secure docker.sock access (OD-1287)
Closed
Kai opened 1 year ago

I would like to see an secured docker.sock access e.g. with https://github.com/Tecnativa/docker-socket-proxy That why the api-access can be secured and filtert for only that tasks onedev should be able to do.

Robin Shen commented 1 year ago

Thanks for submitting the improvement. OneDev by default prevents docker sock mount in executors, and you can enable this only for trusted jobs. This way untrusted jobs should have no way to escape from the container it is running inside.

bufferUnderrun commented 1 year ago

I would like to see an secured docker.sock access e.g. with https://github.com/Tecnativa/docker-socket-proxy That why the api-access can be secured and filtert for only that tasks onedev should be able to do.

may i suggest to use podman instead, rootless and secure by design.

Kai commented 1 year ago

Thanks, that sounds like a valid solution for me, did somebody test to run ondev with podman instead of docker? --> if yes, i'll update the documentation regard that, if possible.

bufferUnderrun commented 1 year ago

i suggest only what i use 😁

OneDev running with podman in rootless mode for 5 months. Everything is working and secure.

Robin Shen changed state to 'Closed' 1 year ago
Previous Value Current Value
Open
Closed
Robin Shen commented 1 year ago

Close this as podman is a popular alternative

issue 1 of 1
Type
Improvement
Priority
Normal
Assignee
Issue Votes (0)
Watchers (4)
Reference
OD-1287
Please wait...
Page is in error, reload to recover