linux

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

nirogu,
@nirogu@vivaldi.net avatar

Run command as not-root

Hi everyone

At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.

Does anyone know how to do it? Thanks in advance!

@linux

ursakhiin,

It’s not that an Amazon instance can be a docker container. It was more that the behavior you are describing is extremely odd for a full Linux environment but normal for a docker container.

If you created the instance, it isn’t likely a container. But it also sounds like the base image might be poorly set up

elscallr,
@elscallr@lemmy.world avatar

You’ll thank yourself for it later. Things like this take a little longer up front but putting them off has a way of making you have to work around it again and again until, when you get around to correcting it, it takes far more time to undo the workarounds than it would’ve taken to correct it the first time.

The Distro Wars are good actually.?

If all the seemingly pointless discussions about which distro is better comes from attachment to a spesific distro and if a distro is just a way to interract with linux than all the discussion about witch distro is better etc. fundementally comes from a a place of love and appreciation for Linux as an OS....

Suspension on my laptop (closing the lid) causes Wifi to not be available. (kbin.social)

Hi, this is a long lasting problem that I didn't really manage to fix when I started using linux (Mint, Cinnamon). But now that I've been using it regularly for half a year and I have more experience in fiddling around, I'm trying to get it resolved....

Is anyone here using their hardware TPM chips for credentials?

I’m curious about the possible uses of the hardware Trusted Protection Module for automatic login or transfer encryption. I’m not really looking to solve anything or pry. I’m just curious about the use cases as I’m exploring network attached storage and to a lesser extent self hosting. I see a lot of places where public...

New Fedora Slimbook 14" joins the Fedora Slimbook 16" - Fedora Magazine (fedoramagazine.org)

We heard your feedback during the launch of the Fedora Slimbook 16 and, along with the folks from Slimbook, bring you the new Fedora Slimbook 14, a smaller, lighter, cheaper with even better battery life, version of the Fedora Slimbook, powered by an Intel CPU and GPU (unfortunetely no AMD version soon).

What Tweak, Program, ... changes a Desktop Environment from unusable to great for you?

I have used Linux on and off for 15 years. I consider myself a casual user and stuck to the mainstream DEs (mostly KDE, XFCE and some Cinnamon). Gnome has been a hurdle for me before and after the big version 40 changes, I couldn’t get my head around how they handled the workspaces and workflow. At some point I I tried out an...

Non-root user that (suddenly) has elevated privileges in a specific command (only). [Have I been hacked?]

Title. Long,short story: creating or editing files with nano as my non-root user gives (the file) elevated privileges, like I have ran it w/ sudo or as root. And the (only) “security hole” that I can think of is a nextdns docker container running as root. That aside, its very “overkill” security-wise (cap_drop=ALL,...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • linux@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #