File: feature-docker.xml

package info (click to toggle)
cockpit 188-1
  • links: PTS, VCS
  • area: main
  • in suites: buster
  • size: 119,768 kB
  • sloc: ansic: 66,833; xml: 5,776; python: 3,122; sh: 2,322; makefile: 1,289; sed: 7
file content (31 lines) | stat: -rw-r--r-- 1,600 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
<?xml version="1.0"?>
<!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
	"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<chapter id="feature-docker">
  <title>Docker</title>

  <para>Cockpit can manage containers via <ulink url="https://www.docker.com/">Docker</ulink>.
    This functionality is present in the Cockpit <emphasis>docker</emphasis> package.</para>

  <para>Cockpit communicates with the Docker daemon via its API via the
    <filename>/var/run/docker.sock</filename> unix socket. The Docker API
    is root equivalent, and on a properly configured system, only <code>root</code>
    can access the Docker API. If the currently logged in user is not <code>root</code>
    then Cockpit will try to
    <link linkend="privileges">escalate the user's privileges</link> via Polkit
    or sudo before connecting to the socket.</para>

  <para>Alternatively one may
    <ulink url="https://docs.docker.com/engine/installation/linux/rhel/#/create-a-docker-group">create a <code>docker</code> unix group</ulink>. Anyone in that <code>docker</code> group can then access
    the Docker API, and gain root privileges on the system. This
    <ulink url="https://docs.docker.com/engine/security/security/#docker-daemon-attack-surface">impacts system security</ulink>
    and is not recommended for general usage.</para>

  <para>Similar container functionality is available on the command line via the
    <filename>docker</filename> tool:</para>

<programlisting>
$ <command>sudo docker run -ti fedora /bin/bash</command>
[root@57625bc8787e /]#
</programlisting>
</chapter>