osrm-backend/docker
michael 9026cb10f9 General security practices say you run with the least privileges required,
network daemons are particularly at risk when running as root as a bug in
the daemon will give a remote attacker root access in the container,
it's easier then to break out with root access on the host.
Docker says in https://docs.docker.com/engine/security/security/#conclusions

"Docker containers are, by default, quite secure;
especially if you run your processes as non-privileged users inside the container."

add user osrm and package su-exec and change example to use it
2018-07-18 04:44:46 +10:00
..
hooks Configure Dockerfile for integration with Docker Cloud/Dockerhub for (#3850) 2017-03-21 12:53:12 -07:00
Dockerfile General security practices say you run with the least privileges required, 2018-07-18 04:44:46 +10:00