-
Notifications
You must be signed in to change notification settings - Fork 9
Don't run Bundler as root. Bundler can ask for sudo if it is needed #3
Comments
I haven't been able to find a definitive answer on whether or not this matters. The naive assumption is that because the whole application is inside a container, it doesn't matter what the user inside the container is. However, there is always the risk of exploitable vulnerabilities in the container runtime or the kernel that could allow an attacker to escape the container. What I am unclear about is whether the application's process inside the container being root or not has any affect on container escapes. I am not sure what the current state of Docker is w/r/t how root inside the container is mapped to users on the host (user namespaces was supposed to be the answer to this, IIRC). Long story short: I'd like to find someone who knows what they're talking about who can answer conclusively on whether or not a root vs. non-root inside a container matters (preferably with details about why it matters and/or examples of a root process in a container escaping to the host). |
I had the same issue and fixed it using this: |
But now I am getting another issue after the previous fix:
Note: and after that the program stop; I look for that in the internet and it seems to be a issue with the standard input |
Don't run Bundler as root. Bundler can ask for sudo if it is needed, and
installing your bundle as root will break this application for all non-root
users on this machine.
Could not locate Gemfile
Could not locate Gemfile
docker-compose.yml
version: '2'
services:
redis:
image: litaio/redis:3.0.1
restart: on-failure
container_name: litaio-redis
hostname: redis
volumes:
- /docker/Litaio/redis:/var/lib/redis
lita:
image: litaio/lita
restart: on-failure
container_name: litaio-lita
hostname: redis
volumes:
- /docker/Litaio/bundle:/var/bundle
links:
- redis:redis
ports:
- "8080:8080"
The text was updated successfully, but these errors were encountered: