-
In my case I created a dedicated executor that is only allowed to run on trusted projects (i.e. that only trusted people can write to). You can select it in the buildspec.
An option to enable privileged mode directly in the buildspec would be very dangerous on public OneDev instances or whenever you have at least one untrusted user.
-
Yes that is correct. Privileged mode should be configured in docker executor and only open to trusted projects to avoid security issues.
-
Previous Value Current Value Open
Closed
| Type |
Question
|
| Priority |
Normal
|
| Assignee | |
| Labels |
No labels
|
Issue Votes (0)
Could we enable privileged mode only for the tasks that actually need it? I checked the code and it looks like you can only configure it in the Run Options when creating a new Server Docker Executor, which affects every task; if it’s not needed you have to remove it manually. Could you add an “Enable Privileged Mode” option in Run Docker Container?