2daf4331a6
Fixes a hypothetical security issue related to privilege escalation via rootwrap/privsep. A potential vulnerable service could previously allow writes to its rootwrap/privsep config and thus allow for more commands to be run with root privileges via rootwrap/privsep. For a succesful attack, this would also require the service to allow to run arbitrary commands via rootwrap/privsep. Thus far, no such vulnerabilities have been reported and thus this fix is simply strengthening the container images against such an issue in the future. Change-Id: I92c81c77e6a16570a108cde8031f7977930fb02a Closes-Bug: #1874298
37 lines
1.1 KiB
Django/Jinja
37 lines
1.1 KiB
Django/Jinja
FROM {{ namespace }}/{{ image_prefix }}openstack-base:{{ tag }}
|
|
{% block labels %}
|
|
LABEL maintainer="{{ maintainer }}" name="{{ image_name }}" build-date="{{ build_date }}"
|
|
{% endblock %}
|
|
|
|
{% block tacker_base_header %}{% endblock %}
|
|
|
|
{% import "macros.j2" as macros with context %}
|
|
|
|
{{ macros.enable_extra_repos(['openvswitch']) }}
|
|
{{ macros.configure_user(name='tacker') }}
|
|
|
|
ADD tacker-base-archive /tacker-base-source
|
|
ADD plugins-archive /
|
|
|
|
{% set tacker_base_pip_packages = [
|
|
'/tacker'
|
|
] %}
|
|
|
|
{% set tacker_base_plugins_pip_packages = [
|
|
'/plugins/*'
|
|
] %}
|
|
|
|
COPY extend_start.sh /usr/local/bin/kolla_extend_start
|
|
|
|
RUN ln -s tacker-base-source/* tacker \
|
|
&& {{ macros.install_pip(tacker_base_pip_packages | customizable("pip_packages")) }} \
|
|
&& mkdir -p /etc/tacker \
|
|
&& cp -r /tacker/etc/tacker/* /etc/tacker \
|
|
&& if [ "$(ls /plugins)" ]; then \
|
|
{{ macros.install_pip(tacker_base_plugins_pip_packages) }}; \
|
|
fi \
|
|
&& touch /usr/local/bin/kolla_tacker_extend_start \
|
|
&& chmod 644 /usr/local/bin/kolla_extend_start /usr/local/bin/kolla_tacker_extend_start
|
|
|
|
{% block tacker_base_footer %}{% endblock %}
|