secure docker.sock access (OD-1287)
Kai opened 3 years ago

I would like to see an secured docker.sock access e.g. with https://github.com/Tecnativa/docker-socket-proxy That why the api-access can be secured and filtert for only that tasks onedev should be able to do.

  • Robin Shen commented 3 years ago

    Thanks for submitting the improvement. OneDev by default prevents docker sock mount in executors, and you can enable this only for trusted jobs. This way untrusted jobs should have no way to escape from the container it is running inside.

  • bufferUnderrun commented 3 years ago

    I would like to see an secured docker.sock access e.g. with https://github.com/Tecnativa/docker-socket-proxy That why the api-access can be secured and filtert for only that tasks onedev should be able to do.

    may i suggest to use podman instead, rootless and secure by design.

  • Kai commented 3 years ago

    Thanks, that sounds like a valid solution for me, did somebody test to run ondev with podman instead of docker? --> if yes, i'll update the documentation regard that, if possible.

  • bufferUnderrun commented 3 years ago

    i suggest only what i use 😁

    OneDev running with podman in rootless mode for 5 months. Everything is working and secure.

  • Robin Shen changed state to 'Closed' 3 years ago
    Previous Value Current Value
    Open
    Closed
  • Robin Shen commented 3 years ago

    Close this as podman is a popular alternative

issue 1/1
Type
Improvement
Priority
Normal
Assignee
Issue Votes (0)
Watchers (4)
Reference
OD-1287
Please wait...
Connection lost or session expired, reload to recover
Page is in error, reload to recover