Skip to content

Audit container configs for permissions management #3372

@MoralCode

Description

@MoralCode

Was just struggling to test #3337 because of issues mounting my augur.json and logs directories into the container environment (podman) for testing. While this was an issue on my somewhat uncommon setup, it made me realize:

podman and docker have fundamentally different viewpoints when it comes to permissions and security. Docker's rootful model generally defaults to running as root and passing through mounted directories with the same permissions (uid, gid, etc) as they exist on the host machine. In other words it's a fundamentally trusting environment.

Podman on the other hand, doesn't trust things by default, and instead runs containers in userspace, mapping the users in the container to high uid numbers on the host.

As more and more people are going to want to customize their configs with the augur.json file starting in this release, especially with all the new config options, It may be worth stepping through that usecase in both podman and docker to ensure the permissions and security models of both are able to work as designed and we can either a) fix, or b) document the steps needed to mount a custom config on both container environments.

Metadata

Metadata

Assignees

No one assigned

    Labels

    containersRelated to augur in containers, container images, or the compose file, either in podman or in dockertech debt

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions