• @[email protected]
    link
    fedilink
    English
    202 years ago

    Isn’t it about people pushing their keys to public? I feel like this doesn’t affect the pulling side

    • @Burn1ngBull3t
      link
      English
      112 years ago

      It’s actually how people build their images, in which some include sensitive data (when they should definitely not). It’s the same problem as exposed S3 buckets actually, nothing wrong with docker in itself.

      • @Dasnap
        link
        English
        62 years ago

        aws s3 sync s3://barrys-nudes/ .

      • 𝘋𝘪𝘳𝘬
        link
        fedilink
        English
        22 years ago

        Have you seen the instructions on how to build the Lemmy images? That’s some crazy shit …

        • @Burn1ngBull3t
          link
          English
          12 years ago

          Actually yes, I had a look at them since i wanted to write HelmCharts for the community. That’s also where the community can step up, it can only be better 😊

          • 𝘋𝘪𝘳𝘬
            link
            fedilink
            English
            12 years ago

            I actually started looking into creating own Docker images because of how bad Lemmy’s Docker instructions are. I’m not even close to anything usable, though …

            • @Burn1ngBull3t
              link
              English
              12 years ago

              I understand! If you need help to do that (or someone to contribute), hit me up ! 😄

    • @[email protected]
      link
      fedilink
      English
      32 years ago

      I guess it depends, if it’s a secret in use for the image, an attacker might use it to attack a pulled instance if the user deploying it didn’t change the secret. Kind of like an unchanged initial password.