signald
Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Container Image

The image is available in GitLab’s container registry: registry.gitlab.com/signald/signald

Tag Description
latest The latest release build
unstable Latest commit, updated automatically by CI
0.18.0 All releases are tagged with the release version

The image is built for amd64 and armv8. Additional architectures may be available upon request.

The images run as user 1337 (as of signald 0.18.0, see note about migrating from previous verisons below)

signald stores both account state files and the unix socket file in /signald. Mount it as a volume:

docker run -v $(pwd)/run:/signald registry.gitlab.com/signald/signald

Beware that if your system uses SELinux, it may silently deny Docker access to the volume you specify.

Additional tools

signaldctl is available in the container and can be used with docker exec.

signaldctl can also be installed outside the container, but needs to know where the /signald volume is mounted on the host. That can be configured with signaldctl config set socketpath /path/to/volume/signald.sock

Docker for Mac

Docker for Mac does not pass correctly sockets via Docker volumes to the host. This Docker issue lays it out in all the gory details. Attempts to connect to the mounted socket result in Connection Refused errors. Connections from other docker containers should work.

Migrating from versions before 0.18.0

Prior to 0.18.0 the signald container image used the root user, which is not recommended for security reasons. This was fixed in the 0.18.0 release which will start as root, fix permissions on the volume, then drop to the non-root user and start signald. Future images (0.19.0+) will start as the non-root user, so if you’re upgrading make sure to run 0.18.0 at least once.

A special tag, 0.18.0-non-root, will be published. it starts as the non-root user and does not fix permissions on the volume.

In 0.18.1, a fix was added to skip trying to fix permissions and drop privileges if the container is started as non-root by some other means.