You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Adding the Linux user e.g. whoami > omar to the docker group is discouraged by docker these days -- for good reasons. It is the equivalent of providing passwordless sudo to all running applications and their plugins.
MacOS or even Linux Docker Desktop users don't have this issue because Docker runs in its own Virtual Machine, therefore there's no need to adding the user to the docker group.
The docker group grants root-level privileges to the user [and all running applications, which makes desktop users very vulnerable]. For details on how this impacts security in your system, see Docker Daemon Attack Surface. -- Docker docs in addition to my explanation between brackets.
Tutor gives this advice -- which I think it shouldn't:
Use rootless docker. I recently started using rootless docker which is -- surprisingly -- compatible with the Open edX devstack. Last time I tested it with Tutor I had problems. I plan to test again in two weeks or so.
Describe alternatives you've considered
Enforce sudo prefix to all docker calls.
I usually solve this by creating two scripts in the ~/bin directory, which is a non-standard solution that I came up with:
Is your feature request related to a problem? Please describe.
Adding the Linux user e.g.
whoami > omar
to thedocker
group is discouraged by docker these days -- for good reasons. It is the equivalent of providing passwordless sudo to all running applications and their plugins.MacOS or even Linux Docker Desktop users don't have this issue because Docker runs in its own Virtual Machine, therefore there's no need to adding the user to the
docker
group.Tutor gives this advice -- which I think it shouldn't:
tutor/tutor/commands/cli.py
Lines 115 to 119 in faf43bd
Describe the solution you'd like
Use rootless docker. I recently started using rootless docker which is -- surprisingly -- compatible with the Open edX devstack. Last time I tested it with Tutor I had problems. I plan to test again in two weeks or so.
Describe alternatives you've considered
Enforce sudo prefix to all docker calls.
I usually solve this by creating two scripts in the
~/bin
directory, which is a non-standard solution that I came up with:Which works 99% of the cases, but sometimes fails if Docker-compose or
devstack
tries to do something "too smart"/complicated.It's annoying since it requires entering a password for every new Terminal instance for even the simplest commands like
docker ps
.Additional context
The text was updated successfully, but these errors were encountered: