mirror of
https://github.com/ZwareBear/JFrog-Cloud-Installers.git
synced 2026-01-21 00:06:55 -06:00
Merge pull request #164 from jfrog/openshift-docker-images
Copied Dockerfile of redhat images from jfrog-distroless repo
This commit is contained in:
68
Openshift4/RedHatImages/Dockerfile.redhat-ubi-jfrog-rabbitmq
Normal file
68
Openshift4/RedHatImages/Dockerfile.redhat-ubi-jfrog-rabbitmq
Normal file
@@ -0,0 +1,68 @@
|
|||||||
|
# BITNAMI DEBIAN-10 DOCKERFILE CAN BE FOUND HERE:
|
||||||
|
# https://github.com/bitnami/bitnami-docker-rabbitmq/blob/master/3.8/debian-10/Dockerfile
|
||||||
|
# JFROG REDHAT UBI PORT TO WORK IN BITNAMI RABBITMQ HELM CHARTS
|
||||||
|
|
||||||
|
|
||||||
|
FROM bitnami/rabbitmq:3.8.9-debian-10-r88 as base
|
||||||
|
|
||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
ENV LANG='en_US.UTF-8' LANGUAGE='en_US:en' LC_ALL='en_US.UTF-8'
|
||||||
|
|
||||||
|
LABEL name="JFrog Rabbit MQ" \
|
||||||
|
description="JFrog Rabbit MQ image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Rabbit MQ (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/platform/enterprise-plus-eula/"
|
||||||
|
|
||||||
|
ARG RABBITMQ_VERSION=3.8.9-debian-10-r88
|
||||||
|
|
||||||
|
LABEL io.k8s.description="Lightweight open source message broker" \
|
||||||
|
io.k8s.display-name="RabbitMQ" \
|
||||||
|
io.openshift.expose-services="4369:epmd, 5671:amqp, 5672:amqp, 15672:http" \
|
||||||
|
io.openshift.tags="rabbitmq"
|
||||||
|
|
||||||
|
# FIX THE LOCALE ISSUE
|
||||||
|
RUN yum install -y --disableplugin=subscription-manager -y openssl curl ca-certificates fontconfig gzip glibc-langpack-en tar \
|
||||||
|
&& yum -y --disableplugin=subscription-manager update; yum --disableplugin=subscription-manager clean all
|
||||||
|
|
||||||
|
ENV GPG_KEY="0A9AF2115F4687BD29803A206B73A36E6026DFCA" \
|
||||||
|
HOME=/var/lib/rabbitmq \
|
||||||
|
RABBITMQ_HOME=/opt/rabbitmq \
|
||||||
|
RABBITMQ_LOGS=- \
|
||||||
|
RABBITMQ_SASL_LOGS=- \
|
||||||
|
LANG=en_US.UTF-8 \
|
||||||
|
LANGUAGE=en_US.:en \
|
||||||
|
LC_ALL=en_US.UTF-8
|
||||||
|
|
||||||
|
RUN yum install -y --disableplugin=subscription-manager xz
|
||||||
|
RUN set -xe && \
|
||||||
|
curl -LO https://github.com/rabbitmq/erlang-rpm/releases/download/v23.0/erlang-23.0-1.el8.x86_64.rpm && \
|
||||||
|
rpm -Uvh ./erlang-23.0-1.el8.x86_64.rpm && \
|
||||||
|
rm *.rpm && \
|
||||||
|
INSTALL_PKGS="wget procps net-tools hostname" && \
|
||||||
|
yum install -y $INSTALL_PKGS && \
|
||||||
|
rm -rf /var/cache/yum
|
||||||
|
|
||||||
|
# COPY OVER THE RABBITMQ LICENSES INTO THE FOLDER FOR REDHAT TO SCAN
|
||||||
|
COPY --from=base /opt/bitnami /opt/bitnami
|
||||||
|
|
||||||
|
RUN mkdir -p /opt/bitnami/rabbitmq/ && chown -R 0777 /opt/bitnami/rabbitmq && chown -R 1000721001:1000721001 /opt/bitnami/rabbitmq
|
||||||
|
RUN mkdir -p /var/log/rabbitmq/log/ && chmod -R 0777 /var/log
|
||||||
|
RUN mkdir -p /var/lib/rabbitmq && chmod -R 0777 /var/lib/rabbitmq && chown -R 1000721001:1000721001 /var/lib/rabbitmq
|
||||||
|
RUN mkdir -p /opt/rabbitmq && chmod -R 0777 /opt/rabbitmq && chown -R 1000721001:1000721001 /opt/rabbitmq
|
||||||
|
RUN mkdir -p /opt/bitnami && chmod -R 0777 /opt/bitnami && chown -R 1000721001:1000721001 /opt/bitnami
|
||||||
|
RUN mkdir -p /licenses && chmod -R 0777 /licenses && chown -R 1000721001:1000721001 /licenses
|
||||||
|
RUN mkdir -p /opt/bitnami/rabbitmq/licenses && chmod -R 0777 /opt/bitnami/rabbitmq/licenses && chown -R 1000721001:1000721001 /opt/bitnami/rabbitmq/licenses && cp -rf /opt/bitnami/rabbitmq/licenses/* /licenses && chmod 0777 /opt/bitnami/scripts/rabbitmq/setup.sh
|
||||||
|
RUN mkdir -p /opt/bitnami/rabbitmq/test && chmod -R 0777 /opt/bitnami/rabbitmq/test && chown -R 1000721001:1000721001 /opt/bitnami/rabbitmq/test
|
||||||
|
|
||||||
|
ENV BITNAMI_APP_NAME="rabbitmq" \
|
||||||
|
LANG="en_US.UTF-8" \
|
||||||
|
LANGUAGE="en_US:en"
|
||||||
|
|
||||||
|
EXPOSE 4369 5672 15672 25672
|
||||||
|
|
||||||
|
USER 1000721001
|
||||||
|
ENV PATH=/opt/bitnami/rabbitmq/sbin:$PATH
|
||||||
|
ENTRYPOINT [ "/opt/bitnami/scripts/rabbitmq/entrypoint.sh" ]
|
||||||
|
CMD [ "/opt/bitnami/scripts/rabbitmq/run.sh" ]
|
||||||
50
Openshift4/RedHatImages/Dockerfile.redhat-ubi-pipelines-api
Normal file
50
Openshift4/RedHatImages/Dockerfile.redhat-ubi-pipelines-api
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
ARG PIPELINES_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/pipelines-api:${PIPELINES_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8/nodejs-10
|
||||||
|
|
||||||
|
USER root
|
||||||
|
|
||||||
|
LABEL name="JFrog Pipelines API" \
|
||||||
|
description="JFrog Pipelines API image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Pipelines API (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/platform/enterprise-plus-eula/"
|
||||||
|
|
||||||
|
# Environment needed for Pipelines
|
||||||
|
ENV JF_PIPELINES_USER=pipelines \
|
||||||
|
PIPELINES_USER_ID=1000721117 \
|
||||||
|
PIPELINES_VERSION=${PIPELINES_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/pipelines \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/pipelines \
|
||||||
|
SERVICE_NAME=api \
|
||||||
|
APP_HOME_DIR=/opt/jfrog/pipelines/app/api \
|
||||||
|
LOG_DIR=/opt/jfrog/pipelines/var/log
|
||||||
|
|
||||||
|
ENV LOG_DIR=/opt/jfrog/pipelines/var/log
|
||||||
|
ENV NODE_PATH=/opt/jfrog/pipelines/app/node_modules
|
||||||
|
ENV API_BIN_DIR /opt/jfrog/pipelines/app/api/bin
|
||||||
|
|
||||||
|
# COPY IN PIPELINES FROM BASE IMAGE
|
||||||
|
COPY --from=base /opt/jfrog/pipelines/app/api /opt/jfrog/pipelines/app/api
|
||||||
|
|
||||||
|
# Add EULA information to meet the Red Hat container image certification requirements
|
||||||
|
COPY entplus_EULA.txt /licenses/
|
||||||
|
|
||||||
|
RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog
|
||||||
|
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${PIPELINES_USER_ID} --user-group pipelines && \
|
||||||
|
chown -R ${PIPELINES_USER_ID}:${PIPELINES_USER_ID} /opt/jfrog/pipelines /var/opt/jfrog && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname
|
||||||
|
|
||||||
|
RUN mkdir -p /opt/jfrog/pipelines/var/tmp
|
||||||
|
RUN mkdir -p $LOG_DIR
|
||||||
|
USER ${JF_PIPELINES_USER}
|
||||||
|
WORKDIR /opt/jfrog/pipelines/app/api
|
||||||
|
CMD ["node","api.app.js"]
|
||||||
|
EXPOSE 30000
|
||||||
@@ -0,0 +1,30 @@
|
|||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
USER root
|
||||||
|
|
||||||
|
LABEL name="JFrog Pipelines Init Container" \
|
||||||
|
description="JFrog Pipelines Init Container image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Pipelines Init Container (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/platform/enterprise-plus-eula/"
|
||||||
|
|
||||||
|
# install the necessary programs for the init container
|
||||||
|
RUN yum install -y --disableplugin=subscription-manager nc
|
||||||
|
RUN yum install -y --disableplugin=subscription-manager libcap libcap-ng
|
||||||
|
# Add EULA information to meet the Red Hat container image certification requirements
|
||||||
|
COPY entplus_EULA.txt /licenses/
|
||||||
|
|
||||||
|
# Environment needed for Pipelines
|
||||||
|
ENV JF_PIPELINES_USER=pipelines \
|
||||||
|
PIPELINES_USER_ID=1000721117
|
||||||
|
|
||||||
|
RUN mkdir -p /home/${JF_PIPELINES_USER}
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${PIPELINES_USER_ID} --user-group ${JF_PIPELINES_USER} && \
|
||||||
|
chown -R ${PIPELINES_USER_ID}:${PIPELINES_USER_ID} /home/${JF_PIPELINES_USER}
|
||||||
|
|
||||||
|
USER ${JF_PIPELINES_USER}
|
||||||
|
|
||||||
|
WORKDIR /home/${JF_PIPELINES_USER}
|
||||||
|
|
||||||
|
ENTRYPOINT ["bash"]
|
||||||
@@ -0,0 +1,60 @@
|
|||||||
|
ARG PIPELINES_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/pipelines-installer:${PIPELINES_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8/nodejs-10
|
||||||
|
|
||||||
|
USER root
|
||||||
|
|
||||||
|
LABEL name="JFrog Pipelines Installer" \
|
||||||
|
description="JFrog Pipelines Installer image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Pipelines Installer (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/platform/enterprise-plus-eula/"
|
||||||
|
|
||||||
|
# Environment needed for Pipelines
|
||||||
|
ENV JF_PIPELINES_USER=pipelines \
|
||||||
|
PIPELINES_USER_ID=1000721117 \
|
||||||
|
PIPELINES_VERSION=${PIPELINES_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/pipelines \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/pipelines
|
||||||
|
|
||||||
|
ENV NODE_PATH /usr/local/lib/node_modules
|
||||||
|
ENV TMP_DIR /opt/jfrog/pipelines/var/tmp
|
||||||
|
ENV SRC_DIR /opt/jfrog/pipelines/installer
|
||||||
|
ENV DEPENDENCIES /opt/jfrog/pipelines/dependencies
|
||||||
|
|
||||||
|
# COPY IN PIPELINES FROM BASE IMAGE
|
||||||
|
COPY --from=base /usr/local/lib /usr/local/lib
|
||||||
|
COPY --from=base /opt/jfrog/pipelines/var/tmp /opt/jfrog/pipelines/var/tmp
|
||||||
|
COPY --from=base /opt/jfrog/pipelines /opt/jfrog/pipelines
|
||||||
|
|
||||||
|
# Add EULA information to meet the Red Hat container image certification requirements
|
||||||
|
COPY entplus_EULA.txt /licenses/
|
||||||
|
|
||||||
|
RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog
|
||||||
|
RUN mkdir p /opt/jfrog/pipelines/var/etc/ && chmod 0777 /opt/jfrog/pipelines/var/etc/
|
||||||
|
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${PIPELINES_USER_ID} --user-group pipelines && \
|
||||||
|
chown -R ${PIPELINES_USER_ID}:${PIPELINES_USER_ID} /opt/jfrog/pipelines /var/opt/jfrog && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname python36 python3-pip nc
|
||||||
|
|
||||||
|
RUN yum install -y --disableplugin=subscription-manager http://www6.atomicorp.com/channels/atomic/centos/7/x86_64/RPMS/atomic-release-1.0-21.el7.art.noarch.rpm && \
|
||||||
|
yum install -y --disableplugin=subscription-manager http://www6.atomicorp.com/channels/atomic/centos/7/x86_64/RPMS/oniguruma-5.9.5-3.el7.art.x86_64.rpm && \
|
||||||
|
yum install -y --disableplugin=subscription-manager http://www6.atomicorp.com/channels/atomic/centos/7/x86_64/RPMS/jq-1.5-1.el7.art.x86_64.rpm
|
||||||
|
|
||||||
|
RUN wget https://github.com/mikefarah/yq/releases/download/3.4.0/yq_linux_amd64 -O /usr/bin/yq && chmod +x /usr/bin/yq
|
||||||
|
|
||||||
|
# install psql
|
||||||
|
RUN yum install -y --disableplugin=subscription-manager https://download.postgresql.org/pub/repos/yum/10/redhat/rhel-8-x86_64/postgresql10-libs-10.14-1PGDG.rhel8.x86_64.rpm && \
|
||||||
|
yum install -y --disableplugin=subscription-manager https://download.postgresql.org/pub/repos/yum/10/redhat/rhel-8-x86_64/postgresql10-10.14-1PGDG.rhel8.x86_64.rpm
|
||||||
|
|
||||||
|
RUN mkdir -p /usr/local/bin && cp -rf /usr/bin/psql /usr/local/bin/psql
|
||||||
|
USER ${JF_PIPELINES_USER}
|
||||||
|
WORKDIR /opt/jfrog/pipelines/installer
|
||||||
|
ENTRYPOINT ["/bin/bash", "execUtil.sh"]
|
||||||
@@ -0,0 +1,89 @@
|
|||||||
|
ARG PIPELINES_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/pipelines-api:${PIPELINES_BASE_VERSION} AS base
|
||||||
|
FROM jfrog-docker-reg2.bintray.io/pipelines-node:1.4.2 AS base2
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
USER root
|
||||||
|
|
||||||
|
LABEL name="JFrog Pipelines K8s Node" \
|
||||||
|
description="JFrog Pipelines K8s Node image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Pipelines K8s Node (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/platform/enterprise-plus-eula/"
|
||||||
|
|
||||||
|
# Set vars
|
||||||
|
ENV DOCKER_VERSION=18.09.9
|
||||||
|
ENV NODE_VERSION=10.19.0
|
||||||
|
|
||||||
|
#RUN apt-get update && \
|
||||||
|
# apt-get install sudo grep jq tar curl python-minimal wget ca-certificates rsync vim -y
|
||||||
|
|
||||||
|
|
||||||
|
RUN yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname && \
|
||||||
|
yum install -y --disableplugin=subscription-manager https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm && \
|
||||||
|
yum install -y --disableplugin=subscription-manager sudo grep tar python36 ca-certificates rsync vim
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
RUN wget -qO- https://raw.githubusercontent.com/nvm-sh/nvm/v0.36.0/install.sh | bash
|
||||||
|
ENV NVM_DIR=/root/.nvm
|
||||||
|
RUN . "$NVM_DIR/nvm.sh" && nvm install ${NODE_VERSION}
|
||||||
|
RUN . "$NVM_DIR/nvm.sh" && nvm use v${NODE_VERSION}
|
||||||
|
RUN . "$NVM_DIR/nvm.sh" && nvm alias default v${NODE_VERSION}
|
||||||
|
RUN cp /root/.nvm/versions/node/v${NODE_VERSION}/bin/node /usr/bin/
|
||||||
|
RUN cp /root/.nvm/versions/node/v${NODE_VERSION}/bin/npm /usr/bin/
|
||||||
|
RUN /root/.nvm/versions/node/v${NODE_VERSION}/bin/npm install leasot@latest -g
|
||||||
|
|
||||||
|
RUN curl -0 -L https://npmjs.com/install.sh | sh
|
||||||
|
|
||||||
|
# Get files needed to run Build Plane node
|
||||||
|
COPY --from=base /opt/jfrog/pipelines/app/api/bin/buildPlane-x86_64-RHEL_7.rpm /tmp/buildPlane-x86_64-RHEL_7.rpm
|
||||||
|
COPY ./executeAffinityGroup_fix.js /tmp
|
||||||
|
|
||||||
|
RUN yum localinstall -y --disableplugin=subscription-manager /tmp/buildPlane-x86_64-RHEL_7.rpm
|
||||||
|
RUN mkdir -p /tmp/var/opt/jfrog/pipelines/reqKick/execute/
|
||||||
|
RUN mkdir -p /jfrog-init
|
||||||
|
RUN cat /tmp/executeAffinityGroup_fix.js >> /tmp/var/opt/jfrog/pipelines/reqKick/execute/executeAffinityGroup.js
|
||||||
|
RUN sed -i '/function __restart(bag) {/,$d' /tmp/var/opt/jfrog/pipelines/reqKick/execute/executeAffinityGroup.js
|
||||||
|
RUN cp -fr /tmp/var/opt/jfrog/pipelines/ /jfrog-init
|
||||||
|
RUN rm -fr /tmp/var && rm -fr /tmp/*
|
||||||
|
|
||||||
|
COPY --from=base2 /jfrog-init /jfrog-init
|
||||||
|
|
||||||
|
# Install app dependencies
|
||||||
|
RUN cd /jfrog-init/reqKick; npm install
|
||||||
|
|
||||||
|
# Install docker client
|
||||||
|
RUN wget https://download.docker.com/linux/static/stable/x86_64/docker-$DOCKER_VERSION.tgz -P /tmp/docker && \
|
||||||
|
tar -xzf /tmp/docker/docker-$DOCKER_VERSION.tgz --directory /opt && \
|
||||||
|
ln -s /opt/docker/docker /usr/bin/docker && \
|
||||||
|
rm -fr /tmp/docker
|
||||||
|
|
||||||
|
|
||||||
|
# Install nodejs pm2 monitoring
|
||||||
|
RUN npm install pm2 -g
|
||||||
|
|
||||||
|
|
||||||
|
# Add EULA information to meet the Red Hat container image certification requirements
|
||||||
|
COPY entplus_EULA.txt /licenses/
|
||||||
|
|
||||||
|
# Environment needed for Pipelines
|
||||||
|
ENV JF_PIPELINES_USER=pipelines \
|
||||||
|
PIPELINES_USER_ID=1000721117 \
|
||||||
|
PIPELINES_VERSION=${PIPELINES_BASE_VERSION}
|
||||||
|
|
||||||
|
RUN mkdir -p /home/${JF_PIPELINES_USER}
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${PIPELINES_USER_ID} --user-group pipelines && \
|
||||||
|
chown -R ${PIPELINES_USER_ID}:${PIPELINES_USER_ID} /jfrog-init /home/${JF_PIPELINES_USER}
|
||||||
|
|
||||||
|
USER ${JF_PIPELINES_USER}
|
||||||
|
|
||||||
|
|
||||||
|
WORKDIR /jfrog-init/reqKick
|
||||||
|
CMD ["pm2-runtime", "/jfrog-init/reqKick/reqKick.app.js"]
|
||||||
@@ -0,0 +1,53 @@
|
|||||||
|
ARG PIPELINES_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/pipelines-micro:${PIPELINES_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8/nodejs-10
|
||||||
|
|
||||||
|
USER root
|
||||||
|
|
||||||
|
LABEL name="JFrog Pipelines Micro" \
|
||||||
|
description="JFrog Pipelines Micro image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Pipelines Micro (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/platform/enterprise-plus-eula/"
|
||||||
|
|
||||||
|
# Environment needed for Pipelines
|
||||||
|
ENV JF_PIPELINES_USER=pipelines \
|
||||||
|
PIPELINES_USER_ID=1000721117 \
|
||||||
|
PIPELINES_VERSION=${PIPELINES_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/pipelines \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/pipelines \
|
||||||
|
SERVICE_NAME=www \
|
||||||
|
APP_HOME_DIR=/opt/jfrog/pipelines/app/www \
|
||||||
|
LOG_DIR=/opt/jfrog/pipelines/var/log \
|
||||||
|
NODE_PATH=/opt/jfrog/pipelines/app/node_modules \
|
||||||
|
EXEC_TEMPLATES_DIR=/opt/jfrog/pipelines/app/execTemplates \
|
||||||
|
HOME=/home \
|
||||||
|
OLDPWD=/home \
|
||||||
|
SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt
|
||||||
|
|
||||||
|
# COPY IN PIPELINES FROM BASE IMAGE
|
||||||
|
COPY --from=base /opt/jfrog/pipelines /opt/jfrog/pipelines
|
||||||
|
COPY --from=base /home /home
|
||||||
|
COPY --from=base /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/ca-certificates.crt
|
||||||
|
# Add EULA information to meet the Red Hat container image certification requirements
|
||||||
|
COPY entplus_EULA.txt /licenses/
|
||||||
|
|
||||||
|
RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog
|
||||||
|
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${PIPELINES_USER_ID} --user-group pipelines && \
|
||||||
|
chown -R ${PIPELINES_USER_ID}:${PIPELINES_USER_ID} /opt/jfrog/pipelines /var/opt/jfrog && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname
|
||||||
|
|
||||||
|
RUN mkdir -p /opt/jfrog/pipelines/var/tmp
|
||||||
|
RUN mkdir -p $LOG_DIR
|
||||||
|
|
||||||
|
USER ${JF_PIPELINES_USER}
|
||||||
|
WORKDIR /opt/jfrog/pipelines/app/micro/nexec
|
||||||
|
CMD ["node","app.js"]
|
||||||
|
EXPOSE 30001
|
||||||
@@ -0,0 +1,40 @@
|
|||||||
|
ARG ROUTER_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/router:${ROUTER_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
LABEL name="JFrog Pipelines Router" \
|
||||||
|
description="JFrog Pipelines Router image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Pipelines Router (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/platform/enterprise-plus-eula/"
|
||||||
|
|
||||||
|
# Environment needed for Router
|
||||||
|
ENV JF_ROUTER_USER=router \
|
||||||
|
ROUTER_USER_ID=1000721117 \
|
||||||
|
ROUTER_VERSION=${ROUTER_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/router \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/router \
|
||||||
|
SERVICE_NAME=router
|
||||||
|
|
||||||
|
COPY --from=base /opt/jfrog/router /opt/jfrog/router
|
||||||
|
|
||||||
|
# Add license information to meet the Red Hat container image certification requirements
|
||||||
|
COPY --from=base /opt/jfrog/router/app/doc/* /licenses/
|
||||||
|
|
||||||
|
RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog
|
||||||
|
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${ROUTER_USER_ID} --user-group router && \
|
||||||
|
chown -R ${ROUTER_USER_ID}:${ROUTER_USER_ID} /opt/jfrog/router /var/opt/jfrog && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname
|
||||||
|
|
||||||
|
USER router
|
||||||
|
|
||||||
|
VOLUME /var/opt/jfrog/router
|
||||||
|
|
||||||
|
ENTRYPOINT ["/opt/jfrog/router/app/bin/entrypoint-router.sh"]
|
||||||
100
Openshift4/RedHatImages/Dockerfile.redhat-ubi-pipelines-vault
Normal file
100
Openshift4/RedHatImages/Dockerfile.redhat-ubi-pipelines-vault
Normal file
@@ -0,0 +1,100 @@
|
|||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
# This is the release of Vault to pull in.
|
||||||
|
ARG VAULT_BASE_VERSION
|
||||||
|
|
||||||
|
LABEL name="JFrog Pipelines Vault" \
|
||||||
|
description="JFrog Pipelines Vault image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Pipelines Vault (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/platform/enterprise-plus-eula/"
|
||||||
|
|
||||||
|
ENV JF_VAULT_USER=vault \
|
||||||
|
JF_VAULT_USER_GROUP=vault \
|
||||||
|
VAULT_USER_ID=1000721117 \
|
||||||
|
VAULT_VERSION=${VAULT_BASE_VERSION}
|
||||||
|
|
||||||
|
# Create a vault user and group first so the IDs get set the same way,
|
||||||
|
# even as the rest of this may change over time.
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${VAULT_USER_ID} --user-group ${JF_VAULT_USER_GROUP}
|
||||||
|
RUN mkdir -p /home/${JF_VAULT_USER} && \
|
||||||
|
chown -R ${VAULT_USER_ID}:${VAULT_USER_ID} /home/${JF_VAULT_USER}
|
||||||
|
|
||||||
|
RUN yum install -y --disableplugin=subscription-manager wget curl unzip ca-certificates gnupg openssl libcap tzdata
|
||||||
|
|
||||||
|
# Set up certificates, our base tools, and Vault.
|
||||||
|
RUN set -eux; \
|
||||||
|
apkArch="$(uname -a)"; \
|
||||||
|
case "$apkArch" in \
|
||||||
|
armhf) ARCH='arm' ;; \
|
||||||
|
aarch64) ARCH='arm64' ;; \
|
||||||
|
x86_64) x86_64 ;; \
|
||||||
|
x86) ARCH='386' ;; \
|
||||||
|
*) echo >&2 "Supported architecture: $apkArch" ;; \
|
||||||
|
esac && \
|
||||||
|
VAULT_GPGKEY=91A6E7F85D05C65630BEF18951852D87348FFC4C; \
|
||||||
|
found=''; \
|
||||||
|
for server in \
|
||||||
|
hkp://p80.pool.sks-keyservers.net:80 \
|
||||||
|
hkp://keyserver.ubuntu.com:80 \
|
||||||
|
hkp://pgp.mit.edu:80 \
|
||||||
|
; do \
|
||||||
|
echo "Fetching GPG key $VAULT_GPGKEY from $server"; \
|
||||||
|
gpg --batch --keyserver "$server" --recv-keys "$VAULT_GPGKEY" && found=yes && break; \
|
||||||
|
done; \
|
||||||
|
test -z "$found" && echo >&2 "error: failed to fetch GPG key $VAULT_GPGKEY" && exit 1; \
|
||||||
|
mkdir -p /tmp/build && \
|
||||||
|
cd /tmp/build && \
|
||||||
|
wget https://releases.hashicorp.com/vault/${VAULT_VERSION}/vault_${VAULT_VERSION}_linux_amd64.zip && \
|
||||||
|
wget https://releases.hashicorp.com/vault/${VAULT_VERSION}/vault_${VAULT_VERSION}_SHA256SUMS && \
|
||||||
|
wget https://releases.hashicorp.com/vault/${VAULT_VERSION}/vault_${VAULT_VERSION}_SHA256SUMS.sig && \
|
||||||
|
gpg --batch --verify vault_${VAULT_VERSION}_SHA256SUMS.sig vault_${VAULT_VERSION}_SHA256SUMS && \
|
||||||
|
grep vault_${VAULT_VERSION}_linux_amd64.zip vault_${VAULT_VERSION}_SHA256SUMS | sha256sum -c && \
|
||||||
|
unzip -d /bin vault_${VAULT_VERSION}_linux_amd64.zip && \
|
||||||
|
cd /tmp && \
|
||||||
|
rm -rf /tmp/build && \
|
||||||
|
gpgconf --kill dirmngr && \
|
||||||
|
gpgconf --kill gpg-agent && \
|
||||||
|
rm -rf /root/.gnupg
|
||||||
|
|
||||||
|
# /vault/logs is made available to use as a location to store audit logs, if
|
||||||
|
# desired; /vault/file is made available to use as a location with the file
|
||||||
|
# storage backend, if desired; the server will be started with /vault/config as
|
||||||
|
# the configuration directory so you can add additional config files in that
|
||||||
|
# location.
|
||||||
|
RUN mkdir -p /vault/logs && \
|
||||||
|
mkdir -p /vault/file && \
|
||||||
|
mkdir -p /vault/config && \
|
||||||
|
chown -R vault:vault /vault
|
||||||
|
|
||||||
|
# Expose the logs directory as a volume since there's potentially long-running
|
||||||
|
# state in there
|
||||||
|
VOLUME /vault/logs
|
||||||
|
|
||||||
|
# Expose the file directory as a volume since there's potentially long-running
|
||||||
|
# state in there
|
||||||
|
VOLUME /vault/file
|
||||||
|
|
||||||
|
# 8200/tcp is the primary interface that applications use to interact with
|
||||||
|
# Vault.
|
||||||
|
EXPOSE 8200
|
||||||
|
|
||||||
|
# The entry point script uses dumb-init as the top-level process to reap any
|
||||||
|
# zombie processes created by Vault sub-processes.
|
||||||
|
#
|
||||||
|
# For production derivatives of this container, you shoud add the IPC_LOCK
|
||||||
|
# capability so that Vault can mlock memory.
|
||||||
|
COPY vault-docker-entrypoint.sh /usr/local/bin/docker-entrypoint.sh
|
||||||
|
|
||||||
|
# Add EULA information to meet the Red Hat container image certification requirements
|
||||||
|
COPY entplus_EULA.txt /licenses/
|
||||||
|
|
||||||
|
# SETUP VAULT TO USE MLOCK
|
||||||
|
RUN setcap cap_ipc_lock=+ep $(readlink -f $(which vault))
|
||||||
|
|
||||||
|
USER ${JF_VAULT_USER}
|
||||||
|
ENTRYPOINT ["docker-entrypoint.sh"]
