ocean
ocean copied to clipboard
[Core] feat: adjust Dockerfile use unprivileged user
User description
Description
What
Refactored the Docker image and startup scripts to transition the Ocean user to a strictly non-privileged account (UID 1001) without sudo access. Implemented a user-space mechanism for handling CA certificates.
Why
Many enterprise security policies (e.g., strict Kubernetes clusters, OpenShift) prohibit containers running with root privileges or users with sudo access. The previous implementation required sudo to run update-ca-certificates when new certs were mounted, which blocked deployment in these secure environments.
How
Removed Privileges: Removed the sudo package and the specific sudoers configuration that allowed the ocean user to run root commands.
User ID Update: Changed the default OCEAN_USER_ID to 1001 to align with standard non-system user ranges.
User-Space Cert Sync: Introduced sync_ca_certs.sh, a script that:
Scans system and mounted certificate directories (e.g., /etc/ssl/certs).
Copies them to a user-owned directory (/home/ocean/.local/share/ca-certificates).
Generates a local ca-certificates.crt bundle.
Environment Configuration: Configured standard SSL environment variables (SSL_CERT_DIR, SSL_CERT_FILE, REQUESTS_CA_BUNDLE) to force applications (Python, curl, etc.) to use the new user-owned certificate location instead of the system default.
Type of change
Please leave one option from the following and delete the rest:
- [ ] Bug fix (non-breaking change which fixes an issue)
- [ ] New feature (non-breaking change which adds functionality)
- [ ] New Integration (non-breaking change which adds a new integration)
- [ ] Breaking change (fix or feature that would cause existing functionality to not work as expected)
- [ ] Non-breaking change (fix of existing functionality that will not change current behavior)
- [ ] Documentation (added/updated documentation)
All tests should be run against the port production environment(using a testing org).
Core testing checklist
- [ ] Integration able to create all default resources from scratch
- [ ] Resync finishes successfully
- [ ] Resync able to create entities
- [ ] Resync able to update entities
- [ ] Resync able to detect and delete entities
- [ ] Scheduled resync able to abort existing resync and start a new one
- [ ] Tested with at least 2 integrations from scratch
- [ ] Tested with Kafka and Polling event listeners
- [ ] Tested deletion of entities that don't pass the selector
Integration testing checklist
- [ ] Integration able to create all default resources from scratch
- [ ] Completed a full resync from a freshly installed integration and it completed successfully
- [ ] Resync able to create entities
- [ ] Resync able to update entities
- [ ] Resync able to detect and delete entities
- [ ] Resync finishes successfully
- [ ] If new resource kind is added or updated in the integration, add example raw data, mapping and expected result to the
examplesfolder in the integration directory. - [ ] If resource kind is updated, run the integration with the example data and check if the expected result is achieved
- [ ] If new resource kind is added or updated, validate that live-events for that resource are working as expected
- [ ] Docs PR link here
Preflight checklist
- [ ] Handled rate limiting
- [ ] Handled pagination
- [ ] Implemented the code in async
- [ ] Support Multi account
Screenshots
Include screenshots from your environment showing how the resources of the integration will look.
API Documentation
Provide links to the API documentation used for this integration.
PR Type
Enhancement
Description
-
Transition Docker containers to unprivileged user for security compliance
-
Create CA certificate sync mechanism for non-root user access
-
Update user ID from 999 to 1001 and remove sudo dependency
-
Configure SSL environment variables for certificate discovery
Diagram Walkthrough
flowchart LR
A["Privileged Setup<br/>User ID 999<br/>sudo + update-ca-certificates"] -->|"Replace with"| B["Unprivileged Setup<br/>User ID 1001<br/>sync_ca_certs.sh"]
B --> C["CA Certs in<br/>/home/ocean/.local/share"]
B --> D["SSL Environment<br/>Variables Set"]
C --> E["Non-root Container<br/>Security Compliant"]
D --> E
File Walkthrough
| Relevant files | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Enhancement |
|