@@ -41,17 +41,15 @@ ADD --link --chown=101:0 https://raw.githubusercontent.com/nginx/k8s-common/main
41
41
ADD --link --chown=101:0 https://raw.githubusercontent.com/nginx/k8s-common/main/files/nap-dos-debian-12.repo nap-dos-12.sources
42
42
ADD --link --chown=101:0 https://raw.githubusercontent.com/nginx/k8s-common/main/files/nap-waf-v5-debian-12.repo nap-waf-v5-12.sources
43
43
ADD --link --chown=101:0 https://raw.githubusercontent.com/nginx/k8s-common/main/files/agent-debian-12.repo debian-agent-12.sources
44
- ADD --link --chown=101:0 https://raw.githubusercontent.com/nginx/k8s-common/agent-v3/files/agentv3-debian-12.repo debian-agentv3-12.sources
45
44
ADD --link --chown=101:0 https://cs.nginx.com/static/files/nginx-agent.repo nginx-agent.repo
46
45
47
46
RUN --mount=from=busybox:musl,src=/bin/,dst=/bin/ printf "%s\n " "Acquire::https::pkgs.nginx.com::User-Agent k8s-ic-$IC_VERSION${BUILD_OS##debian-plus}-apt;" >> 90pkgs-nginx \
48
47
&& if ! grep -q "${PACKAGE_REPO}" 90pkgs-nginx ; then cat 90pkgs-nginx | sed -e "s/pkgs.nginx.com/${PACKAGE_REPO}/g" >> 90pkgs-nginx; fi \
49
48
&& printf "%s\n " "user_agent=k8s-ic-$IC_VERSION${BUILD_OS##ubi*plus}-dnf" | tee -a nginx-plus-*.repo \
50
49
&& sed -i -e "s;%VERSION%;${NGINX_PLUS_VERSION};g" -e "s;pkgs.nginx.com;${PACKAGE_REPO};g" -e "s;${PACKAGE_REPO}/app-protect-security-updates;pkgs.nginx.com/app-protect-security-updates;g" *.sources \
51
- && sed -e "y/0/1/" -e "s;nginx-agent/;nginx-agentv3/;g" nginx-agent.repo > nginx-agentv3.repo \
52
50
&& sed -i -e "y/0/1/" app-protect-v5-*.repo \
53
51
&& sed -i -e "y/0/1/" -e "1,8s;/centos;/${NGINX_PLUS_VERSION}/centos;" -e "s;pkgs.nginx.com;${PACKAGE_REPO};g" -e "s;${PACKAGE_REPO}/app-protect-security-updates;pkgs.nginx.com/app-protect-security-updates;g" nginx-plus-*.repo app-protect-?.repo app-protect-dos-9.repo \
54
- && sed -i -e "y/0/1/" -e "s;pkgs.nginx.com;${PACKAGE_REPO};g" nginx-agent.repo nginx-agentv3.repo app-protect-v5-?.repo \
52
+ && sed -i -e "y/0/1/" -e "s;pkgs.nginx.com;${PACKAGE_REPO};g" nginx-agent.repo app-protect-v5-?.repo \
55
53
&& echo HTTP_USER_AGENT="k8s-ic-$IC_VERSION${BUILD_OS##alpine-plus}-apk" > user_agent
56
54
57
55
ADD --link --chown=101:0 --chmod=0755 https://raw.githubusercontent.com/nginx/k8s-common/main/files/patch-os.sh patch-os.sh
@@ -86,18 +84,15 @@ USER 101
86
84
FROM nginx:1.27.4-alpine@sha256:4ff102c5d78d254a6f0da062b3cf39eaf07f01eec0927fd21e219d0af8bc0591 AS alpine
87
85
ARG PACKAGE_REPO
88
86
89
- RUN --mount=type=bind,from=alpine-opentracing-lib,target=/tmp/ot/ \
90
- --mount=type=secret,id=nginx-repo.crt,dst=/etc/apk/cert.pem,mode=0644 \
87
+ RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/apk/cert.pem,mode=0644 \
91
88
--mount=type=secret,id=nginx-repo.key,dst=/etc/apk/cert.key,mode=0644 \
92
89
--mount=type=bind,from=nginx-files,src=nginx_signing.rsa.pub,target=/etc/apk/keys/nginx_signing.rsa.pub \
93
90
--mount=type=bind,from=nginx-files,src=user_agent,target=/tmp/user_agent \
94
91
--mount=type=bind,from=nginx-files,src=agent.sh,target=/usr/local/bin/agent.sh \
95
92
apk add --no-cache libcap libstdc++ \
96
93
&& export $(cat /tmp/user_agent) \
97
- && printf "%s\n " "https://${PACKAGE_REPO}/nginx-agentv3 /alpine/v$(grep -E -o '^[0-9]+\. [0-9]+' /etc/alpine-release)/main" >> /etc/apk/repositories \
94
+ && printf "%s\n " "https://${PACKAGE_REPO}/nginx-agent /alpine/v$(grep -E -o '^[0-9]+\. [0-9]+' /etc/alpine-release)/main" >> /etc/apk/repositories \
98
95
&& apk add --no-cache nginx-agent \
99
- && cp -av /tmp/ot/usr/local/lib/libopentracing.so* /tmp/ot/usr/local/lib/libjaegertracing*so* /tmp/ot/usr/local/lib/libzipkin*so* /tmp/ot/usr/local/lib/libdd*so* /tmp/ot/usr/local/lib/libyaml*so* /usr/local/lib/ \
100
- && cp -av /tmp/ot/usr/lib/nginx/modules/ngx_http_opentracing_module.so /usr/lib/nginx/modules/ \
101
96
&& ldconfig /usr/local/lib/ \
102
97
&& agent.sh \
103
98
&& sed -i -e '/nginx.com/d' /etc/apk/repositories
@@ -106,12 +101,11 @@ RUN --mount=type=bind,from=alpine-opentracing-lib,target=/tmp/ot/ \
106
101
# ############################################ Base image for Debian #############################################
107
102
FROM nginx:1.27.4@sha256:124b44bfc9ccd1f3cedf4b592d4d1e8bddb78b51ec2ed5056c52d3692baebc19 AS debian
108
103
109
- RUN --mount=type=bind,from=opentracing-lib,target=/tmp/ot/ \
110
- --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \
104
+ RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \
111
105
--mount=type=secret,id=nginx-repo.key,dst=/etc/ssl/nginx/nginx-repo.key,mode=0644 \
112
106
--mount=type=bind,from=nginx-files,src=nginx_signing.key,target=/tmp/nginx_signing.key \
113
107
--mount=type=bind,from=nginx-files,src=90pkgs-nginx,target=/etc/apt/apt.conf.d/90pkgs-nginx \
114
- --mount=type=bind,from=nginx-files,src=debian-agentv3 -12.sources,target=/tmp/nginx-agent.sources \
108
+ --mount=type=bind,from=nginx-files,src=debian-agent -12.sources,target=/tmp/nginx-agent.sources \
115
109
--mount=type=bind,from=nginx-files,src=agent.sh,target=/usr/local/bin/agent.sh \
116
110
apt-get update \
117
111
&& apt-get install --no-install-recommends --no-install-suggests -y gpg libcap2-bin \
@@ -120,8 +114,6 @@ RUN --mount=type=bind,from=opentracing-lib,target=/tmp/ot/ \
120
114
&& apt-get update \
121
115
&& apt-get install --no-install-recommends --no-install-suggests -y nginx-agent \
122
116
&& apt-get purge --auto-remove -y gpg \
123
- && cp -av /tmp/ot/usr/local/lib/libopentracing.so* /tmp/ot/usr/local/lib/libjaegertracing*so* /tmp/ot/usr/local/lib/libzipkin*so* /tmp/ot/usr/local/lib/libdd*so* /tmp/ot/usr/local/lib/libyaml*so* /usr/local/lib/ \
124
- && cp -av /tmp/ot/usr/lib/nginx/modules/ngx_http_opentracing_module.so /usr/lib/nginx/modules/ \
125
117
&& rm -rf /var/lib/apt/lists/* /etc/apt/sources.list.d/nginx-agent.sources \
126
118
&& agent.sh \
127
119
&& ldconfig
@@ -150,7 +142,7 @@ RUN --mount=type=bind,from=nginx-files,src=nginx_signing.key,target=/tmp/nginx_s
