You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

22 lines
1.1 KiB
Docker

FROM alpine:3.14.2 AS stage
LABEL maintainer="Nicolas Favre-Felix <n.favrefelix@gmail.com>"
11 years ago
RUN apk update && apk add wget make gcc libevent-dev msgpack-c-dev musl-dev bsd-compat-headers jq
RUN wget -q https://api.github.com/repos/nicolasff/webdis/tags -O /dev/stdout | jq '.[] | .name' | head -1 | sed 's/"//g' > latest
RUN wget https://github.com/nicolasff/webdis/archive/$(cat latest).tar.gz -O webdis-latest.tar.gz
RUN tar -xvzf webdis-latest.tar.gz
RUN cd webdis-$(cat latest) && make && make install && cd ..
RUN sed -i -e 's/"daemonize":.*true,/"daemonize": false,/g' /etc/webdis.prod.json
11 years ago
# main image
FROM alpine:3.14.2
# Required dependencies, with versions fixing known security vulnerabilities
Release 0.1.17.1 (Fixes Redis vulnerabilities) Security update: upgrading the version of Redis bundled in the Webdis image to fix a number of severe vulnerabilities. * Low severity vulnerability found in redis/redis Description: Integer Overflow or Wraparound Info: https://snyk.io/vuln/SNYK-ALPINE314-REDIS-1727801 Introduced through: redis/redis@6.2.5-r0 From: redis/redis@6.2.5-r0 Fixed in: 6.2.6-r0 * Medium severity vulnerability found in redis/redis Description: Out-of-bounds Read Info: https://snyk.io/vuln/SNYK-ALPINE314-REDIS-1727803 Introduced through: redis/redis@6.2.5-r0 From: redis/redis@6.2.5-r0 Fixed in: 6.2.6-r0 * High severity vulnerability found in redis/redis Description: Allocation of Resources Without Limits or Throttling Info: https://snyk.io/vuln/SNYK-ALPINE314-REDIS-1727783 Introduced through: redis/redis@6.2.5-r0 From: redis/redis@6.2.5-r0 Fixed in: 6.2.6-r0 * High severity vulnerability found in redis/redis Description: CVE-2021-32626 Info: https://snyk.io/vuln/SNYK-ALPINE314-REDIS-1727820 Introduced through: redis/redis@6.2.5-r0 From: redis/redis@6.2.5-r0 Fixed in: 6.2.6-r0 * High severity vulnerability found in redis/redis Description: Integer Overflow or Wraparound Info: https://snyk.io/vuln/SNYK-ALPINE314-REDIS-1727822 Introduced through: redis/redis@6.2.5-r0 From: redis/redis@6.2.5-r0 Fixed in: 6.2.6-r0 * High severity vulnerability found in redis/redis Description: Integer Overflow or Wraparound Info: https://snyk.io/vuln/SNYK-ALPINE314-REDIS-1727823 Introduced through: redis/redis@6.2.5-r0 From: redis/redis@6.2.5-r0 Fixed in: 6.2.6-r0 * High severity vulnerability found in redis/redis Description: Integer Overflow or Wraparound Info: https://snyk.io/vuln/SNYK-ALPINE314-REDIS-1727825 Introduced through: redis/redis@6.2.5-r0 From: redis/redis@6.2.5-r0 Fixed in: 6.2.6-r0 * High severity vulnerability found in redis/redis Description: Integer Overflow or Wraparound Info: https://snyk.io/vuln/SNYK-ALPINE314-REDIS-1727826 Introduced through: redis/redis@6.2.5-r0 From: redis/redis@6.2.5-r0 Fixed in: 6.2.6-r0
3 years ago
# RUN apk update && apk add libevent msgpack-c 'redis>5.1' 'apk-tools>2.12.6-r0'
RUN apk update && apk add libevent msgpack-c 'redis>6.2.6' 'apk-tools>2.12.6-r0'
COPY --from=stage /usr/local/bin/webdis /usr/local/bin/
COPY --from=stage /etc/webdis.prod.json /etc/webdis.prod.json
RUN echo "daemonize yes" >> /etc/redis.conf
CMD /usr/bin/redis-server /etc/redis.conf && /usr/local/bin/webdis /etc/webdis.prod.json
11 years ago
EXPOSE 7379