Skip to content

Latest commit

 

History

History
41 lines (30 loc) · 2.86 KB

project.md

File metadata and controls

41 lines (30 loc) · 2.86 KB

${{ content_synopsis }} This image will run a proxy to access your docker socket as read-only. The exposed proxy socket is run as 1000:1000, not as root, although the image starts the proxy process as root to interact with the actual docker socket. There is also a TCP endpoint started at 2375 that will also proxy to the actual docker socket if needed. It is not exposed by default and must be exposed via using - "2375:2375/tcp" in your compose.

Make sure that the docker socket is accessible by the user: specification in your compose, if the UID/GID are not correct, the image will print out the correct UID/GID for you to set:

socket-proxy-1  | 2025/03/26 10:16:33 can’t access docker socket as GID 0 owned by GID 991
socket-proxy-1  | please change the user setting in your compose to the correct UID/GID pair like this:
socket-proxy-1  | services:
socket-proxy-1  |   socket-proxy:
socket-proxy-1  |     user: "0:991"

${{ content_uvp }} Good question! All the other images on the market that do exactly the same don’t do or offer these options:

g i t h u b :> [ ! I M P O R T A N T ] {{ github:> }}* This image runs the proxy part as a specific UID/GID (not root), most other images run everything as root g i t h u b :> T h i s i m a g e u s e s a s i n g l e b i n a r y , m o s t o t h e r i m a g e s u s e a p p s l i k e N g i n x o r H A P r o x y ( b l o a t ) {{ github:> }}* This image has no shell since it is 100% distroless, most other images run on a distro like Debian or Alpine with full shell access (security) g i t h u b :> T h i s i m a g e d o e s n o t s h i p w i t h a n y c r i t i c a l o r h i g h r a t e d C V E a n d i s a u t o m a t i c a l l y m a i n t a i n e d v i a C I / C D , m o s t o t h e r i m a g e s m o s t l y h a v e n o C V E s c a n n i n g o r c o d e q u a l i t y t o o l s i n p l a c e {{ github:> }}* This image is created via a secure, pinned CI/CD process and immune to upstream attacks, most other images have upstream dependencies that can be exploited g i t h u b :> T h i s i m a g e c o n t a i n s a p r o p e r h e a l t h c h e c k t h a t v e r i f i e s t h e a p p i s a c t u a l l y w o r k i n g , m o s t o t h e r i m a g e s h a v e e i t h e r n o h e a l t h c h e c k o r o n l y c h e c k i f a p o r t i s o p e n o r p i n g w o r k s {{ github:> }}* This image exposes the socket as a UNIX socket and TCP socket, most other images only expose it via a TCP socket ${{ github:> }}* This image works as read-only, most other images need to write files to the image filesystem

If you value security, simplicity and the ability to interact with the maintainer and developer of an image. Using my images is a great start in that direction.

${{ content_compose }}

${{ content_environment }} | SOCKET_PROXY_VOLUME | path to the docker volume used to expose the prox socket | /run/proxy | | SOCKET_PROXY_DOCKER_SOCKET | path to the actual docker socket | /run/docker.sock | | SOCKET_PROXY_UID | the UID used to run the proxy parts | 1000 | | SOCKET_PROXY_GID | the GID used to run the proxy parts | 1000 |

${{ content_source }}

${{ content_parent }}

${{ content_built }}

${{ content_tips }}