|
||||||
|
|
||||||
|
# By default you'll get a single-node development server that stores everything
|
||||||
|
# in RAM and bootstraps itself. Don't use this configuration for production.
|
||||||
|
CMD ["server", "-dev"]
|
||||||
@@ -0,0 +1,40 @@
|
|||||||
|
ARG PIPELINES_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/pipelines-vault-init:${PIPELINES_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8/go-toolset
|
||||||
|
|
||||||
|
USER root
|
||||||
|
|
||||||
|
LABEL name="JFrog Pipelines Vault Init" \
|
||||||
|
description="JFrog Pipelines Vault Init image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Pipelines Vault Init (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/platform/enterprise-plus-eula/"
|
||||||
|
|
||||||
|
# Environment needed for Pipelines
|
||||||
|
ENV JF_PIPELINES_USER=vault \
|
||||||
|
PIPELINES_USER_ID=1000721117 \
|
||||||
|
PIPELINES_VERSION=${PIPELINES_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/pipelines \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/pipelines \
|
||||||
|
SERVICE_NAME=vault-init
|
||||||
|
|
||||||
|
# COPY IN PIPELINES FROM BASE IMAGE
|
||||||
|
COPY --from=base /vault-init /opt/jfrog/pipelines/vault-init
|
||||||
|
|
||||||
|
# Add EULA information to meet the Red Hat container image certification requirements
|
||||||
|
COPY entplus_EULA.txt /licenses/
|
||||||
|
|
||||||
|
RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${PIPELINES_USER_ID} --user-group ${JF_PIPELINES_USER} && \
|
||||||
|
chown -R ${PIPELINES_USER_ID}:${PIPELINES_USER_ID} /opt/jfrog/pipelines /var/opt/jfrog && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname
|
||||||
|
|
||||||
|
USER ${JF_PIPELINES_USER}
|
||||||
|
WORKDIR /opt/jfrog/pipelines
|
||||||
|
ENTRYPOINT ["/opt/jfrog/pipelines/vault-init"]
|
||||||
47
Openshift4/RedHatImages/Dockerfile.redhat-ubi-pipelines-www
Normal file
47
Openshift4/RedHatImages/Dockerfile.redhat-ubi-pipelines-www
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
ARG PIPELINES_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/pipelines-www:${PIPELINES_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8/nodejs-10
|
||||||
|
|
||||||
|
USER root
|
||||||
|
|
||||||
|
LABEL name="JFrog Pipelines WWW" \
|
||||||
|
description="JFrog Pipelines WWW image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Pipelines WWW (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/platform/enterprise-plus-eula/"
|
||||||
|
|
||||||
|
# Environment needed for Pipelines
|
||||||
|
ENV JF_PIPELINES_USER=pipelines \
|
||||||
|
PIPELINES_USER_ID=1000721117 \
|
||||||
|
PIPELINES_VERSION=${PIPELINES_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/pipelines \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/pipelines \
|
||||||
|
SERVICE_NAME=www \
|
||||||
|
APP_HOME_DIR=/opt/jfrog/pipelines/app/www \
|
||||||
|
LOG_DIR=/opt/jfrog/pipelines/var/log
|
||||||
|
|
||||||
|
# COPY IN PIPELINES FROM BASE IMAGE
|
||||||
|
COPY --from=base /opt/jfrog/pipelines /opt/jfrog/pipelines
|
||||||
|
|
||||||
|
# Add EULA information to meet the Red Hat container image certification requirements
|
||||||
|
COPY entplus_EULA.txt /licenses/
|
||||||
|
|
||||||
|
RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog
|
||||||
|
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${PIPELINES_USER_ID} --user-group pipelines && \
|
||||||
|
chown -R ${PIPELINES_USER_ID}:${PIPELINES_USER_ID} /opt/jfrog/pipelines /var/opt/jfrog && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname
|
||||||
|
|
||||||
|
RUN mkdir -p /opt/jfrog/pipelines/var/tmp
|
||||||
|
RUN mkdir -p $LOG_DIR
|
||||||
|
|
||||||
|
USER ${JF_PIPELINES_USER}
|
||||||
|
WORKDIR /opt/jfrog/pipelines/app/www
|
||||||
|
CMD ["node","www.app.js"]
|
||||||
|
EXPOSE 30001
|
||||||
@@ -0,0 +1,32 @@
|
|||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
USER root
|
||||||
|
|
||||||
|
LABEL name="JFrog Init Container" \
|
||||||
|
description="JFrog Init Container image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Init Container (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/platform/enterprise-plus-eula/"
|
||||||
|
|
||||||
|
# install the necessary programs for the init container
|
||||||
|
RUN yum install -y --disableplugin=subscription-manager nc
|
||||||
|
RUN yum install -y --disableplugin=subscription-manager libcap libcap-ng
|
||||||
|
# Add EULA information to meet the Red Hat container image certification requirements
|
||||||
|
COPY entplus_EULA.txt /licenses/
|
||||||
|
|
||||||
|
# Environment needed for Pipelines
|
||||||
|
ENV JF_ART_USER=artifactory \
|
||||||
|
ART_USER_ID=1000721030
|
||||||
|
|
||||||
|
RUN mkdir -p /home/${JF_ART_USER}
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${ART_USER_ID} --user-group ${JF_ART_USER} && \
|
||||||
|
chown -R ${ART_USER_ID}:${ART_USER_ID} /home/${JF_ART_USER}
|
||||||
|
|
||||||
|
VOLUME /var/opt/jfrog/artifactory
|
||||||
|
|
||||||
|
USER ${JF_ART_USER}
|
||||||
|
|
||||||
|
WORKDIR /home/${JF_ART_USER}
|
||||||
|
|
||||||
|
ENTRYPOINT ["bash"]
|
||||||
61
Openshift4/RedHatImages/Dockerfile.redhat-ubi-rt7
Normal file
61
Openshift4/RedHatImages/Dockerfile.redhat-ubi-rt7
Normal file
@@ -0,0 +1,61 @@
|
|||||||
|
# An example of customising Artifactory using RedHat Univeral Base Image (UBI).
|
||||||
|
# Using Docker multi stage build.
|
||||||
|
# Taking the Artifactory file system
|
||||||
|
ARG ARTIFACTORY_BASE_VERSION
|
||||||
|
|
||||||
|
# The Artifactory official Docker image
|
||||||
|
FROM docker.bintray.io/jfrog/artifactory-pro:${ARTIFACTORY_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
LABEL name="JFrog Artifactory Pro" \
|
||||||
|
description="JFrog Artifactory Pro image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Artifactory Pro (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/artifactory/eula/"
|
||||||
|
|
||||||
|
# Environment needed for Artifactory
|
||||||
|
ENV JF_ARTIFACTORY_USER=artifactory \
|
||||||
|
ARTIFACTORY_USER_ID=1000721030 \
|
||||||
|
ARTIFACTORY_VERSION=${ARTIFACTORY_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/artifactory \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/artifactory \
|
||||||
|
RECOMMENDED_MAX_OPEN_FILES=32000 \
|
||||||
|
MIN_MAX_OPEN_FILES=10000 \
|
||||||
|
RECOMMENDED_MAX_OPEN_PROCESSES=1024 \
|
||||||
|
POSTGRESQL_VERSION=9.4.1212
|
||||||
|
|
||||||
|
# Copy needed file system from base (Artifactory image)
|
||||||
|
COPY --from=base /opt/jfrog /opt/jfrog
|
||||||
|
COPY --from=base /var/opt/jfrog/artifactory /var/opt/jfrog/artifactory
|
||||||
|
COPY --from=base /entrypoint-artifactory.sh /entrypoint-artifactory.sh
|
||||||
|
|
||||||
|
# Add license information to meet the Red Hat container image certification requirements
|
||||||
|
COPY --from=base /opt/jfrog/artifactory/app/doc/* /licenses/
|
||||||
|
|
||||||
|
# Metadata to let Artifactory know its installation source
|
||||||
|
RUN mkdir -p /artifactory_bootstrap/info/
|
||||||
|
RUN echo "{\"productId\":\"UBI8_artifactory/1.0.0\",\"features\":[{\"featureId\":\"Partner/ACC-006983\"}]}" > /artifactory_bootstrap/info/installer-info.json
|
||||||
|
|
||||||
|
# Create the user, fix file system ownership and install needed tools with Yum
|
||||||
|
# NOTE - wget must be installed for Artifactory HA
|
||||||
|
# procps must be installed to run Artifactory
|
||||||
|
# hostname is needed to generate nodeID
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${ARTIFACTORY_USER_ID} --user-group ${JF_ARTIFACTORY_USER} && \
|
||||||
|
chown -R ${JF_ARTIFACTORY_USER}:${JF_ARTIFACTORY_USER} ${JF_PRODUCT_HOME} ${JF_PRODUCT_DATA_INTERNAL} && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname
|
||||||
|
|
||||||
|
# Add RUN instruction for updating the vulnerability found in openssl-libs package.
|
||||||
|
|
||||||
|
RUN yum update openssl-libs -y
|
||||||
|
|
||||||
|
|
||||||
|
USER $JF_ARTIFACTORY_USER
|
||||||
|
|
||||||
|
VOLUME ${JF_PRODUCT_DATA_INTERNAL}
|
||||||
|
|
||||||
|
ENTRYPOINT ["/entrypoint-artifactory.sh"]
|
||||||
43
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-analysis
Normal file
43
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-analysis
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
ARG XRAY_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/xray-analysis:${XRAY_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
LABEL name="JFrog Xray Analysis" \
|
||||||
|
description="JFrog Xray Analysis image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Xray Analysis (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/xray/eula/"
|
||||||
|
|
||||||
|
# Environment needed for Xray
|
||||||
|
ENV JF_XRAY_USER=xray \
|
||||||
|
XRAY_USER_ID=1000721035 \
|
||||||
|
XRAY_VERSION=${XRAY_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/xray \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/xray \
|
||||||
|
SERVICE_NAME=analysis
|
||||||
|
|
||||||
|
|
||||||
|
COPY --from=base /opt/jfrog/xray /opt/jfrog/xray
|
||||||
|
COPY --from=base /var/opt/jfrog/xray /var/opt/jfrog/xray
|
||||||
|
COPY --from=base /postgresql-client /postgresql-client
|
||||||
|
|
||||||
|
# Add license information to meet the Red Hat container image certification requirements
|
||||||
|
COPY --from=base /opt/jfrog/xray/app/doc/* /licenses/
|
||||||
|
|
||||||
|
RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog
|
||||||
|
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${XRAY_USER_ID} --user-group ${JF_XRAY_USER} && \
|
||||||
|
chown -R ${JF_XRAY_USER}:${JF_XRAY_USER} ${JF_PRODUCT_HOME} ${JF_PRODUCT_DATA_INTERNAL} /postgresql-client && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname
|
||||||
|
|
||||||
|
USER xray
|
||||||
|
|
||||||
|
VOLUME /var/opt/jfrog/xray
|
||||||
|
|
||||||
|
ENTRYPOINT ["/opt/jfrog/xray/app/bin/wrapper.sh"]
|
||||||
43
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-indexer
Normal file
43
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-indexer
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
ARG XRAY_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/xray-indexer:${XRAY_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
LABEL name="JFrog Xray Indexer" \
|
||||||
|
description="JFrog Xray Indexer image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Xray Indexer (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/xray/eula/"
|
||||||
|
|
||||||
|
# Environment needed for Xray
|
||||||
|
ENV JF_XRAY_USER=xray \
|
||||||
|
XRAY_USER_ID=1000721035 \
|
||||||
|
XRAY_VERSION=${XRAY_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/xray \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/xray \
|
||||||
|
SERVICE_NAME=indexer
|
||||||
|
|
||||||
|
COPY --from=base /opt/jfrog/xray /opt/jfrog/xray
|
||||||
|
COPY --from=base /var/opt/jfrog/xray /var/opt/jfrog/xray
|
||||||
|
COPY --from=base /postgresql-client /postgresql-client
|
||||||
|
|
||||||
|
# Add license information to meet the Red Hat container image certification requirements
|
||||||
|
COPY --from=base /opt/jfrog/xray/app/doc/* /licenses/
|
||||||
|
|
||||||
|
RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog
|
||||||
|
|
||||||
|
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${XRAY_USER_ID} --user-group ${JF_XRAY_USER} && \
|
||||||
|
chown -R ${JF_XRAY_USER}:${JF_XRAY_USER} ${JF_PRODUCT_HOME} ${JF_PRODUCT_DATA_INTERNAL} /postgresql-client && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname
|
||||||
|
|
||||||
|
USER xray
|
||||||
|
|
||||||
|
VOLUME /var/opt/jfrog/xray
|
||||||
|
|
||||||
|
ENTRYPOINT ["/opt/jfrog/xray/app/bin/wrapper.sh"]
|
||||||
43
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-persist
Normal file
43
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-persist
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
ARG XRAY_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/xray-persist:${XRAY_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
LABEL name="JFrog Xray Persist" \
|
||||||
|
description="JFrog Xray Persist image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Xray Persist (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/xray/eula/"
|
||||||
|
|
||||||
|
# Environment needed for Xray
|
||||||
|
ENV JF_XRAY_USER=xray \
|
||||||
|
XRAY_USER_ID=1000721035 \
|
||||||
|
XRAY_VERSION=${XRAY_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/xray \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/xray \
|
||||||
|
SERVICE_NAME=persist
|
||||||
|
|
||||||
|
COPY --from=base /opt/jfrog/xray /opt/jfrog/xray
|
||||||
|
COPY --from=base /var/opt/jfrog/xray /var/opt/jfrog/xray
|
||||||
|
COPY --from=base /postgresql-client /postgresql-client
|
||||||
|
|
||||||
|
# Add license information to meet the Red Hat container image certification requirements
|
||||||
|
COPY --from=base /opt/jfrog/xray/app/doc/* /licenses/
|
||||||
|
|
||||||
|
RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog
|
||||||
|
|
||||||
|
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${XRAY_USER_ID} --user-group ${JF_XRAY_USER} && \
|
||||||
|
chown -R ${JF_XRAY_USER}:${JF_XRAY_USER} ${JF_PRODUCT_HOME} ${JF_PRODUCT_DATA_INTERNAL} /postgresql-client && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname
|
||||||
|
|
||||||
|
USER xray
|
||||||
|
|
||||||
|
VOLUME /var/opt/jfrog/xray
|
||||||
|
|
||||||
|
ENTRYPOINT ["/opt/jfrog/xray/app/bin/wrapper.sh"]
|
||||||
73
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-rabbitmq
Normal file
73
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-rabbitmq
Normal file
@@ -0,0 +1,73 @@
|
|||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
LABEL name="JFrog Xray Rabbit MQ" \
|
||||||
|
description="JFrog Rabbit MQ image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Rabbit MQ (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/xray/eula/"
|
||||||
|
|
||||||
|
|
||||||
|
ARG RABBITMQ_AUTOCLUSTER_VERSION=0.10.0
|
||||||
|
ARG RABBITMQ_VERSION=3.8.8
|
||||||
|
|
||||||
|
LABEL io.k8s.description="Lightweight open source message broker" \
|
||||||
|
io.k8s.display-name="RabbitMQ" \
|
||||||
|
io.openshift.expose-services="4369:epmd, 5671:amqp, 5672:amqp, 15672:http" \
|
||||||
|
io.openshift.tags="rabbitmq"
|
||||||
|
|
||||||
|
ENV GPG_KEY="0A9AF2115F4687BD29803A206B73A36E6026DFCA" \
|
||||||
|
HOME=/var/lib/rabbitmq \
|
||||||
|
RABBITMQ_HOME=/opt/rabbitmq \
|
||||||
|
RABBITMQ_LOGS=- \
|
||||||
|
RABBITMQ_SASL_LOGS=- \
|
||||||
|
LANG=en_US.UTF-8 \
|
||||||
|
LANGUAGE=en_US.:en \
|
||||||
|
LC_ALL=en_US.UTF-8
|
||||||
|
|
||||||
|
|
||||||
|
# FIX THE LOCALE ISSUE
|
||||||
|
RUN yum install -y --disableplugin=subscription-manager -y openssl curl ca-certificates fontconfig gzip glibc-langpack-en tar xz \
|
||||||
|
&& yum -y --disableplugin=subscription-manager update; yum --disableplugin=subscription-manager clean all
|
||||||
|
|
||||||
|
RUN set -xe && \
|
||||||
|
curl -LO https://github.com/rabbitmq/erlang-rpm/releases/download/v23.0/erlang-23.0-1.el8.x86_64.rpm && \
|
||||||
|
rpm -Uvh ./erlang-23.0-1.el8.x86_64.rpm && \
|
||||||
|
rm *.rpm && \
|
||||||
|
curl -Lo rabbitmq-server.tar.xz https://github.com/rabbitmq/rabbitmq-server/releases/download/v${RABBITMQ_VERSION}/rabbitmq-server-generic-unix-${RABBITMQ_VERSION}.tar.xz && \
|
||||||
|
curl -Lo rabbitmq-server.tar.xz.asc https://github.com/rabbitmq/rabbitmq-server/releases/download/v${RABBITMQ_VERSION}/rabbitmq-server-generic-unix-${RABBITMQ_VERSION}.tar.xz.asc && \
|
||||||
|
export GNUPGHOME="$(mktemp -d)" && \
|
||||||
|
env | grep GNUPG && \
|
||||||
|
gpg --keyserver hkp://ha.pool.sks-keyservers.net:80 --recv-keys "$GPG_KEY" && \
|
||||||
|
gpg --batch --verify rabbitmq-server.tar.xz.asc rabbitmq-server.tar.xz && \
|
||||||
|
rm -rf "$GNUPGHOME" && \
|
||||||
|
mkdir -p "$RABBITMQ_HOME" && \
|
||||||
|
tar \
|
||||||
|
--extract \
|
||||||
|
--verbose \
|
||||||
|
--file rabbitmq-server.tar.xz \
|
||||||
|
--directory "$RABBITMQ_HOME" \
|
||||||
|
--strip-components 1 && \
|
||||||
|
rm rabbitmq-server.tar.xz* && \
|
||||||
|
grep -qE '^SYS_PREFIX=\$\{RABBITMQ_HOME\}$' "$RABBITMQ_HOME/sbin/rabbitmq-defaults" && \
|
||||||
|
sed -ri 's!^(SYS_PREFIX=).*$!\1!' "$RABBITMQ_HOME/sbin/rabbitmq-defaults" && \
|
||||||
|
grep -qE '^SYS_PREFIX=$' "$RABBITMQ_HOME/sbin/rabbitmq-defaults" && \
|
||||||
|
groupadd --system rabbitmq && \
|
||||||
|
adduser -u 1000721001 -r -c "RabbitMQ User" -d /var/lib/rabbitmq -g rabbitmq rabbitmq && \
|
||||||
|
mkdir -p /var/lib/rabbitmq /etc/rabbitmq && \
|
||||||
|
chown -R 1000721001:1000721001 /var/lib/rabbitmq /etc/rabbitmq ${RABBITMQ_HOME}/plugins && \
|
||||||
|
chmod -R g=u /var/lib/rabbitmq /etc/rabbitmq && \
|
||||||
|
rm -rf /var/lib/rabbitmq/.erlang.cookie && \
|
||||||
|
ln -sf "$RABBITMQ_HOME/plugins" /plugins && \
|
||||||
|
INSTALL_PKGS="wget procps net-tools hostname" && \
|
||||||
|
yum install -y $INSTALL_PKGS && \
|
||||||
|
rm -rf /var/cache/yum
|
||||||
|
|
||||||
|
COPY xray-rabbitmq-docker-entrypoint.sh /usr/local/bin/docker-entrypoint.sh
|
||||||
|
RUN mkdir -p /licenses && chmod 0777 /licenses && cp -rf /opt/rabbitmq/LICENSE /licenses/LICENSE
|
||||||
|
|
||||||
|
USER 1000721001
|
||||||
|
ENV PATH=$RABBITMQ_HOME/sbin:$PATH
|
||||||
|
ENTRYPOINT ["docker-entrypoint.sh"]
|
||||||
|
|
||||||
|
EXPOSE 4369 5672 15672
|
||||||
|
CMD ["rabbitmq-server"]
|
||||||
41
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-router
Normal file
41
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-router
Normal file
@@ -0,0 +1,41 @@
|
|||||||
|
ARG ROUTER_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/router:${ROUTER_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
LABEL name="JFrog Xray Router" \
|
||||||
|
description="JFrog Xray Router image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Xray Router (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/xray/eula/"
|
||||||
|
|
||||||
|
# Environment needed for Router
|
||||||
|
ENV JF_ROUTER_USER=router \
|
||||||
|
ROUTER_USER_ID=1000721035 \
|
||||||
|
ROUTER_VERSION=${ROUTER_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/router \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/router \
|
||||||
|
SERVICE_NAME=router
|
||||||
|
|
||||||
|
COPY --from=base /opt/jfrog/router /opt/jfrog/router
|
||||||
|
COPY --from=base /var/opt/jfrog/router /var/opt/jfrog/router
|
||||||
|
|
||||||
|
# Add license information to meet the Red Hat container image certification requirements
|
||||||
|
COPY --from=base /opt/jfrog/router/app/doc/* /licenses/
|
||||||
|
|
||||||
|
RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog
|
||||||
|
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${ROUTER_USER_ID} --user-group router && \
|
||||||
|
chown -R ${ROUTER_USER_ID}:${ROUTER_USER_ID} /opt/jfrog/router /var/opt/jfrog && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname
|
||||||
|
|
||||||
|
USER router
|
||||||
|
|
||||||
|
VOLUME /var/opt/jfrog/router
|
||||||
|
|
||||||
|
ENTRYPOINT ["/opt/jfrog/router/app/bin/entrypoint-router.sh"]
|
||||||
46
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-server
Normal file
46
Openshift4/RedHatImages/Dockerfile.redhat-ubi-xray-server
Normal file
@@ -0,0 +1,46 @@
|
|||||||
|
ARG XRAY_BASE_VERSION
|
||||||
|
|
||||||
|
FROM docker.bintray.io/jfrog/xray-server:${XRAY_BASE_VERSION} AS base
|
||||||
|
|
||||||
|
# The new image based on registry.access.redhat.com/ubi
|
||||||
|
FROM registry.access.redhat.com/ubi8
|
||||||
|
|
||||||
|
LABEL name="JFrog Xray Server" \
|
||||||
|
description="JFrog Xray Server image based on the Red Hat Universal Base Image." \
|
||||||
|
vendor="JFrog" \
|
||||||
|
summary="JFrog Xray Server (Red Hat UBI)" \
|
||||||
|
com.jfrog.license_terms="https://jfrog.com/xray/eula/"
|
||||||
|
|
||||||
|
# Environment needed for Xray
|
||||||
|
ENV JF_XRAY_USER=xray \
|
||||||
|
XRAY_USER_ID=1000721035 \
|
||||||
|
XRAY_VERSION=${XRAY_BASE_VERSION} \
|
||||||
|
JF_PRODUCT_HOME=/opt/jfrog/xray \
|
||||||
|
JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/xray \
|
||||||
|
SERVICE_NAME=server
|
||||||
|
|
||||||
|
COPY --from=base /opt/jfrog/xray /opt/jfrog/xray
|
||||||
|
COPY --from=base /var/opt/jfrog/xray /var/opt/jfrog/xray
|
||||||
|
COPY --from=base /postgresql-client /postgresql-client
|
||||||
|
|
||||||
|
# Add license information to meet the Red Hat container image certification requirements
|
||||||
|
COPY --from=base /opt/jfrog/xray/app/doc/* /licenses/
|
||||||
|
|
||||||
|
# Add call home
|
||||||
|
COPY xray.default /opt/jfrog/xray/app/bin
|
||||||
|
|
||||||
|
RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog
|
||||||
|
|
||||||
|
|
||||||
|
RUN useradd -M -s /usr/sbin/nologin --uid ${XRAY_USER_ID} --user-group ${JF_XRAY_USER} && \
|
||||||
|
chown -R ${JF_XRAY_USER}:${JF_XRAY_USER} ${JF_PRODUCT_HOME} ${JF_PRODUCT_DATA_INTERNAL} /postgresql-client && \
|
||||||
|
yum install -y --disableplugin=subscription-manager wget && \
|
||||||
|
yum install -y --disableplugin=subscription-manager procps && \
|
||||||
|
yum install -y --disableplugin=subscription-manager net-tools && \
|
||||||
|
yum install -y --disableplugin=subscription-manager hostname
|
||||||
|
|
||||||
|
USER xray
|
||||||
|
|
||||||
|
VOLUME /var/opt/jfrog/xray
|
||||||
|
|
||||||
|
ENTRYPOINT ["/opt/jfrog/xray/app/bin/wrapper.sh"]
|
||||||
104
Openshift4/RedHatImages/vault-docker-entrypoint.sh
Normal file
104
Openshift4/RedHatImages/vault-docker-entrypoint.sh
Normal file
@@ -0,0 +1,104 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
set -e
|
||||||
|
|
||||||
|
# Note above that we run dumb-init as PID 1 in order to reap zombie processes
|
||||||
|
# as well as forward signals to all processes in its session. Normally, sh
|
||||||
|
# wouldn't do either of these functions so we'd leak zombies as well as do
|
||||||
|
# unclean termination of all our sub-processes.
|
||||||
|
|
||||||
|
# Prevent core dumps
|
||||||
|
ulimit -c 0
|
||||||
|
|
||||||
|
# Allow setting VAULT_REDIRECT_ADDR and VAULT_CLUSTER_ADDR using an interface
|
||||||
|
# name instead of an IP address. The interface name is specified using
|
||||||
|
# VAULT_REDIRECT_INTERFACE and VAULT_CLUSTER_INTERFACE environment variables. If
|
||||||
|
# VAULT_*_ADDR is also set, the resulting URI will combine the protocol and port
|
||||||
|
# number with the IP of the named interface.
|
||||||
|
get_addr () {
|
||||||
|
local if_name=$1
|
||||||
|
local uri_template=$2
|
||||||
|
ip addr show dev $if_name | awk -v uri=$uri_template '/\s*inet\s/ { \
|
||||||
|
ip=gensub(/(.+)\/.+/, "\\1", "g", $2); \
|
||||||
|
print gensub(/^(.+:\/\/).+(:.+)$/, "\\1" ip "\\2", "g", uri); \
|
||||||
|
exit}'
|
||||||
|
}
|
||||||
|
|
||||||
|
if [ -n "$VAULT_REDIRECT_INTERFACE" ]; then
|
||||||
|
export VAULT_REDIRECT_ADDR=$(get_addr $VAULT_REDIRECT_INTERFACE ${VAULT_REDIRECT_ADDR:-"http://0.0.0.0:8200"})
|
||||||
|
echo "Using $VAULT_REDIRECT_INTERFACE for VAULT_REDIRECT_ADDR: $VAULT_REDIRECT_ADDR"
|
||||||
|
fi
|
||||||
|
if [ -n "$VAULT_CLUSTER_INTERFACE" ]; then
|
||||||
|
export VAULT_CLUSTER_ADDR=$(get_addr $VAULT_CLUSTER_INTERFACE ${VAULT_CLUSTER_ADDR:-"https://0.0.0.0:8201"})
|
||||||
|
echo "Using $VAULT_CLUSTER_INTERFACE for VAULT_CLUSTER_ADDR: $VAULT_CLUSTER_ADDR"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# VAULT_CONFIG_DIR isn't exposed as a volume but you can compose additional
|
||||||
|
# config files in there if you use this image as a base, or use
|
||||||
|
# VAULT_LOCAL_CONFIG below.
|
||||||
|
VAULT_CONFIG_DIR=/vault/config
|
||||||
|
|
||||||
|
# You can also set the VAULT_LOCAL_CONFIG environment variable to pass some
|
||||||
|
# Vault configuration JSON without having to bind any volumes.
|
||||||
|
if [ -n "$VAULT_LOCAL_CONFIG" ]; then
|
||||||
|
echo "$VAULT_LOCAL_CONFIG" > "$VAULT_CONFIG_DIR/local.json"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# If the user is trying to run Vault directly with some arguments, then
|
||||||
|
# pass them to Vault.
|
||||||
|
if [ "${1:0:1}" = '-' ]; then
|
||||||
|
set -- vault "$@"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Look for Vault subcommands.
|
||||||
|
if [ "$1" = 'server' ]; then
|
||||||
|
shift
|
||||||
|
set -- vault server \
|
||||||
|
-config="$VAULT_CONFIG_DIR" \
|
||||||
|
-dev-root-token-id="$VAULT_DEV_ROOT_TOKEN_ID" \
|
||||||
|
-dev-listen-address="${VAULT_DEV_LISTEN_ADDRESS:-"0.0.0.0:8200"}" \
|
||||||
|
"$@"
|
||||||
|
elif [ "$1" = 'version' ]; then
|
||||||
|
# This needs a special case because there's no help output.
|
||||||
|
set -- vault "$@"
|
||||||
|
elif vault --help "$1" 2>&1 | grep -q "vault $1"; then
|
||||||
|
# We can't use the return code to check for the existence of a subcommand, so
|
||||||
|
# we have to use grep to look for a pattern in the help output.
|
||||||
|
set -- vault "$@"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# If we are running Vault, make sure it executes as the proper user.
|
||||||
|
if [ "$1" = 'vault' ]; then
|
||||||
|
if [ -z "$SKIP_CHOWN" ]; then
|
||||||
|
# If the config dir is bind mounted then chown it
|
||||||
|
if [ "$(stat -c %u /vault/config)" != "$(id -u vault)" ]; then
|
||||||
|
chown -R vault:vault /vault/config || echo "Could not chown /vault/config (may not have appropriate permissions)"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# If the logs dir is bind mounted then chown it
|
||||||
|
if [ "$(stat -c %u /vault/logs)" != "$(id -u vault)" ]; then
|
||||||
|
chown -R vault:vault /vault/logs
|
||||||
|
fi
|
||||||
|
|
||||||
|
# If the file dir is bind mounted then chown it
|
||||||
|
if [ "$(stat -c %u /vault/file)" != "$(id -u vault)" ]; then
|
||||||
|
chown -R vault:vault /vault/file
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -z "$SKIP_SETCAP" ]; then
|
||||||
|
# Allow mlock to avoid swapping Vault memory to disk
|
||||||
|
#sudo setcap cap_ipc_lock=+ep $(readlink -f $(which vault))
|
||||||
|
|
||||||
|
# In the case vault has been started in a container without IPC_LOCK privileges
|
||||||
|
if ! vault -version 1>/dev/null 2>/dev/null; then
|
||||||
|
>&2 echo "Couldn't start vault with IPC_LOCK. Disabling IPC_LOCK, please use --privileged or --cap-add IPC_LOCK"
|
||||||
|
#sudo setcap cap_ipc_lock=-ep $(readlink -f $(which vault))
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ "$(id -u)" = '0' ]; then
|
||||||
|
set -- exec vault "$@"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
exec "$@"
|
||||||
407
Openshift4/RedHatImages/xray-rabbitmq-docker-entrypoint.sh
Normal file
407
Openshift4/RedHatImages/xray-rabbitmq-docker-entrypoint.sh
Normal file
@@ -0,0 +1,407 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -eu
|
||||||
|
|
||||||
|
# usage: file_env VAR [DEFAULT]
|
||||||
|
# ie: file_env 'XYZ_DB_PASSWORD' 'example'
|
||||||
|
# (will allow for "$XYZ_DB_PASSWORD_FILE" to fill in the value of
|
||||||
|
# "$XYZ_DB_PASSWORD" from a file, especially for Docker's secrets feature)
|
||||||
|
file_env() {
|
||||||
|
local var="$1"
|
||||||
|
local fileVar="${var}_FILE"
|
||||||
|
local def="${2:-}"
|
||||||
|
if [ "${!var:-}" ] && [ "${!fileVar:-}" ]; then
|
||||||
|
echo >&2 "error: both $var and $fileVar are set (but are exclusive)"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
local val="$def"
|
||||||
|
if [ "${!var:-}" ]; then
|
||||||
|
val="${!var}"
|
||||||
|
elif [ "${!fileVar:-}" ]; then
|
||||||
|
val="$(< "${!fileVar}")"
|
||||||
|
fi
|
||||||
|
export "$var"="$val"
|
||||||
|
unset "$fileVar"
|
||||||
|
}
|
||||||
|
|
||||||
|
# backwards compatibility for old environment variables
|
||||||
|
: "${RABBITMQ_SSL_CERTFILE:=${RABBITMQ_SSL_CERT_FILE:-}}"
|
||||||
|
: "${RABBITMQ_SSL_KEYFILE:=${RABBITMQ_SSL_KEY_FILE:-}}"
|
||||||
|
: "${RABBITMQ_SSL_CACERTFILE:=${RABBITMQ_SSL_CA_FILE:-}}"
|
||||||
|
|
||||||
|
# "management" SSL config should default to using the same certs
|
||||||
|
: "${RABBITMQ_MANAGEMENT_SSL_CACERTFILE:=$RABBITMQ_SSL_CACERTFILE}"
|
||||||
|
: "${RABBITMQ_MANAGEMENT_SSL_CERTFILE:=$RABBITMQ_SSL_CERTFILE}"
|
||||||
|
: "${RABBITMQ_MANAGEMENT_SSL_KEYFILE:=$RABBITMQ_SSL_KEYFILE}"
|
||||||
|
|
||||||
|
# Allowed env vars that will be read from mounted files (i.e. Docker Secrets):
|
||||||
|
fileEnvKeys=(
|
||||||
|
default_user
|
||||||
|
default_pass
|
||||||
|
)
|
||||||
|
|
||||||
|
# https://www.rabbitmq.com/configure.html
|
||||||
|
sslConfigKeys=(
|
||||||
|
cacertfile
|
||||||
|
certfile
|
||||||
|
depth
|
||||||
|
fail_if_no_peer_cert
|
||||||
|
keyfile
|
||||||
|
verify
|
||||||
|
)
|
||||||
|
managementConfigKeys=(
|
||||||
|
"${sslConfigKeys[@]/#/ssl_}"
|
||||||
|
)
|
||||||
|
rabbitConfigKeys=(
|
||||||
|
default_pass
|
||||||
|
default_user
|
||||||
|
default_vhost
|
||||||
|
vm_memory_high_watermark
|
||||||
|
)
|
||||||
|
fileConfigKeys=(
|
||||||
|
management_ssl_cacertfile
|
||||||
|
management_ssl_certfile
|
||||||
|
management_ssl_keyfile
|
||||||
|
ssl_cacertfile
|
||||||
|
ssl_certfile
|
||||||
|
ssl_keyfile
|
||||||
|
)
|
||||||
|
allConfigKeys=(
|
||||||
|
"${managementConfigKeys[@]/#/management_}"
|
||||||
|
"${rabbitConfigKeys[@]}"
|
||||||
|
"${sslConfigKeys[@]/#/ssl_}"
|
||||||
|
)
|
||||||
|
|
||||||
|
declare -A configDefaults=(
|
||||||
|
[management_ssl_fail_if_no_peer_cert]='false'
|
||||||
|
[management_ssl_verify]='verify_none'
|
||||||
|
|
||||||
|
[ssl_fail_if_no_peer_cert]='true'
|
||||||
|
[ssl_verify]='verify_peer'
|
||||||
|
)
|
||||||
|
|
||||||
|
# allow the container to be started with `--user`
|
||||||
|
if [[ "$1" == rabbitmq* ]] && [ "$(id -u)" = '0' ]; then
|
||||||
|
# this needs to happen late enough that we have the SSL config
|
||||||
|
# https://github.com/docker-library/rabbitmq/issues/283
|
||||||
|
for conf in "${allConfigKeys[@]}"; do
|
||||||
|
var="RABBITMQ_${conf^^}"
|
||||||
|
val="${!var:-}"
|
||||||
|
[ -n "$val" ] || continue
|
||||||
|
case "$conf" in
|
||||||
|
*_ssl_*file | ssl_*file )
|
||||||
|
if [ -f "$val" ] && ! gosu rabbitmq test -r "$val"; then
|
||||||
|
newFile="/tmp/rabbitmq-ssl/$conf.pem"
|
||||||
|
echo >&2
|
||||||
|
echo >&2 "WARNING: '$val' ($var) is not readable by rabbitmq ($(id rabbitmq)); copying to '$newFile'"
|
||||||
|
echo >&2
|
||||||
|
cat "$val" > "$newFile"
|
||||||
|
chown rabbitmq "$newFile"
|
||||||
|
chmod 0400 "$newFile"
|
||||||
|
eval 'export '$var'="$newFile"'
|
||||||
|
fi
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
|
||||||
|
if [ "$1" = 'rabbitmq-server' ]; then
|
||||||
|
find /var/lib/rabbitmq \! -user rabbitmq -exec chown rabbitmq '{}' +
|
||||||
|
fi
|
||||||
|
|
||||||
|
exec gosu rabbitmq "$BASH_SOURCE" "$@"
|
||||||
|
fi
|
||||||
|
|
||||||
|
haveConfig=
|
||||||
|
haveSslConfig=
|
||||||
|
haveManagementSslConfig=
|
||||||
|
for fileEnvKey in "${fileEnvKeys[@]}"; do file_env "RABBITMQ_${fileEnvKey^^}"; done
|
||||||
|
for conf in "${allConfigKeys[@]}"; do
|
||||||
|
var="RABBITMQ_${conf^^}"
|
||||||
|
val="${!var:-}"
|
||||||
|
if [ "$val" ]; then
|
||||||
|
if [ "${configDefaults[$conf]:-}" ] && [ "${configDefaults[$conf]}" = "$val" ]; then
|
||||||
|
# if the value set is the same as the default, treat it as if it isn't set
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
haveConfig=1
|
||||||
|
case "$conf" in
|
||||||
|
ssl_*) haveSslConfig=1 ;;
|
||||||
|
management_ssl_*) haveManagementSslConfig=1 ;;
|
||||||
|
esac
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
if [ "$haveSslConfig" ]; then
|
||||||
|
missing=()
|
||||||
|
for sslConf in cacertfile certfile keyfile; do
|
||||||
|
var="RABBITMQ_SSL_${sslConf^^}"
|
||||||
|
val="${!var}"
|
||||||
|
if [ -z "$val" ]; then
|
||||||
|
missing+=( "$var" )
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
if [ "${#missing[@]}" -gt 0 ]; then
|
||||||
|
{
|
||||||
|
echo
|
||||||
|
echo 'error: SSL requested, but missing required configuration'
|
||||||
|
for miss in "${missing[@]}"; do
|
||||||
|
echo " - $miss"
|
||||||
|
done
|
||||||
|
echo
|
||||||
|
} >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
missingFiles=()
|
||||||
|
for conf in "${fileConfigKeys[@]}"; do
|
||||||
|
var="RABBITMQ_${conf^^}"
|
||||||
|
val="${!var}"
|
||||||
|
if [ "$val" ] && [ ! -f "$val" ]; then
|
||||||
|
missingFiles+=( "$val ($var)" )
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
if [ "${#missingFiles[@]}" -gt 0 ]; then
|
||||||
|
{
|
||||||
|
echo
|
||||||
|
echo 'error: files specified, but missing'
|
||||||
|
for miss in "${missingFiles[@]}"; do
|
||||||
|
echo " - $miss"
|
||||||
|
done
|
||||||
|
echo
|
||||||
|
} >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# set defaults for missing values (but only after we're done with all our checking so we don't throw any of that off)
|
||||||
|
for conf in "${!configDefaults[@]}"; do
|
||||||
|
default="${configDefaults[$conf]}"
|
||||||
|
var="RABBITMQ_${conf^^}"
|
||||||
|
[ -z "${!var:-}" ] || continue
|
||||||
|
eval "export $var=\"\$default\""
|
||||||
|
done
|
||||||
|
|
||||||
|
# if long and short hostnames are not the same, use long hostnames
|
||||||
|
if [ "$(hostname)" != "$(hostname -s)" ]; then
|
||||||
|
: "${RABBITMQ_USE_LONGNAME:=true}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ "${RABBITMQ_ERLANG_COOKIE:-}" ]; then
|
||||||
|
cookieFile='/var/lib/rabbitmq/.erlang.cookie'
|
||||||
|
if [ -e "$cookieFile" ]; then
|
||||||
|
if [ "$(cat "$cookieFile" 2>/dev/null)" != "$RABBITMQ_ERLANG_COOKIE" ]; then
|
||||||
|
echo >&2
|
||||||
|
echo >&2 "warning: $cookieFile contents do not match RABBITMQ_ERLANG_COOKIE"
|
||||||
|
echo >&2
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
echo "$RABBITMQ_ERLANG_COOKIE" > "$cookieFile"
|
||||||
|
fi
|
||||||
|
chmod 600 "$cookieFile"
|
||||||
|
fi
|
||||||
|
|
||||||
|
configBase="${RABBITMQ_CONFIG_FILE:-/etc/rabbitmq/rabbitmq}"
|
||||||
|
oldConfigFile="$configBase.config"
|
||||||
|
newConfigFile="$configBase.conf"
|
||||||
|
|
||||||
|
shouldWriteConfig="$haveConfig"
|
||||||
|
if [ -n "$shouldWriteConfig" ] && [ -f "$oldConfigFile" ]; then
|
||||||
|
{
|
||||||
|
echo "error: Docker configuration environment variables specified, but old-style (Erlang syntax) configuration file '$oldConfigFile' exists"
|
||||||
|
echo " Suggested fixes: (choose one)"
|
||||||
|
echo " - remove '$oldConfigFile'"
|
||||||
|
echo " - remove any Docker-specific 'RABBITMQ_...' environment variables"
|
||||||
|
echo " - convert '$oldConfigFile' to the newer sysctl format ('$newConfigFile'); see https://www.rabbitmq.com/configure.html#config-file"
|
||||||
|
} >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
if [ -z "$shouldWriteConfig" ] && [ ! -f "$oldConfigFile" ] && [ ! -f "$newConfigFile" ]; then
|
||||||
|
# no config files, we should write one
|
||||||
|
shouldWriteConfig=1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# http://stackoverflow.com/a/2705678/433558
|
||||||
|
sed_escape_lhs() {
|
||||||
|
echo "$@" | sed -e 's/[]\/$*.^|[]/\\&/g'
|
||||||
|
}
|
||||||
|
sed_escape_rhs() {
|
||||||
|
echo "$@" | sed -e 's/[\/&]/\\&/g'
|
||||||
|
}
|
||||||
|
rabbit_set_config() {
|
||||||
|
local key="$1"; shift
|
||||||
|
local val="$1"; shift
|
||||||
|
|
||||||
|
[ -e "$newConfigFile" ] || touch "$newConfigFile"
|
||||||
|
|
||||||
|
local sedKey="$(sed_escape_lhs "$key")"
|
||||||
|
local sedVal="$(sed_escape_rhs "$val")"
|
||||||
|
sed -ri \
|
||||||
|
"s/^[[:space:]]*(${sedKey}[[:space:]]*=[[:space:]]*)\S.*\$/\1${sedVal}/" \
|
||||||
|
"$newConfigFile"
|
||||||
|
if ! grep -qE "^${sedKey}[[:space:]]*=" "$newConfigFile"; then
|
||||||
|
echo "$key = $val" >> "$newConfigFile"
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
rabbit_comment_config() {
|
||||||
