Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Running invocation images as a specific user #428

Open
carolynvs opened this issue Feb 16, 2022 · 0 comments
Open

Running invocation images as a specific user #428

carolynvs opened this issue Feb 16, 2022 · 0 comments

Comments

@carolynvs
Copy link
Contributor

As part of securing a container, one thing that a person may do is to run the container as a nonroot user (by default containers run as root). The CNAB spec doesn't really cover the idea of what user the container is running under.

When I tried out running a bundle that specified a different user, I ran into a bunch of file permission mismatches. For example, when credential files are injected into the container with cnab-go, they are owned by root, and aren't readable by the container.

I was wondering if this is something that tools should just informally figure out by inspecting the invocation image or if there's value to providing guidance around this (even non-normative) in the spec?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant