network daemons are particularly at risk when running as root as a bug in the daemon will give a remote attacker root access in the container, it's easier then to break out with root access on the host. Docker says in https://docs.docker.com/engine/security/security/#conclusions "Docker containers are, by default, quite secure; especially if you run your processes as non-privileged users inside the container." add user osrm and package su-exec and change example to use it |
||
|---|---|---|
| .. | ||
| hooks | ||
| Dockerfile | ||