Description
Recently when I removed curl
from our own, derived nginx
images, I was quite suprised to learn the base image actually contains curl
already since the upgrade to 1.18.0. This was added as a fix for #378
I was trying to remove curl
from our images, as there is no really good reason for it to be in a web server image in the first place (we were previously using it for health checks only), and it also triggers a range of security scanning reports with High severity. See for example a snyk report for current version. This has actually been reported as an issue also: #657
I am aware that those are false positives, but I would prefer a basic webserver image to come "as clean as possible" - now everybody scanning any derived image for vulnerabilities will have to deal with this in some way or the other.
But while it's easy to add curl
(or wget
for the sake of it) to an upstream base image like your nginx
images, it is not actually possible to my knowledge to remove it. Yes, we can apt-get remove
it and thus hide it, but it has still been installed as one of those immutable layers in the image...
Note that the same issue was actually also brought up by @hsblhsn for the unprivileged image here, but closed for the time being.
In fact the unprivileged image is also my main focus, but as those two images are closely related, I use both and this one here gets more attention, I figured I'd rather have this discussed here 😉
So could we maybe reconsider this decision?