Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Running docker container without root privileges #84

Open
umputun opened this issue May 31, 2021 · 0 comments
Open

Running docker container without root privileges #84

umputun opened this issue May 31, 2021 · 0 comments

Comments

@umputun
Copy link
Owner

umputun commented May 31, 2021

The current process runs under root and the primary reason is a need to access /var/run/docker.sock to allow containers discovery. Technically it can be done with any user added to the docker group, however, I'm not really sure if such users are any better from the security point of view.

In case if reproxy runs inside a container but doesn't use docker provider, running the reproxy process without root privilege makes perfect sense. I'm not sure yet how to make a universal image to address both cases unless we add an additional entrypoint checking provider and run reproxy under root or non-root. Not sure how this can be done as we don't have anything in the image (scratch). Maybe the process itself should drop privileges somehow after the start?

Another idea is to isolate docker event listener to a separate privileged process and make reproxy communicate with this process. Sort of "provider plugin" idea I guess

Open for better ideas, feel free to propose.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant