2015-02-28 00:37:25 -05:00
|
|
|
# docker build -t docker:simple -f Dockerfile.simple .
|
|
|
|
# docker run --rm docker:simple hack/make.sh dynbinary
|
2015-03-09 20:24:49 -04:00
|
|
|
# docker run --rm --privileged docker:simple hack/dind hack/make.sh test-unit
|
2017-06-16 20:18:44 -04:00
|
|
|
# docker run --rm --privileged -v /var/lib/docker docker:simple hack/dind hack/make.sh dynbinary test-integration
|
2015-02-28 00:37:25 -05:00
|
|
|
|
|
|
|
# This represents the bare minimum required to build and test Docker.
|
|
|
|
|
[20.10] update golang to 1.17.12
go1.17.12 (released 2022-07-12) includes security fixes to the compress/gzip,
encoding/gob, encoding/xml, go/parser, io/fs, net/http, and path/filepath
packages, as well as bug fixes to the compiler, the go command, the runtime,
and the runtime/metrics package. See the Go 1.17.12 milestone on the issue
tracker for details:
https://github.com/golang/go/issues?q=milestone%3AGo1.17.12+label%3ACherryPickApproved
This update addresses:
CVE-2022-1705, CVE-2022-1962, CVE-2022-28131, CVE-2022-30630, CVE-2022-30631,
CVE-2022-30632, CVE-2022-30633, CVE-2022-30635, and CVE-2022-32148.
Full diff: https://github.com/golang/go/compare/go1.17.11...go1.17.12
From the security announcement;
https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
We have just released Go versions 1.18.4 and 1.17.12, minor point releases. These
minor releases include 9 security fixes following the security policy:
- net/http: improper sanitization of Transfer-Encoding header
The HTTP/1 client accepted some invalid Transfer-Encoding headers as indicating
a "chunked" encoding. This could potentially allow for request smuggling, but
only if combined with an intermediate server that also improperly failed to
reject the header as invalid.
This is CVE-2022-1705 and https://go.dev/issue/53188.
- When `httputil.ReverseProxy.ServeHTTP` was called with a `Request.Header` map
containing a nil value for the X-Forwarded-For header, ReverseProxy would set
the client IP as the value of the X-Forwarded-For header, contrary to its
documentation. In the more usual case where a Director function set the
X-Forwarded-For header value to nil, ReverseProxy would leave the header
unmodified as expected.
This is https://go.dev/issue/53423 and CVE-2022-32148.
Thanks to Christian Mehlmauer for reporting this issue.
- compress/gzip: stack exhaustion in Reader.Read
Calling Reader.Read on an archive containing a large number of concatenated
0-length compressed files can cause a panic due to stack exhaustion.
This is CVE-2022-30631 and Go issue https://go.dev/issue/53168.
- encoding/xml: stack exhaustion in Unmarshal
Calling Unmarshal on a XML document into a Go struct which has a nested field
that uses the any field tag can cause a panic due to stack exhaustion.
This is CVE-2022-30633 and Go issue https://go.dev/issue/53611.
- encoding/xml: stack exhaustion in Decoder.Skip
Calling Decoder.Skip when parsing a deeply nested XML document can cause a
panic due to stack exhaustion. The Go Security team discovered this issue, and
it was independently reported by Juho Nurminen of Mattermost.
This is CVE-2022-28131 and Go issue https://go.dev/issue/53614.
- encoding/gob: stack exhaustion in Decoder.Decode
Calling Decoder.Decode on a message which contains deeply nested structures
can cause a panic due to stack exhaustion.
This is CVE-2022-30635 and Go issue https://go.dev/issue/53615.
- path/filepath: stack exhaustion in Glob
Calling Glob on a path which contains a large number of path separators can
cause a panic due to stack exhaustion.
Thanks to Juho Nurminen of Mattermost for reporting this issue.
This is CVE-2022-30632 and Go issue https://go.dev/issue/53416.
- io/fs: stack exhaustion in Glob
Calling Glob on a path which contains a large number of path separators can
cause a panic due to stack exhaustion.
This is CVE-2022-30630 and Go issue https://go.dev/issue/53415.
