021258661b
This makes sure that we don't become vulnerable to CVE-2018-17419 or CVE-2019-19794 in the future. While we are not currently vulnerable to either, there is a risk that a PR could be made which uses one of the vulnerable methods in the future, so it's worth going ahead and updating to ensure that a simple PR that would easily pass code review doesn't lead to a vulnerability. Signed-off-by: Sam Whited <sam@samwhited.com>
38 lines
982 B
Bash
Executable file
38 lines
982 B
Bash
Executable file
#!/bin/sh
|
|
|
|
# LIBNETWORK_COMMIT is used to build the docker-userland-proxy binary. When
|
|
# updating the binary version, consider updating github.com/docker/libnetwork
|
|
# in vendor.conf accordingly
|
|
: ${LIBNETWORK_COMMIT:=0941c3f409260d5f05cfa6fc68420d8ad45ee483} # bump_19.03 branch
|
|
|
|
install_proxy() {
|
|
case "$1" in
|
|
"dynamic")
|
|
install_proxy_dynamic
|
|
return
|
|
;;
|
|
"")
|
|
export CGO_ENABLED=0
|
|
_install_proxy
|
|
;;
|
|
*)
|
|
echo 'Usage: $0 [dynamic]'
|
|
;;
|
|
esac
|
|
}
|
|
|
|
install_proxy_dynamic() {
|
|
export PROXY_LDFLAGS="-linkmode=external" install_proxy
|
|
export BUILD_MODE="-buildmode=pie"
|
|
_install_proxy
|
|
}
|
|
|
|
_install_proxy() {
|
|
echo "Install docker-proxy version $LIBNETWORK_COMMIT"
|
|
git clone https://github.com/docker/libnetwork.git "$GOPATH/src/github.com/docker/libnetwork"
|
|
cd "$GOPATH/src/github.com/docker/libnetwork"
|
|
git checkout -q "$LIBNETWORK_COMMIT"
|
|
go build ${BUILD_MODE} -ldflags="$PROXY_LDFLAGS" -o ${PREFIX}/docker-proxy github.com/docker/libnetwork/cmd/proxy
|
|
}
|
|
|
|
|