2020-06-11 18:04:23 -05:00
|
|
|
# docker image for snmp agent
|
|
|
|
|
|
|
|
DOCKER_SNMP_STEM = docker-snmp
|
|
|
|
DOCKER_SNMP = $(DOCKER_SNMP_STEM).gz
|
|
|
|
DOCKER_SNMP_DBG = $(DOCKER_SNMP_STEM)-$(DBG_IMAGE_MARK).gz
|
|
|
|
|
|
|
|
$(DOCKER_SNMP)_PATH = $(DOCKERS_PATH)/docker-snmp
|
|
|
|
|
|
|
|
## TODO: remove LIBPY3_DEV if we can get pip3 directly
|
|
|
|
$(DOCKER_SNMP)_DEPENDS += $(SNMP) $(SNMPD)
|
|
|
|
|
2022-08-19 13:20:17 -05:00
|
|
|
$(DOCKER_SNMP)_DBG_DEPENDS = $($(DOCKER_CONFIG_ENGINE_BULLSEYE)_DBG_DEPENDS)
|
2020-06-11 18:04:23 -05:00
|
|
|
$(DOCKER_SNMP)_DBG_DEPENDS += $(SNMP_DBG) $(SNMPD_DBG) $(LIBSNMP_DBG)
|
2022-08-24 19:35:51 -05:00
|
|
|
$(DOCKER_SNMP)_DBG_DEPENDS += $(LIBSWSSCOMMON) $(PYTHON3_SWSSCOMMON)
|
2020-06-11 18:04:23 -05:00
|
|
|
|
2022-08-19 13:20:17 -05:00
|
|
|
$(DOCKER_SNMP)_DBG_IMAGE_PACKAGES = $($(DOCKER_CONFIG_ENGINE_BULLSEYE)_DBG_IMAGE_PACKAGES)
|
2020-06-11 18:04:23 -05:00
|
|
|
|
2022-08-24 19:35:51 -05:00
|
|
|
$(DOCKER_SNMP)_PYTHON_WHEELS += $(SONIC_PY_COMMON_PY3) $(SONIC_PLATFORM_COMMON_PY3) $(ASYNCSNMP_PY3)
|
2022-08-19 13:20:17 -05:00
|
|
|
$(DOCKER_SNMP)_LOAD_DOCKERS += $(DOCKER_CONFIG_ENGINE_BULLSEYE)
|
2020-06-11 18:04:23 -05:00
|
|
|
|
2021-04-26 15:51:50 -05:00
|
|
|
$(DOCKER_SNMP)_VERSION = 1.0.0
|
|
|
|
$(DOCKER_SNMP)_PACKAGE_NAME = snmp
|
|
|
|
|
2020-06-11 18:04:23 -05:00
|
|
|
SONIC_DOCKER_IMAGES += $(DOCKER_SNMP)
|
|
|
|
SONIC_INSTALL_DOCKER_IMAGES += $(DOCKER_SNMP)
|
|
|
|
|
|
|
|
SONIC_DOCKER_DBG_IMAGES += $(DOCKER_SNMP_DBG)
|
|
|
|
SONIC_INSTALL_DOCKER_DBG_IMAGES += $(DOCKER_SNMP_DBG)
|
|
|
|
|
|
|
|
$(DOCKER_SNMP)_CONTAINER_NAME = snmp
|
[docker-snmp] limit privileged flag for snmp container (#16971)
Why I did it
HLD implementation: Container Hardening (sonic-net/SONiC#1364)
Work item tracking
Microsoft ADO (number only): 14807420
How I did it
Reduce linux capabilities in privileged flag
How to verify it
Run snmp sonic-mgmt tests
Check container's settings: Privileged is false and container only has default Linux caps, does not have extended caps.
admin@vlab-01:~$ docker inspect snmp | grep Privi
"Privileged": false,
admin@vlab-01:~$ docker exec -it snmp bash
root@vlab-01:/# capsh --print
Current: cap_chown,cap_dac_override,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_net_bind_service,cap_net_raw,cap_sys_chroot,cap_mknod,cap_audit_write,cap_setfcap=ep
Bounding set =cap_chown,cap_dac_override,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_net_bind_se
2023-11-16 08:15:37 -06:00
|
|
|
$(DOCKER_SNMP)_RUN_OPT += -t
|
2020-06-11 18:04:23 -05:00
|
|
|
$(DOCKER_SNMP)_RUN_OPT += -v /etc/sonic:/etc/sonic:ro
|
2023-06-25 18:36:09 -05:00
|
|
|
$(DOCKER_SNMP)_RUN_OPT += -v /etc/timezone:/etc/timezone:ro
|
2020-06-11 18:04:23 -05:00
|
|
|
$(DOCKER_SNMP)_FILES += $(SUPERVISOR_PROC_EXIT_LISTENER_SCRIPT)
|
2023-04-06 14:19:11 -05:00
|
|
|
$(DOCKER_SNMP)_BASE_IMAGE_FILES += monit_snmp:/etc/monit/conf.d
|
2021-06-30 14:45:40 -05:00
|
|
|
|
2022-08-19 13:20:17 -05:00
|
|
|
SONIC_BULLSEYE_DOCKERS += $(DOCKER_SNMP)
|
|
|
|
SONIC_BULLSEYE_DBG_DOCKERS += $(DOCKER_SNMP_DBG)
|