Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

user: 5000:5000 support #948

Open
1 task done
jamilnielsen opened this issue Apr 25, 2024 · 0 comments
Open
1 task done

user: 5000:5000 support #948

jamilnielsen opened this issue Apr 25, 2024 · 0 comments
Assignees

Comments

@jamilnielsen
Copy link

jamilnielsen commented Apr 25, 2024

Feature description

PUID/PGID are nice and all, but user is more secure on the premise that containers are inherently not very secure, preventing a privilage escalation entirely by having the entire container be non-root helps greatly on this front.

Motivation

  • i like security, and foundry is the weakest link on my server.
  • future proofing

Example

compose.yml
foundry:
image: felddy/foundryvtt:release
container_name: foundryvtt
user: X:Y #could be anything
etc...

Pitch

while some people might throw around words like threat model saying these things are needless and over the top, people who use docker are likely to be running many things on their server, so securing everything that's exposed is essential.

Code of Conduct

  • I agree to follow this project's Code of Conduct
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants