Aleks,

Am 16.05.19 um 01:04 schrieb Aleksandar Lazic:
>> As a avid Docker user: I tend to absolutely avoid any Docker images that
>> are not built using Docker Hub's autobuilder, because I cannot verify
>> the Dockerfile myself (or cannot verify that the resulting image
>> actually matches the Dockerfile). And for the images using the
>> autobuilder: They are super crap more often than not.
> 
> Sorry, I don't understand this statement, what do you mean?

Compare these two images:
https://hub.docker.com/r/me2digital/haproxy20-centos
https://hub.docker.com/r/timwolla/znc

You'll note that for mine the source repository and the Dockerfile is
shown. Mine uses Docker Hub's autobuilder, which builds the Dockerfile
on Docker Hub, instead of pushing an externally built image.

For me the ones from the autobuilder are more trustworthy, because I
know that the "contents match the labeling" if I trust Docker Hub. The
others could contain anything and I could not verify this, I need to
trust every maintainer.

>> I don't see any benefit whatsoever for HAProxy to provide image
>> themselves. The image in the docker-official-images program is timely
>> updated using a scraper [1], it is of high quality (of course )and the
>> fact that it's part of the DOI program makes it highly trusted among
>> Docker users. Also I keep half an eye on that image to make necessary
>> adjustments.
> 
> Well why I build the images by myself because I need newer libraries, for
> example openssl with tls 1.3, which is not part of the official build.

TLS 1.3 is supported with the :alpine image:

[timwolla@~]docker run -it --rm haproxy:alpine haproxy -vv |grep TLSv
OpenSSL library supports : TLSv1.0 TLSv1.1 TLSv1.2 TLSv1.3

It will be supported for the Debian one once Debian Buster is released
(I expect that to happen before August, but don't quote me on that).

Personally I think that TLS 1.3 is nice to have, but I don't *need* TLS
1.3, because many users won't benefit from it, yet. I also don't run
HAProxy in a container, but that's a different matter ...

> Does "they" accept pull requests which changes a lot in the docker file or how
> they behave.

The policy from them is: Do what upstream recommends and be conservative
otherwise. The images should fit the majority of users and I believe
they do. Everyone else is free to create their own image (like you do).

Regarding TLS 1.3 specifically see this issue:
https://github.com/docker-library/haproxy/issues/74

> I have not a very good feeling about this docker-official-images program as 
> from
> my point of view  docker have change in the past so much parts (apis, gui, 
> ...)
> that I'm not sure how they behave in the future.

I am personally a maintainer of two of these images (adminer, spiped)
and I contribute pull requests, issues and opinions on the others and I
believe that the images are as good as they can possibly get without
jumping through a bunch of hoops such as manually compiling OpenSSL. Any
piece of software that is self-compiled needs to be monitored for
security vulnerabilities to update the image and especially OpenSSL does
not have a good track record regarding security.

> But you know I'm open for suggestions, so if we agree that the
> docker-official-images is the image which the haproxy community can commit to 
> it
> I'm fine with it.

As a Docker user (and official image maintainer) and HAProxy user (and
code contributor) I believe that the docker-official-images HAProxy
image is the best general purpose (!) image you can find and I believe
that the DOI team does a good job maintaining those images to be useful
for the majority of users.

Best regards
Tim Düsterhus

Reply via email to