3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/nixos/modules/virtualisation
adisbladis 5733967290
nixos.users-groups: Set up subuid/subgid mappings for all normal users
This is required by (among others) Podman to run containers in rootless mode.

Other distributions such as Fedora and Ubuntu already set up these mappings.

The scheme with a start UID/GID offset starting at 100000 and increasing in 65536 increments is copied from Fedora.
2020-07-13 13:15:02 +02:00
..
amazon-image.nix
amazon-init.nix
amazon-options.nix
anbox.nix
azure-agent-entropy.patch
azure-agent.nix
azure-bootstrap-blobs.nix
azure-common.nix
azure-config-user.nix
azure-config.nix
azure-image.nix
azure-images.nix
brightbox-config.nix
brightbox-image.nix
cloudstack-config.nix
container-config.nix
containers.nix nixos.users-groups: Set up subuid/subgid mappings for all normal users 2020-07-13 13:15:02 +02:00
cri-o.nix
digital-ocean-config.nix
digital-ocean-image.nix
digital-ocean-init.nix
docker-image.nix
docker-preloader.nix
docker.nix
ec2-amis.nix
ec2-data.nix
ec2-metadata-fetcher.nix
ecs-agent.nix
gce-images.nix
google-compute-config.nix
google-compute-image.nix
grow-partition.nix
hyperv-guest.nix
hyperv-image.nix
kvmgt.nix
libvirtd.nix libvirtd: don't start libvirtd-tcp.socket by default 2020-07-08 19:50:23 -04:00
lxc-container.nix
lxc.nix
lxcfs.nix
lxd.nix lxd: When lxcfs is enabled, start lxd with explicit LXD_LXC_TEMPLATE_CONFIG 2020-06-05 16:37:31 +02:00
nixos-containers.nix
oci-containers.nix
openstack-config.nix
openvswitch.nix
parallels-guest.nix
podman.nix nixos/{podman,containers}: libpod.conf -> containers.conf 2020-06-26 08:09:36 +10:00
qemu-guest-agent.nix
qemu-vm.nix Merge pull request #92122 from nh2/qemu-vm-fix-useBootLoader 2020-07-06 22:06:20 +02:00
railcar.nix
virtualbox-guest.nix nixos/virtualbox-guest: add vmware driver 2020-06-17 18:43:27 +02:00
virtualbox-host.nix
virtualbox-image.nix nixos/virtualbox-image: change graphics adapter to vmswga 2020-06-17 18:43:28 +02:00
vmware-guest.nix
vmware-image.nix
xe-guest-utilities.nix
xen-dom0.nix
xen-domU.nix