This allows haproxy to read the socket, whilst running as a non-privileged user. The container itself needs to run as root to create the group, but haproxy itself changes its own group after startup.pull/70/head
parent
104914f212
commit
c73447028f
@ -0,0 +1,10 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
# Create a group with the same gid as the docker socket
|
||||||
|
export DOCKER_GID=$(stat -c "%g" $SOCKET_PATH)
|
||||||
|
addgroup -g $DOCKER_GID docker
|
||||||
|
|
||||||
|
# Run the original entrypoint - Our work here is done.
|
||||||
|
exec /usr/local/bin/docker-entrypoint.sh $@
|
Loading…
Reference in new issue