assuming a readonly root, if we gen certs, don't overwrite the originals#11293
assuming a readonly root, if we gen certs, don't overwrite the originals#11293
Conversation
8bab3bf to
0db2853
Compare
Signed-off-by: Caolán McNamara <caolan.mcnamara@collabora.com> Change-Id: Id1077ff63203f74f4802af087558a6ae652fbcf1
0db2853 to
d294c6a
Compare
|
If we do this, then we can get a step closer to a running under docker --read-only |
Is this because /tmp is in memory so it does not count? As a side note, I always wanted to get rid of this startup shell script. (I expect next time we will be asked to start coolwsd directly, remove shell as an attack vector etc.) |
With docker --read-only (from man docker-run) apparently you get an implied additional option that is "When running --read-only containers, mount a read-write tmpfs on /dev, /dev/shm, /run, /tmp, and /var/tmp. The default is true". So /tmp is still writable unless there is an additional --read-only-tmpfs=false at which point "In this mode writable directories need to be added via external volumes or mounts". The report, so far, has been a permission failure on the cp to the final dest, not the initial generation in /tmp, so I think its safe to assume a writeable /tmp (and /var/tmp), but not a writeable /etc
That's my thinking here. |
Change-Id: Id1077ff63203f74f4802af087558a6ae652fbcf1
Summary
TODO
Checklist
make prettier-writeand formatted the code.make checkmake runand manually verified that everything looks okay