|
64 | 64 |
|
65 | 65 | COPY --from=trino-storage-connector-image /stackable/trino-storage-${PRODUCT}-src/target/trino-storage-${PRODUCT} /stackable/trino-server-${PRODUCT}/plugin/trino-storage-${PRODUCT} |
66 | 66 | RUN chmod -R g=u /stackable/trino-server-${PRODUCT}/plugin/trino-storage-${PRODUCT} |
67 | | -# For earlier versions this script removes the .class file that contains the |
68 | | -# vulnerable code. |
69 | | -# TODO: This can be restricted to target only versions which do not honor the environment |
70 | | -# varible that has been set above but this has not currently been implemented |
71 | | -COPY shared/log4shell.sh /bin |
72 | | -RUN /bin/log4shell.sh /stackable/trino-server-${PRODUCT} |
73 | | - |
74 | | -# Ensure no vulnerable files are left over |
75 | | -# This will currently report vulnerable files being present, as it also alerts on |
76 | | -# SocketNode.class, which we do not remove with our scripts. |
77 | | -# Further investigation will be needed whether this should also be removed. |
78 | | -COPY shared/log4shell_1.6.1-log4shell_Linux_x86_64 /bin/log4shell_scanner_x86_64 |
79 | | -COPY shared/log4shell_1.6.1-log4shell_Linux_aarch64 /bin/log4shell_scanner_aarch64 |
80 | | -COPY shared/log4shell_scanner /bin/log4shell_scanner |
81 | | -RUN /bin/log4shell_scanner s /stackable/trino-server-${PRODUCT} |
82 | 67 | # === |
83 | 68 |
|
84 | 69 | FROM stackable/image/java-base |
@@ -124,7 +109,7 @@ ln -s /stackable/jmx/jmx_prometheus_javaagent-${JMX_EXPORTER}.jar /stackable/jmx |
124 | 109 | EOF |
125 | 110 |
|
126 | 111 | # ---------------------------------------- |
127 | | -# Attention: We are changing the group of all files in /stackable directly above |
| 112 | +# Attention: |
128 | 113 | # If you do any file based actions (copying / creating etc.) below this comment you |
129 | 114 | # absolutely need to make sure that the correct permissions are applied! |
130 | 115 | # chown ${STACKABLE_USER_UID}:0 |
|
0 commit comments