-
Notifications
You must be signed in to change notification settings - Fork 2k
Description
We're considering a plan to make all the images we publish as non-root-capable (as a turnkey experience). That would be a significant change in security posture and enablement for users. At least in the .NET space, it would change the conversation on secure hosting of apps in containers.
We've always thought of the samples we ship as a sort of technology demonstration. It's much easier to understand what .NET in containers (or just containers generally) is all about if you can quickly try a sample/demo. Clearly, if we're adopting non-root as a pillar of our offering, it makes sense to publish the samples as non-root. We want the samples to be our best mainline opinionated offering.
What does that mean?
- Samples would be configured to a non-root user
- The
aspnetappsamples would not longer listen on port80but on a non-privileged port, like5000or8080. - Anyone relying on the samples that was relying on the images being configured with the
rootuser or to listen on port80would be broken.
We're happy for folks to use these images. If you are using the aspnetapp one in particular, you should configured the port you want use yourself with ASPNETCORE_URLS and ensure you use a non-privileged port. We know of some folks using this image for testing, so this concern isn't theoretical.
We can make this change in steps:
- Publish an
aspnetapp-nonrootimage, per this proposal. - Give folks an opportunity to test it and provide feedback.
- Publish the non-root image as
aspnetappafter two months (assuming no reason to do otherwise). - Delete the
aspnetapp-nonrootimage from the registry.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status