|
local key="$1"; shift
|
||||||
|
|
||||||
|
[ -e "$newConfigFile" ] || touch "$newConfigFile"
|
||||||
|
|
||||||
|
local sedKey="$(sed_escape_lhs "$key")"
|
||||||
|
sed -ri \
|
||||||
|
"s/^[[:space:]]*#?[[:space:]]*(${sedKey}[[:space:]]*=[[:space:]]*\S.*)\$/# \1/" \
|
||||||
|
"$newConfigFile"
|
||||||
|
}
|
||||||
|
rabbit_env_config() {
|
||||||
|
local prefix="$1"; shift
|
||||||
|
|
||||||
|
local conf
|
||||||
|
for conf; do
|
||||||
|
local var="rabbitmq${prefix:+_$prefix}_$conf"
|
||||||
|
var="${var^^}"
|
||||||
|
|
||||||
|
local key="$conf"
|
||||||
|
case "$prefix" in
|
||||||
|
ssl) key="ssl_options.$key" ;;
|
||||||
|
management_ssl) key="management.ssl.$key" ;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
local val="${!var:-}"
|
||||||
|
local rawVal="$val"
|
||||||
|
case "$conf" in
|
||||||
|
fail_if_no_peer_cert)
|
||||||
|
case "${val,,}" in
|
||||||
|
false|no|0|'') rawVal='false' ;;
|
||||||
|
true|yes|1|*) rawVal='true' ;;
|
||||||
|
esac
|
||||||
|
;;
|
||||||
|
|
||||||
|
vm_memory_high_watermark) continue ;; # handled separately
|
||||||
|
esac
|
||||||
|
|
||||||
|
if [ -n "$rawVal" ]; then
|
||||||
|
rabbit_set_config "$key" "$rawVal"
|
||||||
|
else
|
||||||
|
rabbit_comment_config "$key"
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
if [ "$1" = 'rabbitmq-server' ] && [ "$shouldWriteConfig" ]; then
|
||||||
|
rabbit_set_config 'loopback_users.guest' 'false'
|
||||||
|
|
||||||
|
# determine whether to set "vm_memory_high_watermark" (based on cgroups)
|
||||||
|
memTotalKb=
|
||||||
|
if [ -r /proc/meminfo ]; then
|
||||||
|
memTotalKb="$(awk -F ':? +' '$1 == "MemTotal" { print $2; exit }' /proc/meminfo)"
|
||||||
|
fi
|
||||||
|
memLimitB=
|
||||||
|
if [ -r /sys/fs/cgroup/memory/memory.limit_in_bytes ]; then
|
||||||
|
# "18446744073709551615" is a valid value for "memory.limit_in_bytes", which is too big for Bash math to handle
|
||||||
|
# "$(( 18446744073709551615 / 1024 ))" = 0; "$(( 18446744073709551615 * 40 / 100 ))" = 0
|
||||||
|
memLimitB="$(awk -v totKb="$memTotalKb" '{
|
||||||
|
limB = $0;
|
||||||
|
limKb = limB / 1024;
|
||||||
|
if (!totKb || limKb < totKb) {
|
||||||
|
printf "%.0f\n", limB;
|
||||||
|
}
|
||||||
|
}' /sys/fs/cgroup/memory/memory.limit_in_bytes)"
|
||||||
|
fi
|
||||||
|
if [ -n "$memLimitB" ]; then
|
||||||
|
# if we have a cgroup memory limit, let's inform RabbitMQ of what it is (so it can calculate vm_memory_high_watermark properly)
|
||||||
|
# https://github.com/rabbitmq/rabbitmq-server/pull/1234
|
||||||
|
rabbit_set_config 'total_memory_available_override_value' "$memLimitB"
|
||||||
|
fi
|
||||||
|
# https://www.rabbitmq.com/memory.html#memsup-usage
|
||||||
|
if [ "${RABBITMQ_VM_MEMORY_HIGH_WATERMARK:-}" ]; then
|
||||||
|
# https://github.com/docker-library/rabbitmq/pull/105#issuecomment-242165822
|
||||||
|
vmMemoryHighWatermark="$(
|
||||||
|
echo "$RABBITMQ_VM_MEMORY_HIGH_WATERMARK" | awk '
|
||||||
|
/^[0-9]*[.][0-9]+$|^[0-9]+([.][0-9]+)?%$/ {
|
||||||
|
perc = $0;
|
||||||
|
if (perc ~ /%$/) {
|
||||||
|
gsub(/%$/, "", perc);
|
||||||
|
perc = perc / 100;
|
||||||
|
}
|
||||||
|
if (perc > 1.0 || perc < 0.0) {
|
||||||
|
printf "error: invalid percentage for vm_memory_high_watermark: %s (must be >= 0%%, <= 100%%)\n", $0 > "/dev/stderr";
|
||||||
|
exit 1;
|
||||||
|
}
|
||||||
|
printf "vm_memory_high_watermark.relative %0.03f\n", perc;
|
||||||
|
next;
|
||||||
|
}
|
||||||
|
/^[0-9]+$/ {
|
||||||
|
printf "vm_memory_high_watermark.absolute %s\n", $0;
|
||||||
|
next;
|
||||||
|
}
|
||||||
|
/^[0-9]+([.][0-9]+)?[a-zA-Z]+$/ {
|
||||||
|
printf "vm_memory_high_watermark.absolute %s\n", $0;
|
||||||
|
next;
|
||||||
|
}
|
||||||
|
{
|
||||||
|
printf "error: unexpected input for vm_memory_high_watermark: %s\n", $0;
|
||||||
|
exit 1;
|
||||||
|
}
|
||||||
|
'
|
||||||
|
)"
|
||||||
|
if [ "$vmMemoryHighWatermark" ]; then
|
||||||
|
vmMemoryHighWatermarkKey="${vmMemoryHighWatermark%% *}"
|
||||||
|
vmMemoryHighWatermarkVal="${vmMemoryHighWatermark#$vmMemoryHighWatermarkKey }"
|
||||||
|
rabbit_set_config "$vmMemoryHighWatermarkKey" "$vmMemoryHighWatermarkVal"
|
||||||
|
case "$vmMemoryHighWatermarkKey" in
|
||||||
|
# make sure we only set one or the other
|
||||||
|
'vm_memory_high_watermark.absolute') rabbit_comment_config 'vm_memory_high_watermark.relative' ;;
|
||||||
|
'vm_memory_high_watermark.relative') rabbit_comment_config 'vm_memory_high_watermark.absolute' ;;
|
||||||
|
esac
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ "$haveSslConfig" ]; then
|
||||||
|
rabbit_set_config 'listeners.ssl.default' 5671
|
||||||
|
rabbit_env_config 'ssl' "${sslConfigKeys[@]}"
|
||||||
|
else
|
||||||
|
rabbit_set_config 'listeners.tcp.default' 5672
|
||||||
|
fi
|
||||||
|
|
||||||
|
rabbit_env_config '' "${rabbitConfigKeys[@]}"
|
||||||
|
|
||||||
|
# if management plugin is installed, generate config for it
|
||||||
|
# https://www.rabbitmq.com/management.html#configuration
|
||||||
|
if [ "$(rabbitmq-plugins list -q -m -e rabbitmq_management)" ]; then
|
||||||
|
if [ "$haveManagementSslConfig" ]; then
|
||||||
|
rabbit_set_config 'management.ssl.port' 15671
|
||||||
|
rabbit_env_config 'management_ssl' "${sslConfigKeys[@]}"
|
||||||
|
else
|
||||||
|
rabbit_set_config 'management.tcp.port' 15672
|
||||||
|
fi
|
||||||
|
|
||||||
|
# if definitions file exists, then load it
|
||||||
|
# https://www.rabbitmq.com/management.html#load-definitions
|
||||||
|
managementDefinitionsFile='/etc/rabbitmq/definitions.json'
|
||||||
|
if [ -f "$managementDefinitionsFile" ]; then
|
||||||
|
# see also https://github.com/docker-library/rabbitmq/pull/112#issuecomment-271485550
|
||||||
|
rabbit_set_config 'management.load_definitions' "$managementDefinitionsFile"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
rabbitmq-plugins enable rabbitmq_management
|
||||||
|
|
||||||
|
combinedSsl='/tmp/rabbitmq-ssl/combined.pem'
|
||||||
|
if [ "$haveSslConfig" ] && [[ "$1" == rabbitmq* ]] && [ ! -f "$combinedSsl" ]; then
|
||||||
|
# Create combined cert
|
||||||
|
{
|
||||||
|
cat "$RABBITMQ_SSL_CERTFILE"
|
||||||
|
echo # https://github.com/docker-library/rabbitmq/issues/357#issuecomment-517755647
|
||||||
|
cat "$RABBITMQ_SSL_KEYFILE"
|
||||||
|
} > "$combinedSsl"
|
||||||
|
chmod 0400 "$combinedSsl"
|
||||||
|
fi
|
||||||
|
if [ "$haveSslConfig" ] && [ -f "$combinedSsl" ]; then
|
||||||
|
# More ENV vars for make clustering happiness
|
||||||
|
# we don't handle clustering in this script, but these args should ensure
|
||||||
|
# clustered SSL-enabled members will talk nicely
|
||||||
|
export ERL_SSL_PATH="$(erl -eval 'io:format("~p", [code:lib_dir(ssl, ebin)]),halt().' -noshell)"
|
||||||
|
sslErlArgs="-pa $ERL_SSL_PATH -proto_dist inet_tls -ssl_dist_opt server_certfile $combinedSsl -ssl_dist_opt server_secure_renegotiate true client_secure_renegotiate true"
|
||||||
|
export RABBITMQ_SERVER_ADDITIONAL_ERL_ARGS="${RABBITMQ_SERVER_ADDITIONAL_ERL_ARGS:-} $sslErlArgs"
|
||||||
|
export RABBITMQ_CTL_ERL_ARGS="${RABBITMQ_CTL_ERL_ARGS:-} $sslErlArgs"
|
||||||
|
fi
|
||||||
|
|
||||||
|
exec "$@"
|
||||||
Reference in New Issue
Block a user