usr/local/share/fonts/ && fc-cache;
    pandoc -o output.pdf input.md


    that I want to run like this:



    docker run --rm -t -v $(pwd):/home pandoc_container build.sh


    This results in output.pdf being owned by root on my host. When doing:



    docker run --user $(id -u) --rm -t -v $(pwd):/home pandoc_container build.sh


    instead, the file will be owned by me, but the font files can not be copied to that dir, due to missing write permissions. Adding



    RUN chmod a+w /usr/local/share/fonts/


    to the Dockerfile solves this, but then the command fc-cache fails with a lot of failed to write cache errors also due to missing write permissions in lots of directories.



    Copying the font files to ~/.fonts will not work either, because the user created by --user $(id -u) does not actually exist in the container:



    I have no name!@0d9c6a272ae1:/home$


    and thus does not have a home directory, which could be parsed by fc-cache.



    What's an elegant way to solve this problem?










    share|improve this question

























      0












      0








      0







      I want to use pandoc inside docker. The image looks like this:



      FROM debian:buster-slim
      RUN apt-get update && apt-get install -y pandoc texlive
      WORKDIR /home


      This is build.sh inside the project:



      cp *.ttf /usr/local/share/fonts/ && fc-cache;
      pandoc -o output.pdf input.md


      that I want to run like this:



      docker run --rm -t -v $(pwd):/home pandoc_container build.sh


      This results in output.pdf being owned by root on my host. When doing:



      docker run --user $(id -u) --rm -t -v $(pwd):/home pandoc_container build.sh


      instead, the file will be owned by me, but the font files can not be copied to that dir, due to missing write permissions. Adding



      RUN chmod a+w /usr/local/share/fonts/


      to the Dockerfile solves this, but then the command fc-cache fails with a lot of failed to write cache errors also due to missing write permissions in lots of directories.



      Copying the font files to ~/.fonts will not work either, because the user created by --user $(id -u) does not actually exist in the container:



      I have no name!@0d9c6a272ae1:/home$


      and thus does not have a home directory, which could be parsed by fc-cache.



      What's an elegant way to solve this problem?










      share|improve this question













      I want to use pandoc inside docker. The image looks like this:



      FROM debian:buster-slim
      RUN apt-get update && apt-get install -y pandoc texlive
      WORKDIR /home


      This is build.sh inside the project:



      cp *.ttf /usr/local/share/fonts/ && fc-cache;
      pandoc -o output.pdf input.md


      that I want to run like this:



      docker run --rm -t -v $(pwd):/home pandoc_container build.sh


      This results in output.pdf being owned by root on my host. When doing:



      docker run --user $(id -u) --rm -t -v $(pwd):/home pandoc_container build.sh


      instead, the file will be owned by me, but the font files can not be copied to that dir, due to missing write permissions. Adding



      RUN chmod a+w /usr/local/share/fonts/


      to the Dockerfile solves this, but then the command fc-cache fails with a lot of failed to write cache errors also due to missing write permissions in lots of directories.



      Copying the font files to ~/.fonts will not work either, because the user created by --user $(id -u) does not actually exist in the container:



      I have no name!@0d9c6a272ae1:/home$


      and thus does not have a home directory, which could be parsed by fc-cache.



      What's an elegant way to solve this problem?







      docker pandoc fontconfig






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Dec 12 at 17:37









      mcnesium

      2842415




      2842415






















          1 Answer
          1






          active

          oldest

          votes


















          0














          The answer is as easy as adding



          chown $UID output.pdf


          to build.sh and then passing docker an env-var instead of the user id:



          docker run -e UID=$(id -u) --rm -t -v $(pwd):/home pandoc_container build.sh





          share|improve this answer





















            Your Answer








            StackExchange.ready(function() {
            var channelOptions = {
            tags: "".split(" "),
            id: "3"
            };
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function() {
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled) {
            StackExchange.using("snippets", function() {
            createEditor();
            });
            }
            else {
            createEditor();
            }
            });

            function createEditor() {
            StackExchange.prepareEditor({
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader: {
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            },
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            });


            }
            });














            draft saved

            draft discarded


















            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1383061%2fbeing-both-nonprivileged-and-root-inside-docker-container%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            0














            The answer is as easy as adding



            chown $UID output.pdf


            to build.sh and then passing docker an env-var instead of the user id:



            docker run -e UID=$(id -u) --rm -t -v $(pwd):/home pandoc_container build.sh





            share|improve this answer


























              0














              The answer is as easy as adding



              chown $UID output.pdf


              to build.sh and then passing docker an env-var instead of the user id:



              docker run -e UID=$(id -u) --rm -t -v $(pwd):/home pandoc_container build.sh





              share|improve this answer
























                0












                0








                0






                The answer is as easy as adding



                chown $UID output.pdf


                to build.sh and then passing docker an env-var instead of the user id:



                docker run -e UID=$(id -u) --rm -t -v $(pwd):/home pandoc_container build.sh





                share|improve this answer












                The answer is as easy as adding



                chown $UID output.pdf


                to build.sh and then passing docker an env-var instead of the user id:



                docker run -e UID=$(id -u) --rm -t -v $(pwd):/home pandoc_container build.sh






                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Dec 13 at 13:47









                mcnesium

                2842415




                2842415






























                    draft saved

                    draft discarded




















































                    Thanks for contributing an answer to Super User!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.





                    Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


                    Please pay close attention to the following guidance:


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function () {
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1383061%2fbeing-both-nonprivileged-and-root-inside-docker-container%23new-answer', 'question_page');
                    }
                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    flock() on closed filehandle LOCK_FILE at /usr/bin/apt-mirror

                    Mangá

                     ⁒  ․,‪⁊‑⁙ ⁖, ⁇‒※‌, †,⁖‗‌⁝    ‾‸⁘,‖⁔⁣,⁂‾
”‑,‥–,‬ ,⁀‹⁋‴⁑ ‒ ,‴⁋”‼ ⁨,‷⁔„ ‰′,‐‚ ‥‡‎“‷⁃⁨⁅⁣,⁔
⁇‘⁔⁡⁏⁌⁡‿‶‏⁨ ⁣⁕⁖⁨⁩⁥‽⁀  ‴‬⁜‟ ⁃‣‧⁕‮ …‍⁨‴ ⁩,⁚⁖‫ ,‵ ⁀,‮⁝‣‣ ⁑  ⁂– ․, ‾‽ ‏⁁“⁗‸ ‾… ‹‡⁌⁎‸‘ ‡⁏⁌‪ ‵⁛ ‎⁨ ―⁦⁤⁄⁕