-
Notifications
You must be signed in to change notification settings - Fork 19
Preserve ssh keys and resolv.conf #918
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -5,6 +5,8 @@ RUN mkdir -p /keylime-tests /etc/ima/ | |
COPY 10-ima_kargs.toml /usr/lib/bootc/kargs.d/10-ima_kargs.toml | ||
COPY ima-policy /etc/ima/ima-policy | ||
COPY yum.repos.d/* /etc/yum.repos.d/ | ||
COPY .ssh /var/roothome/.ssh | ||
COPY resolv.conf /etc/resolv.conf | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. issue (bug_risk): Overwriting /etc/resolv.conf may interfere with container DNS resolution. Copying a static resolv.conf may break DNS in environments with dynamic DNS assignment. Please verify this is required and that the file's contents are suitable for all deployment contexts. |
||
ARG KEYLIME_BOOTC_INSTALL_PACKAGES="rsync beakerlib selinux-policy-devel swtpm swtpm-tools nmap keylime expect" | ||
RUN dnf -y install ${KEYLIME_BOOTC_INSTALL_PACKAGES} | ||
RUN sed -i '/tss/ d' /usr/lib/group; ls -ld /etc/keylime /var/lib/keylime; ls -l /etc/keylime /var/lib/keylime; /bin/true | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚨 issue (security): Consider potential security implications of copying SSH keys into the container.
Copying the entire .ssh directory may expose private keys or sensitive files. Only copy required public keys or configuration files, and verify that private keys are excluded and permissions are secure.