2daf4331a6
Fixes a hypothetical security issue related to privilege escalation via rootwrap/privsep. A potential vulnerable service could previously allow writes to its rootwrap/privsep config and thus allow for more commands to be run with root privileges via rootwrap/privsep. For a succesful attack, this would also require the service to allow to run arbitrary commands via rootwrap/privsep. Thus far, no such vulnerabilities have been reported and thus this fix is simply strengthening the container images against such an issue in the future. Change-Id: I92c81c77e6a16570a108cde8031f7977930fb02a Closes-Bug: #1874298
29 lines
1006 B
Django/Jinja
29 lines
1006 B
Django/Jinja
FROM {{ namespace }}/{{ image_prefix }}openstack-base:{{ tag }}
|
|
{% block labels %}
|
|
LABEL maintainer="{{ maintainer }}" name="{{ image_name }}" build-date="{{ build_date }}"
|
|
{% endblock %}
|
|
|
|
{% block magnum_base_header %}{% endblock %}
|
|
|
|
{% import "macros.j2" as macros with context %}
|
|
|
|
{{ macros.configure_user(name='magnum') }}
|
|
|
|
ADD magnum-base-archive /magnum-base-source
|
|
|
|
{% set magnum_base_pip_packages = [
|
|
'/magnum[osprofiler]'
|
|
] %}
|
|
|
|
COPY extend_start.sh /usr/local/bin/kolla_extend_start
|
|
|
|
RUN ln -s magnum-base-source/* magnum \
|
|
&& {{ macros.install_pip(magnum_base_pip_packages | customizable("pip_packages")) }} \
|
|
&& mkdir -p /etc/magnum \
|
|
&& cp -r /magnum/etc/magnum/* /etc/magnum \
|
|
&& mv /etc/magnum/keystone_auth_default_policy.sample /etc/magnum/keystone_auth_default_policy.json \
|
|
&& touch /usr/local/bin/kolla_magnum_extend_start \
|
|
&& chmod 644 /usr/local/bin/kolla_extend_start /usr/local/bin/kolla_magnum_extend_start
|
|
|
|
{% block magnum_base_footer %}{% endblock %}
|