Commit Graph

15 Commits

Author SHA1 Message Date
zonyitoo
e05ab8adee upgrade Dockerfile and Debian/changelog 2022-12-17 09:48:04 +08:00
zonyitoo
ca0e85d367 put CC inline 2022-07-20 01:23:50 +08:00
zonyitoo
b0af7df6b2 override before add target 2022-07-20 00:52:21 +08:00
zonyitoo
04166795f6 docker build with nightly 2022-07-20 00:38:51 +08:00
zonyitoo
afdbdd922c set PATH with MUSL bin 2022-07-20 00:10:36 +08:00
vndroid
ed4bea6558 Update
- Builder based environment move to Alpine
- Final image update to 3.16
2022-06-29 16:46:27 +08:00
vndroid
7ce6945c78 Minor update
- Remove useless configuration.
- Docker container running as root user, the program running as nobody user
2022-06-29 16:46:27 +08:00
zonyitoo
59e80ff1fe move Dockerfile to workspace root 2022-06-29 01:36:34 +08:00
zonyitoo
64ad58bd61 switch user with -a, docker adds entrypoint script, #876 2022-06-29 00:31:57 +08:00
zonyitoo
f240662d12 enable strip=symbols, 1.59 is already released 2022-03-07 15:28:10 +08:00
zonyitoo
161d87e016 enable strip=symbols for releases 2022-01-31 14:33:26 +08:00
zonyitoo
73ad85dadb release v1.13.0 2022-01-28 10:22:01 +08:00
zonyitoo
d3454dbd9a enable armv8,neon for build scripts 2022-01-28 09:54:10 +08:00
Julia
806ad4898c Update Dockerfile (#618)
Running programs as root that don't require it is a big security risk. Docker is only containerization and not virtualization.
Instead of using the user "nobody" a custom user may be created, but as shadowsocks-rust only uses networking and only reads the config file I see it as unnecessary.
If the server is intended to bind on a privileged port (<1024) Docker's port mapping may be used or a program such as nftables or setcap may be used.
2021-09-05 22:53:34 +08:00
kallydev
e3e5acb266 Add multi-architecture Docker support 2021-07-21 22:49:53 +08:00