Skip to content

containerization is needlessly locked into low security docker #885

@zancas

Description

@zancas

Observation

docker has multiple serious architectural security flaws that make it unacceptable for developers to run locally.

The OCI protocol which podman implements provides containerization without root users and daemons.

Location in codebase

In order to leverage mutiple containerization platforms it's useful to specify the container manifests uniquely. This single source of truth approach significantly ease the management of the containerization system, and makes it easier to use different implementations of the OCI against mostly the same spec.

Type of concern

Other

Impact

When solved the result will be a more coherent containerization policy that's more hackable, and more portable to more secure containerization toolkits.

Suggested direction

No response

Metadata

Metadata

Assignees

No one assigned

    Labels

    architectureArchitectural improvements

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions