![]() The unprivileged user will spawn the containers as root likewise. We drop permissions for every exposed application and will not run an exposed service as root! Controlling the Docker daemon as non-root user does not give you additional security. It might be necessary to change ownership and other attributes of files you will otherwise not have access to. The update.sh script must therefore also be run as root. We will modify attributes - if necessary - while bootstrapping the containers automatically and make sure everything is secured. Please clone the repository as root user and also control the stack as root. Install mailcow ¶Ĭlone the master branch of the repository, make sure your umask equals 0022. ![]() If you are interested in how this works, you can check out the readme of which links to a lot of useful information on that topic. This step is required to make sure mailcows volumes are properly labeled as declared in the compose file. After successful configuration of AWX and relevant containers. It will take time, according to your servers specs, therefore sit back and relax for a while. ![]() Ansible uses docker-compose to create the required containers by AWX. ansible-playbook -i inventory install.yml. Restart the docker daemon and verify SELinux is now enabled. Install AWX by using ansible-playbook command. Users without an IPv6 enabled network on their host system
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |