NBardelot opened a new issue #8706:
URL: https://github.com/apache/airflow/issues/8706


   It is a common good practice for Docker/Kubernetes to create a user who is 
not root to run the main process of the container of course, but it is also a 
good practice to make the user member of the root group (which provides not 
special rights by itself and is not a security issue).
   
   This is especially true when running containers in OpenShift. Please see the 
OpenShift official guidelines:
   
   > Support Arbitrary User IDs
   
   > By default, OpenShift Enterprise runs containers using an arbitrarily 
assigned user ID. This provides additional security against processes escaping 
the container due to a container engine vulnerability and thereby achieving 
escalated permissions on the host node.
   
   > For an image to support running as an arbitrary user, directories and 
files that may be written to by processes in the image should be owned by the 
root group and be read/writable by that group. Files to be executed should also 
have group execute permissions.
   
   Adding the following to your Dockerfile sets the directory and file 
permissions to allow users in the root group to access them in the built image:
   
   `RUN chgrp -R 0 /some/directory && chmod -R g+rwX /some/directory`
   


----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to