ecurity-context-constraints/
>
>
>
> --
>
> *Srinivas Kotaru*
>
>
>
> *From: *Srinivas Naga Kotaru
> *Date: *Friday, December 2, 2016 at 2:27 PM
> *To: *Akshaya Khare , Ben Parees <
> bpar...@redhat.com>
> *Cc: *users , Jordan Liggitt <
>
: users , Srinivas Naga Kotaru
, Jordan Liggitt
Subject: Re: oc new-app with root privileges
Thanks Ben,
I'll check this reference.
our developers in the team will need to start a service once the container is
up.
But the systemd is only accessible for my image if it is run as root.
Ma
Kotaru
, Jordan Liggitt
Subject: Re: oc new-app with root privileges
Thanks Ben,
I'll check this reference.
our developers in the team will need to start a service once the container is
up.
But the systemd is only accessible for my image if it is run as root.
Maybe I can try adding this st
e steps in my mind. Even I would like to get
>>> clarity on this topic what is the right approach to run a container using
>>> anyuid priviligies
>>>
>>>
>>>
>>>
>>>
>>> --
>>>
>>> *Srinivas Kotaru
my mind. Even I would like to get
>> clarity on this topic what is the right approach to run a container using
>> anyuid priviligies
>>
>>
>>
>>
>>
>> --
>>
>> *Srinivas Kotaru*
>>
>>
>>
>> *From: * on behalf of Ben
of Ben
> Parees
> *Date: *Thursday, December 1, 2016 at 1:37 PM
> *To: *Akshaya Khare , Jordan Liggitt <
> jligg...@redhat.com>
> *Cc: *users
> *Subject: *Re: oc new-app with root privileges
>
>
>
>
>
>
>
> On Thu, Dec 1, 2016 at 4:18 PM, Akshaya Khare
>
is the right approach to run a container using anyuid
priviligies
--
Srinivas Kotaru
From: on behalf of Ben Parees
Date: Thursday, December 1, 2016 at 1:37 PM
To: Akshaya Khare , Jordan Liggitt
Cc: users
Subject: Re: oc new-app with root privileges
On Thu, Dec 1, 2016 at 4:18 PM
On Thu, Dec 1, 2016 at 4:18 PM, Akshaya Khare
wrote:
> Hi,
>
> I created my own image which can use s2i to use git urls for my internal
> projects.
>
> The image has been created such that the systemd services will be working,
> and in order to do that the image had to be created with root user.