-
-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Do not run as root #39
Comments
How many other official images run as a non-root user/group? My experience has been that, in the Docker world, the containerization itself is generally considered to be "good enough" in terms of privilege encapsulation. If you can point to a substantial number of other prolific images in the official library that create and use non-root user accounts, I'd consider this, but even then, this would be an unlikely change, due to the potential to break backwards compatibility (usage in the wild having been written against the image under the assumption that commands will be run as root). |
In my experience the difference comes from when you have bind-mounted directories. I don't see why you should change rethinkdb base image, as you can easily create an official-derived image:
|
I am in support of running the image as not-root. I currently build my own rethindkb-image so that I'm are able to run rethinkdb in OpenShift. Openshifts documentation states how they recommend doing it: https://docs.openshift.com/container-platform/3.7/creating_images/guidelines.html#openshift-specific-guidelines AFAIK, for deployments on Kubernetes, one would have to specify allowPrivileged to run the official rethinkdb image. |
Ideally the image should not be run as root, I recommend creating a user and changing the rethinkdb permissions to be accessible by that user
The text was updated successfully, but these errors were encountered: