forked from TrueCloudLab/distribution
9cc6e5b27f
go1.20.9 (released 2023-10-05) includes one security fixes to the cmd/go package, as well as bug fixes to the go command and the linker. See the Go 1.20.9 milestone on our issue tracker for details: https://github.com/golang/go/issues?q=milestone%3AGo1.20.9+label%3ACherryPickApproved full diff: https://github.com/golang/go/compare/go1.20.8...go1.20.9 From the security mailing: [security] Go 1.21.2 and Go 1.20.9 are released Hello gophers, We have just released Go versions 1.21.2 and 1.20.9, minor point releases. These minor releases include 1 security fixes following the security policy: - cmd/go: line directives allows arbitrary execution during build "//line" directives can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compliation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploting this issue significantly more complex. This is CVE-2023-39323 and Go issue https://go.dev/issue/63211. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
60 lines
2.3 KiB
Docker
60 lines
2.3 KiB
Docker
# syntax=docker/dockerfile:1
|
|
|
|
ARG GO_VERSION=1.20.9
|
|
ARG ALPINE_VERSION=3.18
|
|
ARG XX_VERSION=1.2.1
|
|
|
|
FROM --platform=$BUILDPLATFORM tonistiigi/xx:${XX_VERSION} AS xx
|
|
FROM --platform=$BUILDPLATFORM golang:${GO_VERSION}-alpine${ALPINE_VERSION} AS base
|
|
COPY --from=xx / /
|
|
RUN apk add --no-cache bash coreutils file git
|
|
ENV GO111MODULE=auto
|
|
ENV CGO_ENABLED=0
|
|
WORKDIR /src
|
|
|
|
FROM base AS version
|
|
ARG PKG=github.com/distribution/distribution/v3
|
|
RUN --mount=target=. \
|
|
VERSION=$(git describe --match 'v[0-9]*' --dirty='.m' --always --tags) REVISION=$(git rev-parse HEAD)$(if ! git diff --no-ext-diff --quiet --exit-code; then echo .m; fi); \
|
|
echo "-X ${PKG}/version.Version=${VERSION#v} -X ${PKG}/version.Revision=${REVISION} -X ${PKG}/version.Package=${PKG}" | tee /tmp/.ldflags; \
|
|
echo -n "${VERSION}" | tee /tmp/.version;
|
|
|
|
FROM base AS build
|
|
ARG TARGETPLATFORM
|
|
ARG LDFLAGS="-s -w"
|
|
ARG BUILDTAGS="include_gcs"
|
|
RUN --mount=type=bind,target=/src,rw \
|
|
--mount=type=cache,target=/root/.cache/go-build \
|
|
--mount=target=/go/pkg/mod,type=cache \
|
|
--mount=type=bind,source=/tmp/.ldflags,target=/tmp/.ldflags,from=version \
|
|
set -x ; xx-go build -tags "${BUILDTAGS}" -trimpath -ldflags "$(cat /tmp/.ldflags) ${LDFLAGS}" -o /usr/bin/registry ./cmd/registry \
|
|
&& xx-verify --static /usr/bin/registry
|
|
|
|
FROM scratch AS binary
|
|
COPY --from=build /usr/bin/registry /
|
|
|
|
FROM base AS releaser
|
|
ARG TARGETOS
|
|
ARG TARGETARCH
|
|
ARG TARGETVARIANT
|
|
WORKDIR /work
|
|
RUN --mount=from=binary,target=/build \
|
|
--mount=type=bind,target=/src \
|
|
--mount=type=bind,source=/tmp/.version,target=/tmp/.version,from=version \
|
|
VERSION=$(cat /tmp/.version) \
|
|
&& mkdir -p /out \
|
|
&& cp /build/registry /src/README.md /src/LICENSE . \
|
|
&& tar -czvf "/out/registry_${VERSION#v}_${TARGETOS}_${TARGETARCH}${TARGETVARIANT}.tar.gz" * \
|
|
&& sha256sum -z "/out/registry_${VERSION#v}_${TARGETOS}_${TARGETARCH}${TARGETVARIANT}.tar.gz" | awk '{ print $1 }' > "/out/registry_${VERSION#v}_${TARGETOS}_${TARGETARCH}${TARGETVARIANT}.tar.gz.sha256"
|
|
|
|
FROM scratch AS artifact
|
|
COPY --from=releaser /out /
|
|
|
|
FROM alpine:${ALPINE_VERSION}
|
|
RUN apk add --no-cache ca-certificates
|
|
COPY cmd/registry/config-dev.yml /etc/docker/registry/config.yml
|
|
COPY --from=binary /registry /bin/registry
|
|
VOLUME ["/var/lib/registry"]
|
|
EXPOSE 5000
|
|
ENTRYPOINT ["registry"]
|
|
CMD ["serve", "/etc/docker/registry/config.yml"]
|