This repo contains a series of Dockerfiles to create an NGINX Docker image that runs NGINX as a non root, unprivileged user. Notable differences with respect to the official NGINX Docker image include:
- The default NGINX listen port is now
8080instead of80(this is no longer necessary as of Docker20.03but it's still required in other container runtimes) - The default NGINX user directive in
/etc/nginx/nginx.confhas been removed - The default NGINX PID has been moved from
/var/run/nginx.pidto/tmp/nginx.pid - Change
*_temp_pathvariables to/tmp/*
New images are built and pushed to on a weekly basis (every Monday night).
Check out the docs for the upstream Docker NGINX image for a detailed explanation on how to use this image.
You can find pre-built images in each of the following registries:
- Amazon ECR - https://gallery.ecr.aws/nginx/nginx-unprivileged
- Docker Hub - https://hub.docker.com/r/nginxinc/nginx-unprivileged
- GitHub Container Registry - https://github.com/nginxinc/docker-nginx-unprivileged/pkgs/container/nginx-unprivileged
- Quay - https://quay.io/repository/nginx/nginx-unprivileged
Most images are built for the amd64, arm32v5 (for Debian), arm32v6 (for Alpine), arm32v7, arm64v8, i386, mips64le (for Debian), ppc64le and s390x architectures.
- If you override the default
nginx.conffile you may encounter various types of error messages:-
To fix
nginx: [emerg] open() "/var/run/nginx.pid" failed (13: Permission denied), you have to specify a validpidlocation by adding the linepid /tmp/nginx.pid;at the top level of your config. -
To fix
nginx: [emerg] mkdir() "/var/cache/nginx/client_temp" failed (30: Read-only file system), you have to specify a valid location for the various NGINX temporary paths by adding these lines within thehttpcontext:http { client_body_temp_path /tmp/client_temp; proxy_temp_path /tmp/proxy_temp_path; fastcgi_temp_path /tmp/fastcgi_temp; uwsgi_temp_path /tmp/uwsgi_temp; scgi_temp_path /tmp/scgi_temp; ... }
-
Whilst issues and PRs are welcome, please do note that:
- Issues related to security vulnerabilities will be promptly closed unless they are accompanied by a solid reasoning as to why the vulnerability poses a real security threat to this image. Check out the
SECURITYdoc for more details. - These images are unprivileged ports of the upstream Docker NGINX images. Any changes that do not specifically involve the changes made to run NGINX on an unprivileged system should be reported in the Docker NGINX upstream repo. They will not get addressed here.
- Following from 2., base images (e.g. Alpine x.x or Debian x) in the Docker NGINX upstream repo get updated when a new version of NGINX is released, never within the same release version. Similarly, new NGINX releases usually make their way to the Docker NGINX image a couple days after their standard release. Please refrain from opening an issue or PR here if the upstream repo hasn't been updated -- it will be closed.
Please see the contributing guide for guidelines on how to best contribute to this project.
© F5, Inc. 2018 - 2024