- go/parser: stack exhaustion in all Parse* functions
Calling any of the Parse functions on Go source code which contains deeply
nested types or declarations can cause a panic due to stack exhaustion.
Thanks to Juho Nurminen of Mattermost for reporting this issue.
This is CVE-2022-1962 and Go issue https://go.dev/issue/53616.
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2022-07-13 04:46:39 -04:00
|
|
|
ARG GO_VERSION=1.17.12
|
2019-07-17 07:59:16 -04:00
|
|
|
|
2020-06-24 08:31:04 -04:00
|
|
|
FROM golang:${GO_VERSION}-buster
|
2019-09-11 03:36:53 -04:00
|
|
|
ENV GO111MODULE=off
|
2015-02-28 00:37:25 -05:00
|
|
|
|
2016-11-20 17:14:51 -05:00
|
|
|
# allow replacing httpredir or deb mirror
|
|
|
|
ARG APT_MIRROR=deb.debian.org
|
|
|
|
RUN sed -ri "s/(httpredir|deb).debian.org/$APT_MIRROR/g" /etc/apt/sources.list
|
|
|
|
|
2016-09-21 22:15:18 -04:00
|
|
|
# Compile and runtime deps
|
2015-02-28 00:37:25 -05:00
|
|
|
# https://github.com/docker/docker/blob/master/project/PACKAGERS.md#build-dependencies
|
|
|
|
# https://github.com/docker/docker/blob/master/project/PACKAGERS.md#runtime-dependencies
|
|
|
|
RUN apt-get update && apt-get install -y --no-install-recommends \
|
2016-03-25 00:19:13 -04:00
|
|
|
build-essential \
|
2015-03-18 01:08:17 -04:00
|
|
|
curl \
|
2016-11-03 12:47:50 -04:00
|
|
|
cmake \
|
2015-02-28 00:37:25 -05:00
|
|
|
gcc \
|
|
|
|
git \
|
2016-03-25 00:19:13 -04:00
|
|
|
libapparmor-dev \
|
2021-02-03 16:07:10 -05:00
|
|
|
libbtrfs-dev \
|
2015-02-28 00:37:25 -05:00
|
|
|
libdevmapper-dev \
|
2017-09-25 06:03:37 -04:00
|
|
|
libseccomp-dev \
|
2015-02-28 00:37:25 -05:00
|
|
|
ca-certificates \
|
|
|
|
e2fsprogs \
|
|
|
|
iptables \
|
2018-01-11 13:02:08 -05:00
|
|
|
pkg-config \
|
2018-01-16 13:49:18 -05:00
|
|
|
pigz \
|
2015-02-28 00:37:25 -05:00
|
|
|
procps \
|
2015-11-11 17:29:02 -05:00
|
|
|
xfsprogs \
|
2015-02-28 00:37:25 -05:00
|
|
|
xz-utils \
|
|
|
|
\
|
2015-03-09 20:24:49 -04:00
|
|
|
aufs-tools \
|
2016-11-03 12:47:50 -04:00
|
|
|
vim-common \
|
2015-02-28 00:37:25 -05:00
|
|
|
&& rm -rf /var/lib/apt/lists/*
|
|
|
|
|
2016-11-03 12:47:50 -04:00
|
|
|
# Install runc, containerd, tini and docker-proxy
|
2018-02-16 13:51:30 -05:00
|
|
|
# Please edit hack/dockerfile/install/<name>.installer to update them.
|
|
|
|
COPY hack/dockerfile/install hack/dockerfile/install
|
|
|
|
RUN for i in runc containerd tini proxy dockercli; \
|
|
|
|
do hack/dockerfile/install/install.sh $i; \
|
|
|
|
done
|
2017-04-17 19:18:46 -04:00
|
|
|
ENV PATH=/usr/local/cli:$PATH
|
2016-06-27 17:38:47 -04:00
|
|
|
|
2015-02-28 00:37:25 -05:00
|
|
|
ENV AUTO_GOPATH 1
|
|
|
|
WORKDIR /usr/src/docker
|
|
|
|
COPY . /usr/src/docker
|