This allows haproxy to read the socket, whilst running as a non-privileged user. The container itself needs to run as root to create the group, but haproxy itself changes its own group after startup.pull/70/head
parent
104914f212
commit
c73447028f
@ -0,0 +1,10 @@
|
||||
#!/bin/sh
|
||||
|
||||
set -e
|
||||
|
||||
# Create a group with the same gid as the docker socket
|
||||
export DOCKER_GID=$(stat -c "%g" $SOCKET_PATH)
|
||||
addgroup -g $DOCKER_GID docker
|
||||
|
||||
# Run the original entrypoint - Our work here is done.
|
||||
exec /usr/local/bin/docker-entrypoint.sh $@
|
Loading…
Reference in new issue