-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support OCI standard dockerfile #2961
Conversation
Hi, Best |
Thanks for the answer. I can bring back the ability to run |
@Zunhammer
The first option is quite robust, since end users have the ability to enforce security with a strong password and use The second option strives to achieve fine-grained control over user privileges, limiting them to only the necessary ones (installing, removing and updating packages from the system repo). Unfortunately, this is more prone to errors on the maintainer's side, and I think that the first one is better due to its simplicity. What do you think? |
Hi SwirtaB, thanks for evaluating and sharing the options. Personally, I think it's bothering to change the password on each container start which is why I would prefer the second option. However, the main purpose (IMO) of this container is to use it for development. So, I would keep it simple and mainly easy to use at this point. People who want to use the container in areas relevant for security should adopt the Dockerfile anyway. Looking foward to get your feedback. Would be nice to have other opinions as well :) Best regards |
Personally, I am a strong advocate for enforcing good security practices, especially in FOSS. Nerfstudio has a lot of dependencies that are outside nerfstudio team control and can be exploited, e.g., in supply chain attacks. Ruling out such a scenario without taking any action just because it is unlikely is questionable, in my opinion. That said, I completely understand that this project isn't production-grade software but is provided as is (though with good intentions ;) ), and the end user is responsible for preventing any unwanted behaviors. Personally, I think that changing the password on the first container run isn't that much of a problem, assuming the container is stopped and not deleted after exiting (no
In summary, container workflow stays the same ( I can make changes in coming week, so that there will be actual Dockerfile to look at. Many thanks for your feedback and pointing out too strict approach from my side. That is quite the long one :) |
I have updated this PR. I brought back |
@Zunhammer any thoughts? |
@Zunhammer Could you follow up this PR? Does the current state look good to you? |
Minor simplifications
Custom rules for sudo group Comented lines for easy image modification
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @SwirtaB
sorry for the late reply. To me it looks good.
No worries; I am glad I could contribute to this project. |
I have slightly changed the Dockerfile to better comply with the OCI standard so that other container engines can be used (e.g., podman).
Modifications:
This image can be successfully built and run with podman fully rootless, without any additional build parameters. I do not have ability to test it against docker build engine I would be grateful if one could test it. If you find this PR worth integrating I can update documentation to address deploying container in fully rootless mode.