Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

First glitch: I had no write access to /tmp/fractal_test/, and then I had to enter the container to download images. #10

Closed
tcompa opened this issue Sep 4, 2023 · 3 comments
Assignees

Comments

@tcompa
Copy link
Collaborator

tcompa commented Sep 4, 2023

          First glitch: I had no write access to `/tmp/fractal_test/`, and then I had to enter the container to download images.

Originally posted by @tcompa in #9 (comment)

@tcompa
Copy link
Collaborator Author

tcompa commented Sep 4, 2023

I see two ways out:

  1. We provide 777 permissions to that folder: would it work both ways? Would files from host-machine user be readable from the container?
  2. We incorporate point 2 from proof of principle: run a full example #9 (comment) into the Dockerfile, with a small script.

@tcompa
Copy link
Collaborator Author

tcompa commented Sep 4, 2023

As @mfranzon correctly points out, option 2 would not allow a user to use any other input image - then it's best to stick with some version of option 1.

aangelone2 added a commit that referenced this issue Sep 4, 2023
set up ./fractal-data <-> /home/fractal-data/ folder
for host-container data exchange
@aangelone2 aangelone2 self-assigned this Sep 4, 2023
@aangelone2
Copy link
Collaborator

aangelone2 commented Sep 4, 2023

The current solution is to use for data exchange the fractal-data/ folder, automatically created in the project root by the host when running make run (before the first execution of the containers).

This folder is mapped to /home/fractal-data/ on the container filesystem, and allows writing and reading of all contained files from both sides (from the host user due to ownership, and from the container due to root's superior permissions).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants