fix: Unprivileged container image #1502
Draft
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
This PR introduces support for running container images in an unprivileged mode. It removes the requirement for elevated permissions and improves overall security by isolating runtime operations from host privileges.
Details:
starlakeinside the containerUID=1001andGID=0as requested in the Openshift guidelines.GID=0groupWhy:
Improves security posture, reduces attack surface, and aligns with best-practice least-privilege principles.
PR Type: Bug Fix | Feature | Documentation
Status: WIP
Breaking change? No
Description
Other changes
Small fixes in the docker scripts.
Remaining Todos
This should be done before merging this PR:
user: 0on the containers needing privileges).Contributor checklist:
Go over all the following points, and put an
xin all the boxes that apply.If you're unsure about any of these, don't hesitate to ask. We're here to help!