You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
All need to be readable by the public (and the folder needs to be executable). They're copied into /var/lib/crowdsec/data/ during initialization and a regular user cannot read them, but I see no reason why that is true since you can just download these databases.
Need their permissions set to -rw-r--r-- as well since they're not a secret if sourced from staging.
If you are sure their permissions should be -rw------- or drwx------ during operation, add in a chmod 600 ... after the copy call during setup.
With those minor changes crowdsec can be deployed in a user-only, read-only environment with minimal hassle. Thanks for making crowdsec!
What did you expect to happen?
Docker container to be able to be run as a user in read-only mode.
How can we reproduce it (as minimally and precisely as possible)?
Here's an example docker-compose.yml file that bypasses the permission issues, but should not be required. It's set up to work with caddy, as an aside.
Check Releases to make sure your agent is on the latest version.
Details
I am a bot created to help the crowdsecurity developers manage community feedback and contributions. You can check out my manifest file to understand my behavior and what I can do. If you want to use this for your project, you can check out the BirthdayResearch/oss-governance-bot repository.
What happened?
The files and folder in
/staging/var/lib/crowdsec/data/
:All need to be readable by the public (and the folder needs to be executable). They're copied into
/var/lib/crowdsec/data/
during initialization and a regular user cannot read them, but I see no reason why that is true since you can just download these databases.A fix would be setting them to:
Additionally in
/staging/etc/crowdsec/
two files:Need their permissions set to
-rw-r--r--
as well since they're not a secret if sourced from staging.If you are sure their permissions should be
-rw-------
ordrwx------
during operation, add in achmod 600 ...
after the copy call during setup.With those minor changes crowdsec can be deployed in a user-only, read-only environment with minimal hassle. Thanks for making crowdsec!
What did you expect to happen?
Docker container to be able to be run as a user in read-only mode.
How can we reproduce it (as minimally and precisely as possible)?
Here's an example
docker-compose.yml
file that bypasses the permission issues, but should not be required. It's set up to work with caddy, as an aside.Anything else we need to know?
No response
Crowdsec version
OS version
No response
Enabled collections and parsers
No response
Acquisition config
Config show
Prometheus metrics
No response
Related custom configs versions (if applicable) : notification plugins, custom scenarios, parsers etc.
No response
The text was updated successfully, but these errors were encountered: