-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix docker:S2612 while setting permissions to SQ folders #663
Fix docker:S2612 while setting permissions to SQ folders #663
Conversation
I think we need to extend a bit the permission system, as the following block
will break installation where uid is not 1000 by not allowing random uid to write into the temp folders.
While looking at openshift documentation, which seems to be the best practice in terms of random uid setup It seems we should be using the root group as a fixed entity to give permissions to. while being more elegant than having full open, I don't really see how it improves security ? If another app that follows the same permission pattern manages to escape to the host, then they will have access to your filesystem anyway by being part of the root group. And if it is your app that has a flaw then anyway the intruder will have the same permission as the user running the app, therefore gaining access. Anyway we should follow best practices wdyt ? |
Mmm, very good catch! Supporting Openshift's arbitrary user ids means we need to add the I would vote for changing the permissions of those folders for two reasons:
|
I drafted a change in the |
hmm that's true, in order to not change too much the helm chart I would suggest something like this:
With that, the default helm chart parameter should work (have not tested yet) but if a user changed both runAsUser and runAsGroup in the helm chart it will break. I would suggest using this setup and changing helm default with runAsUser: 1000 runAsGroup: 0 to follow closely what would happen on OpenShift while still having broad compatibility. It would look like the best tradeoff in terms of user-friendliness and security, but we will have to clearly communicate the change as it matters a lot Wdyt ? |
d5a7f55
to
8b5d1aa
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm.
8b5d1aa
to
3ce4e3f
Compare
Quality Gate passedIssues Measures |
No description provided.