-
-
Notifications
You must be signed in to change notification settings - Fork 117
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
user: 5000:5000 support #948
Comments
@jamilnielsen late to the party. Did you consider running the stack with podman? |
it's already supported in the IMAGE, just not implemented. Why would the project require podman? |
It seemed the concerns were about privesc. so to prevent getting root access outside of the container one could simply use podman as a replacement from docker and get the same functionality. I believe no action would be needed and it could work out of the box. |
FoundryVTT is by far the single greatest security risk in my stack, when i asked mods for comment in discord their approach to FoundryVTT security was "turn it off when not using it", there's so many things i cannot do, like how its incompatible with even the most basic of header security.
in my current setup it would be difficult to use podman (truenas electric eel) |
Feature description
PUID/PGID are nice and all, but user is more secure on the premise that containers are inherently not very secure, preventing a privilage escalation entirely by having the entire container be non-root helps greatly on this front.
Motivation
Example
compose.yml
foundry:
image: felddy/foundryvtt:release
container_name: foundryvtt
user: X:Y #could be anything
etc...
Pitch
while some people might throw around words like threat model saying these things are needless and over the top, people who use docker are likely to be running many things on their server, so securing everything that's exposed is essential.
Code of Conduct
The text was updated successfully, but these errors were encountered: