-
Notifications
You must be signed in to change notification settings - Fork 220
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
toolbox
is unsafe
#427
Comments
I'm also bothered by this for my development containers. For now, what I've done is build my own development containers, that among other things override various environment variables to make the development tools put their files somewhere else in As an example, in this one I configure some Python tools to put their caches in This feels like playing catch-up though. In addition, for most cases I don't use any GUI tools in my projects, so the tight integration with the desktop is not strictly necessary. Most of the time I open I've thought about making a different tool that matches my normal development workflow better, inspired by how some IDE:s with Docker integrations set up development containers:
It wouldn't be strictly necessary for me for many projects to replicate the Toolbox integration with the desktop, allowing launching GUI tools etc. I do anticipate that it will be nice sometimes though, so there might be a fair deal of duplication of functionality there, if I do this as a completely different project. So, @abitrolly , do you think the above is omething that would interest you? toolbox-team, is this something you think could fit into the scope of Toolbox, or should I strike out on my own? I understand if you think this doesn't really fit into your goals. |
tlbx fork has a |
@abitrolly Why not use podman directly if you really want an isolated environment? Toolbox has a few common use-cases. Try and get those right first before becoming feature complete with the tool it is based on. |
@hholst80 using
Handling all parameters right for |
Duplicate of #183 |
In #389 I discovered that I can write files outside the toolbox. Today I tried to install RVM inside the toolbox and instead messed with my dotfiles. That's why I want to raise this issue as critical.
Containers are protecting the developer from running code that potentially can destroy the system. But because developers already work under unprivileged user, the protection that container provides is only about isolating developer's files.
toolbox
container exposes everything. My private keys are readable from inside of container, $HOME is writable to it, and programs installed into the container (like RVM) will modify your host dotfiles. Until this is fixed, this is big no-go for me.toolbox
brought an interesting concept that it is possible to restart previous container, so I will continue to use something simple, likeMaybe only find a way to find and reexec container if it already exists.
The text was updated successfully, but these errors were encountered: