Colin Walters 6ba647a663 docker: Don't use a hardcoded root password
Best practice is to use unprivileged service daemons inside Docker
containers.  But with this hardcoded root password, in the case of
remote code execution, an attacker could trivially escalate their
privileges to root/uid 0.  And while that's uid 0 inside a container,
that's a much larger attack surface.

Instead, do the same thing we're doing for the Cloud images: lock the
root password, create a user to make Anaconda happy, then delete the
user in %post.

https://bugzilla.redhat.com/show_bug.cgi?id=1175997
2015-05-06 14:36:59 -04:00
2008-12-13 13:59:59 +01:00
2010-04-08 23:18:18 -04:00
2013-01-30 10:41:58 -08:00
2015-01-18 10:40:50 -05:00
2013-01-08 12:41:26 -08:00
2014-05-06 12:31:06 -05:00
2014-05-06 12:31:06 -05:00
2014-05-06 12:31:06 -05:00
2015-02-20 14:44:56 +01:00
2014-12-12 16:18:43 -08:00
2013-10-18 15:10:14 -05:00
2013-06-29 13:53:08 -05:00

The master branch is where development takes place:
 - it may contain kickstart files that are broken, or
 - spin concepts that are in the process of being
   approved by the Board (trademark approval), or
 - spin concepts that are in the process of being
   approved by the Spins SIG

The release specific branches contain spin concepts that:
 - are approved (both by Board and Spin SIG)
 - maintained for the remainder of the release cycle

git clone ssh://git.fedorahosted.org/git/spin-kickstarts.git spin-kickstarts
cd spin-kickstarts
# If you need a specific branch other than master:
git checkout BRANCHNAME
# No tag has been added yet tag HEAD with
git tag VERSION
git push --tags
make
# Publish the released tar ball
make publish
# Clean up the generated files:
make clean
Description
This project is used to manage the Fedora kickstart files used in composing Fedora release images.
Readme 2.8 MiB
Languages
Python 58.3%
JavaScript 33%
Makefile 8.7%