I actually believe that s2i and Colins concept of building images as non
root have a great potential synergy.  The biggest fear I have right now
from a security point of view is allowing users to upload random
dockerfiles and allowing them to build.



On 02/11/2016 05:00 PM, Clayton Coleman wrote:
> I really want to look at making this a first class build path in
> OpenShift - it has a ton of advantages for builds of base images, and
> enables admins to slice and dice their toolchains.  The question that
> has held it up so far is what API surface does it need - maybe make
> s2i capable of leveraging the concepts 
>
> On Feb 11, 2016, at 4:54 PM, Colin Walters <walt...@verbum.org
> <mailto:walt...@verbum.org>> wrote:
>
>> On Thu, Feb 11, 2016, at 05:08 AM, Daniel Riek wrote:
>>>  
>>> * Enable mounting containers as volumes (unless I am mistaken, right
>>> now we can only mount host directories as volumes? Might be wrong)
>>  
>> This is:
>> https://github.com/docker/docker/issues/7115
>>  
>> The thing that gets really messy is, sure you can mount another container
>> with dnf or whatever at /build/dnf, but everything that is used as
>> part of a build
>> needs to be effectively statically linked.  Or alternatively, compute
>> a union of files in /usr/bin.  But
>> then you have to look for *new files* that the build may have dropped
>> in /usr/bin,
>> while still deleting files from the union from the build.
>>  
>> The rpm-ostree container approach to this is that builds always
>> output rpms,
>> except it runs as non-root, (and we can make that *much* faster than
>> a simple aggregation of yum install + docker)
>> but it also supports aggregating them into final images.
>>  
>>  

Reply via email to