@@ -41,7 +41,7 @@ RUN chmod 0555 /bin/tini
4141<% } else { %>
4242
4343# Install required packages to extract the Elasticsearch distribution
44- <% if (docker_base == "wolfi" || docker_base == "cloud_ess_fips" ) { %>
44+ <% if (docker_base == "wolfi") { %>
4545RUN <%= retry.loop(package_manager, "export DEBIAN_FRONTEND=noninteractive && ${package_manager} update && ${package_manager} update && ${package_manager} add --no-cache curl") %>
4646<% } else { %>
4747RUN <%= retry.loop(package_manager, "${package_manager} install -y findutils tar gzip") %>
@@ -115,51 +115,6 @@ RUN sed -i -e 's/ES_DISTRIBUTION_TYPE=tar/ES_DISTRIBUTION_TYPE=docker/' bin/elas
115115 chmod 0775 bin config config/jvm.options.d data logs plugins && \\
116116 find config -type f -exec chmod 0664 {} +
117117
118- <% if (docker_base == "cloud_ess_fips" ) { %>
119-
120- # Add plugins infrastructure
121- RUN mkdir -p /opt/plugins/archive
122- RUN chmod -R 0555 /opt/plugins
123-
124- RUN mkdir -p /fips/libs
125- COPY fips/libs/*.jar /fips/libs/
126-
127- COPY filebeat-${version}.tar.gz metricbeat-${version}.tar.gz /tmp/
128- RUN set -eux ; \\
129- for beat in filebeat metricbeat ; do \\
130- if [ ! -s /tmp/\$ beat-${version}.tar.gz ]; then \\
131- echo "/tmp/\$ beat-${version}.tar.gz is empty - cannot uncompress" 2>&1 ; \\
132- exit 1 ; \\
133- fi ; \\
134- if ! tar tf /tmp/\$ beat-${version}.tar.gz >/dev/null; then \\
135- echo "/tmp/\$ beat-${version}.tar.gz is corrupt - cannot uncompress" 2>&1 ; \\
136- exit 1 ; \\
137- fi ; \\
138- mkdir -p /opt/\$ beat ; \\
139- tar xf /tmp/\$ beat-${version}.tar.gz -C /opt/\$ beat --strip-components=1 ; \\
140- done
141-
142- COPY plugins/*.zip /opt/plugins/archive/
143-
144- RUN chown 1000:1000 /opt/plugins/archive/*
145- RUN chmod 0444 /opt/plugins/archive/*
146-
147- COPY fips/resources/fips_java.security /usr/share/elasticsearch/config/fips_java.security
148- COPY fips/resources/fips_java.policy /usr/share/elasticsearch/config/fips_java.policy
149-
150- WORKDIR /usr/share/elasticsearch/config
151-
152- # # Add fips specific JVM options
153- RUN cat <<EOF > /usr/share/elasticsearch/config/jvm.options.d/fips.options
154- -Djavax.net.ssl.keyStoreType=BCFKS
155- -Dorg.bouncycastle.fips.approved_only=true
156- -Djava.security.properties=config/fips_java.security
157- -Djava.security.policy=config/fips_java.policy
158- EOF
159-
160- <% } %>
161-
162-
163118# ###############################################################################
164119# Build stage 2 (the actual Elasticsearch image):
165120#
@@ -179,7 +134,7 @@ RUN ${package_manager} update --setopt=tsflags=nodocs -y && \\
179134 nc shadow-utils zip findutils unzip procps-ng && \\
180135 ${package_manager} clean all
181136
182- <% } else if (docker_base == "wolfi" || docker_base == "cloud_ess_fips" ) { %>
137+ <% } else if (docker_base == "wolfi") { %>
183138RUN <%= retry.loop(package_manager,
184139 "export DEBIAN_FRONTEND=noninteractive && \n " +
185140 " ${package_manager} update && \n " +
@@ -208,7 +163,7 @@ RUN <%= retry.loop(
208163<% } %>
209164
210165
211- <% if (docker_base == "wolfi" || docker_base == "cloud_ess_fips" ) { %>
166+ <% if (docker_base == "wolfi") { %>
212167RUN groupadd -g 1000 elasticsearch && \
213168 adduser -G elasticsearch -u 1000 elasticsearch -D --home /usr/share/elasticsearch elasticsearch && \
214169 adduser elasticsearch root && \
@@ -224,7 +179,7 @@ ENV ELASTIC_CONTAINER=true
224179WORKDIR /usr/share/elasticsearch
225180
226181COPY --from=builder --chown=0:0 /usr/share/elasticsearch /usr/share/elasticsearch
227- <% if (docker_base != "wolfi" && docker_base != "cloud_ess_fips" ) { %>
182+ <% if (docker_base != "wolfi") { %>
228183COPY --from=builder --chown=0:0 /bin/tini /bin/tini
229184<% } %>
230185
@@ -249,7 +204,7 @@ RUN chmod g=u /etc/passwd && \\
249204 chmod 0775 /usr/share/elasticsearch && \\
250205 chown elasticsearch bin config config/jvm.options.d data logs plugins
251206
252- <% if (docker_base == 'wolfi' || docker_base == "cloud_ess_fips" ) { %>
207+ <% if (docker_base == 'wolfi' ) { %>
253208RUN ln -sf /etc/ssl/certs/java/cacerts /usr/share/elasticsearch/jdk/lib/security/cacerts
254209<% } else { %>
255210RUN ln -sf /etc/pki/ca-trust/extracted/java/cacerts /usr/share/elasticsearch/jdk/lib/security/cacerts
@@ -292,7 +247,7 @@ RUN mkdir /licenses && ln LICENSE.txt /licenses/LICENSE
292247COPY LICENSE /licenses/LICENSE.addendum
293248<% } %>
294249
295- <% if (docker_base == "wolfi" || docker_base == "cloud_ess_fips" ) { %>
250+ <% if (docker_base == "wolfi" ) { %>
296251# Our actual entrypoint is `tini`, a minimal but functional init program. It
297252# calls the entrypoint we provide, while correctly forwarding signals.
298253ENTRYPOINT ["/sbin/tini" , "--" , "/usr/local/bin/docker-entrypoint.sh" ]
@@ -311,13 +266,6 @@ USER 1000:0
311266<% if (docker_base == 'iron_bank' ) { %>
312267HEALTHCHECK --interval=10s --timeout=5s --start-period=1m --retries=5 CMD curl -I -f --max-time 5 http://localhost:9200 || exit 1
313268<% } %>
314-
315- <% if (docker_base == 'cloud_ess_fips' ) { %>
316- COPY --from=builder --chown=0:0 /opt /opt
317- ENV ES_PLUGIN_ARCHIVE_DIR=/opt/plugins/archive
318- WORKDIR /usr/share/elasticsearch
319- COPY --from=builder --chown=0:0 /fips/libs/*.jar /usr/share/elasticsearch/lib/
320- <% } %>
321269# ###############################################################################
322270# End of multi-stage Dockerfile
323271# ###############################################################################
0 commit comments