I'm working actively and administratively with systemd for years, have
read plenty of documentation, but that's the first time I hear and read
about „systemd drop-in”.

However, overriding the complate ExecStart line is unsecure and error
prone since it breaks updates and changes to ExecStart updates that
might come with updated packages.

In general: it is highly dangerous and sort of unbearable, to offer a
docker that rigorously breaks any firewall rules. As far as I can see
docker inserts iptables rules aggressively into the beginning of rules
and always allows just everything to everyone.

That's a no go on productive systems.

Is this behaviour part of docker.io itself, or does this come with the
debian/ubuntu package?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1858248

Title:
  /lib/systemd/system/docker.service lacks EnvironmentFile

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/docker.io/+bug/1858248/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to