150
142
--mount=type=bind,from=ubi-ppc64le,src=/,target=/ubi-bin/ \
151
143
--mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \
152
144
--mount=type=secret,id=nginx-repo.key,dst=/etc/ssl/nginx/nginx-repo.key,mode=0644 \
153
- --mount=type=bind,from=nginx-files,src=nginx-agentv3 .repo,target=/etc/yum.repos.d/nginx-agent.repo,rw \
145
+ --mount=type=bind,from=nginx-files,src=nginx-agent .repo,target=/etc/yum.repos.d/nginx-agent.repo,rw \
154
146
--mount=type=bind,from=nginx-files,src=agent.sh,target=/usr/local/bin/agent.sh \
155
147
ubi-setup.sh; \
156
148
if [ $(uname -p) = ppc64le ] || [ $(uname -p) = s390x ]; then \
@@ -186,7 +178,7 @@ RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/apk/cert.pem,mode=0644 \
186
178
--mount=type=bind,from=nginx-files,src=tracking.info,target=/tmp/nginx/reporting/tracking.info \
187
179
export $(cat /tmp/user_agent) \
188
180
&& printf "%s\n " "https://${PACKAGE_REPO}/plus/${NGINX_PLUS_VERSION}/alpine/v$(grep -E -o '^[0-9]+\. [0-9]+' /etc/alpine-release)/main" >> /etc/apk/repositories \
189
- && printf "%s\n " "https://${PACKAGE_REPO}/nginx-agentv3 /alpine/v$(grep -E -o '^[0-9]+\. [0-9]+' /etc/alpine-release)/main" >> /etc/apk/repositories \
181
+ && printf "%s\n " "https://${PACKAGE_REPO}/nginx-agent /alpine/v$(grep -E -o '^[0-9]+\. [0-9]+' /etc/alpine-release)/main" >> /etc/apk/repositories \
190
182
&& apk add --no-cache nginx-plus nginx-plus-module-njs nginx-plus-module-fips-check nginx-agent libcap libcurl \
191
183
&& mkdir -p /etc/nginx/reporting/ && cp -av /tmp/nginx/reporting/tracking.info /etc/nginx/reporting/tracking.info \
192
184
&& agent.sh \
@@ -228,7 +220,7 @@ RUN --mount=type=bind,from=alpine-fips-3.19,target=/tmp/fips/ \
228
220
&& printf "%s\n " "https://pkgs.nginx.com/app-protect-security-updates/alpine/v$(grep -E -o '^[0-9]+\. [0-9]+' /etc/alpine-release)/main" >> /etc/apk/repositories \
229
221
&& printf "%s\n " "https://${PACKAGE_REPO}/nginx-agent/alpine/v$(grep -E -o '^[0-9]+\. [0-9]+' /etc/alpine-release)/main" >> /etc/apk/repositories \
230
222
&& apk add --no-cache libcap-utils libcurl nginx-plus nginx-plus-module-njs nginx-plus-module-fips-check \
231
- && apk add --no-cache nginx-agent \
223
+ && apk add --no-cache nginx-agent=2.* \
232
224
&& mkdir -p /usr/ssl \
233
225
&& cp -av /tmp/fips/usr/lib/ossl-modules/fips.so /usr/lib/ossl-modules/fips.so \
234
226
&& cp -av /tmp/fips/usr/ssl/fipsmodule.cnf /usr/ssl/fipsmodule.cnf \
@@ -259,7 +251,7 @@ RUN --mount=type=bind,from=alpine-fips-3.19,target=/tmp/fips/ \
259
251
&& printf "%s\n " "https://${PACKAGE_REPO}/app-protect-x-plus/alpine/v$(grep -E -o '^[0-9]+\. [0-9]+' /etc/alpine-release)/main" >> /etc/apk/repositories \
260
252
&& printf "%s\n " "https://${PACKAGE_REPO}/nginx-agent/alpine/v$(grep -E -o '^[0-9]+\. [0-9]+' /etc/alpine-release)/main" >> /etc/apk/repositories \
261
253
&& apk add --no-cache libcap-utils libcurl nginx-plus nginx-plus-module-njs nginx-plus-module-fips-check \
262
- && apk add --no-cache nginx-agent \
254
+ && apk add --no-cache " nginx-agent<3" \
263
255
&& mkdir -p /usr/ssl \
264
256
&& cp -av /tmp/fips/usr/lib/ossl-modules/fips.so /usr/lib/ossl-modules/fips.so \
265
257
&& cp -av /tmp/fips/usr/ssl/fipsmodule.cnf /usr/ssl/fipsmodule.cnf \
@@ -311,7 +303,7 @@ SHELL ["/bin/bash", "-o", "pipefail", "-c"]
311
303
RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \
312
304
--mount=type=secret,id=nginx-repo.key,dst=/etc/ssl/nginx/nginx-repo.key,mode=0644 \
313
305
--mount=type=bind,from=nginx-files,src=90pkgs-nginx,target=/etc/apt/apt.conf.d/90pkgs-nginx \
314
- --mount=type=bind,from=nginx-files,src=debian-agentv3 -12.sources,target=/tmp/nginx-agent.sources \
306
+ --mount=type=bind,from=nginx-files,src=debian-agent -12.sources,target=/tmp/nginx-agent.sources \
315
307
--mount=type=bind,from=nginx-files,src=agent.sh,target=/usr/local/bin/agent.sh \
316
308
apt-get update \
317
309
&& cp /tmp/nginx-agent.sources /etc/apt/sources.list.d/nginx-agent.sources \
@@ -340,7 +332,7 @@ RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode
340
332
cp /tmp/app-protect.sources /etc/apt/sources.list.d/app-protect.sources \
341
333
&& cp /tmp/nginx-agent.sources /etc/apt/sources.list.d/nginx-agent.sources \
342
334
&& apt-get update \
343
- && apt-get install --no-install-recommends --no-install-suggests -y app-protect app-protect-attack-signatures app-protect-threat-campaigns nginx-agent \
335
+ && apt-get install --no-install-recommends --no-install-suggests -y app-protect app-protect-attack-signatures app-protect-threat-campaigns nginx-agent=2.* \
344
336
&& rm -f /etc/apt/sources.list.d/app-protect.sources /etc/apt/sources.list.d/nginx-agent.sources \
345
337
&& nap-waf.sh \
346
338
&& agent.sh; \
@@ -368,7 +360,7 @@ RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode
368
360
--mount=type=bind,from=nginx-files,src=nap-waf.sh,target=/usr/local/bin/nap-waf.sh \
369
361
--mount=type=bind,from=nginx-files,src=debian-agent-12.sources,target=/etc/apt/sources.list.d/nginx-agent.sources \
370
362
apt-get update \
371
- nginx-agent app-protect-module-plus=34+5.342* nginx-plus-module-appprotect=34+5.342* app-protect-plugin=6.12.0* \
363
+ && apt-get install --no-install-recommends --no-install-suggests -y nginx-agent=2.* app-protect-module-plus=34+5.342* nginx-plus-module-appprotect=34+5.342* app-protect-plugin=6.12.0* \
372
364
&& nap-waf.sh \
373
365
&& agent.sh
374
366
@@ -386,7 +378,7 @@ RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode
386
378
--mount=type=bind,from=nginx-files,src=nginx-plus-9.repo,target=/etc/yum.repos.d/nginx-plus.repo \
387
379
--mount=type=bind,from=nginx-files,src=ubi-setup.sh,target=/usr/local/bin/ubi-setup.sh \
388
380
--mount=type=bind,from=nginx-files,src=ubi-clean.sh,target=/usr/local/bin/ubi-clean.sh \
389
- --mount=type=bind,from=nginx-files,src=nginx-agentv3 .repo,target=/etc/yum.repos.d/nginx-agent.repo,rw \
381
+ --mount=type=bind,from=nginx-files,src=nginx-agent .repo,target=/etc/yum.repos.d/nginx-agent.repo,rw \
390
382
--mount=type=bind,from=nginx-files,src=agent.sh,target=/usr/local/bin/agent.sh \
391
383
--mount=type=bind,from=nginx-files,src=tracking.info,target=/tmp/nginx/reporting/tracking.info \
392
384
mkdir -p /etc/nginx/reporting/ \
@@ -428,7 +420,7 @@ RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode
428
420
rpm --import /tmp/app-protect-security-updates.key \
429
421
&& cp /tmp/app-protect-9.repo /etc/yum.repos.d/app-protect-9.repo \
430
422
&& microdnf --enablerepo=codeready-builder-for-rhel-9-x86_64-rpms --nodocs install -y \
431
- app-protect app-protect-attack-signatures app-protect-threat-campaigns nginx-agent \
423
+ app-protect app-protect-attack-signatures app-protect-threat-campaigns nginx-agent-2.* \
432
424
&& rm -f /etc/yum.repos.d/app-protect-9.repo \
433
425
&& nap-waf.sh \
434
426
&& agent.sh; \
@@ -463,7 +455,7 @@ RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode
463
455
&& microdnf --nodocs install -y nginx-plus nginx-plus-module-njs nginx-plus-module-fips-check \
464
456
&& source /tmp/rhel_license \
465
457
&& microdnf --nodocs install -y ca-certificates shadow-utils subscription-manager \
466
- && microdnf --nodocs install -y nginx-agent app-protect-module-plus-34+5.342* \
458
+ && microdnf --nodocs install -y nginx-agent-2.* app-protect-module-plus-34+5.342* \
467
459
&& nap-waf.sh \
468
460
&& ubi-clean.sh \
469
461
&& agent.sh
@@ -492,7 +484,7 @@ RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode
492
484
&& useradd --system --gid nginx --no-create-home --home-dir /nonexistent --comment "nginx user" --shell /bin/false --uid 101 nginx \
493
485
&& rpm --import /tmp/nginx_signing.key \
494
486
&& rpm --import /tmp/app-protect-security-updates.key \
495
- && dnf --nodocs install -y nginx-plus nginx-plus-module-njs nginx-plus-module-fips-check nginx-agent \
487
+ && dnf --nodocs install -y nginx-plus nginx-plus-module-njs nginx-plus-module-fips-check nginx-agent-2.* \
496
488
&& sed -i 's/\( def in_container():\) /\1\n return False/g' /usr/lib64/python*/*-packages/rhsm/config.py \
497
489
&& subscription-manager register --org=${RHEL_ORGANIZATION} --activationkey=${RHEL_ACTIVATION_KEY} || true \
498
490
&& subscription-manager attach \
@@ -527,7 +519,7 @@ RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode
527
519
&& groupadd --system --gid 101 nginx \
528
520
&& useradd --system --gid nginx --no-create-home --home-dir /nonexistent --comment "nginx user" --shell /bin/false --uid 101 nginx \
529
521
&& rpm --import /tmp/nginx_signing.key \
530
- && dnf --nodocs install -y nginx-plus nginx-plus-module-njs nginx-plus-module-fips-check nginx-agent \
522
+ && dnf --nodocs install -y nginx-plus nginx-plus-module-njs nginx-plus-module-fips-check nginx-agent-2.* \
531
523
&& dnf --nodocs install -y app-protect-module-plus-34+5.342* \
532
524
&& nap-waf.sh \
533
525
&& agent.sh \
0 commit comments