Skip to content

Commit 1ae874b

Browse files
committed
replaced apt with apt-get
Signed-off-by: Griffin <[email protected]>
1 parent d8de178 commit 1ae874b

File tree

9 files changed

+43
-43
lines changed

9 files changed

+43
-43
lines changed

integration/fixtures/test-images.json

+4-4
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
"tag": "1.21.6",
2222
"digest": "sha256:2bcabc23b45489fb0885d69a06ba1d648aeda973fae7bb981bafbb884165e514",
2323
"distro": "Debian",
24-
"description": "Valid dpkg/status, apt present",
24+
"description": "Valid dpkg/status, apt-get present",
2525
"ignoreErrors": false
2626
},
2727
{
@@ -30,23 +30,23 @@
3030
"digest": "sha256:2bcabc23b45489fb0885d69a06ba1d648aeda973fae7bb981bafbb884165e514",
3131
"localName": "local/image:tag",
3232
"distro": "Debian",
33-
"description": "Valid dpkg/status, apt present, locally tagged with repo and image name",
33+
"description": "Valid dpkg/status, apt-get present, locally tagged with repo and image name",
3434
"ignoreErrors": false
3535
},
3636
{
3737
"image": "registry.k8s.io/kube-proxy",
3838
"tag": "v1.23.4",
3939
"digest": "sha256:30116c7218264d95623d3918a50da703675755cae866cd4c324586611fcd50ea",
4040
"distro": "Debian",
41-
"description": "Valid dpkg/status, apt present, custom network config",
41+
"description": "Valid dpkg/status, apt-get present, custom network config",
4242
"ignoreErrors": false
4343
},
4444
{
4545
"image": "registry.k8s.io/kube-proxy",
4646
"tag": "v1.27.2",
4747
"digest": "sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f",
4848
"distro": "Custom Google Distroless",
49-
"description": "Custom dpkg/status.d with text names, no apt, libssl1.1",
49+
"description": "Custom dpkg/status.d with text names, no apt-get, libssl1.1",
5050
"ignoreErrors": false
5151
},
5252
{

pkg/pkgmgr/dpkg.go

+25-25
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ const (
2424
dpkgLibPath = "/var/lib/dpkg"
2525
dpkgStatusPath = dpkgLibPath + "/status"
2626
dpkgStatusFolder = dpkgLibPath + "/status.d"
27-
dpkgDownloadPath = "/var/cache/apt/archives"
27+
dpkgDownloadPath = "/var/cache/apt-get/archives"
2828

2929
statusdOutputFilename = "statusd_type"
3030
)
@@ -189,12 +189,12 @@ func (dm *dpkgManager) probeDPKGStatus(ctx context.Context, toolImage string, up
189189
llb.ResolveModeDefault,
190190
)
191191
updated := toolingBase.Run(
192-
llb.Shlex("apt update"),
192+
llb.Shlex("apt-get update"),
193193
llb.WithProxy(utils.GetProxy()),
194194
llb.IgnoreCache,
195195
).Root()
196196

197-
const installBusyBoxCmd = "apt install busybox-static"
197+
const installBusyBoxCmd = "apt-get install busybox-static"
198198
busyBoxInstalled := updated.Run(llb.Shlex(installBusyBoxCmd), llb.WithProxy(utils.GetProxy())).Root()
199199
busyBoxApplied := dm.config.ImageState.File(llb.Copy(busyBoxInstalled, "/bin/busybox", "/bin/busybox"))
200200
mkFolders := busyBoxApplied.File(llb.Mkdir(resultsPath, 0o744, llb.WithParents(true)))
@@ -298,19 +298,19 @@ func GetPackageInfo(file string) (string, string, error) {
298298
}
299299

300300
// Patch a regular debian image with:
301-
// - sh and apt installed on the image
301+
// - sh and apt-get installed on the image
302302
// - valid dpkg status on the image
303303
//
304304
// Images with neither (i.e. Google Debian Distroless) should be patched with unpackAndMergeUpdates.
305305
func (dm *dpkgManager) installUpdates(ctx context.Context, updates unversioned.UpdatePackages, ignoreErrors bool) (*llb.State, []byte, error) {
306-
aptUpdated := dm.config.ImageState.Run(
307-
llb.Shlex("apt update"),
306+
aptGetUpdated := dm.config.ImageState.Run(
307+
llb.Shlex("apt-get update"),
308308
llb.WithProxy(utils.GetProxy()),
309309
llb.IgnoreCache,
310310
).Root()
311311

312-
checkUpgradable := `sh -c "apt list --upgradable 2>/dev/null | grep -q "upgradable" || exit 1"`
313-
aptUpdated = aptUpdated.Run(llb.Shlex(checkUpgradable)).Root()
312+
checkUpgradable := `sh -c "apt-get -s upgrade 2>/dev/null | grep -q "^Inst" || exit 1"`
313+
aptGetUpdated = aptGetUpdated.Run(llb.Shlex(checkUpgradable)).Root()
314314

315315
// Install all requested update packages without specifying the version. This works around:
316316
// - Reports being slightly out of date, where a newer security revision has displaced the one specified leading to not found errors.
@@ -319,29 +319,29 @@ func (dm *dpkgManager) installUpdates(ctx context.Context, updates unversioned.U
319319

320320
var installCmd string
321321
if updates != nil {
322-
aptInstallTemplate := `sh -c "apt install --no-install-recommends -y %s && apt clean -y"`
322+
aptGetInstallTemplate := `sh -c "apt-get install --no-install-recommends -y %s && apt-get clean -y"`
323323
pkgStrings := []string{}
324324
for _, u := range updates {
325325
pkgStrings = append(pkgStrings, u.Name)
326326
}
327-
installCmd = fmt.Sprintf(aptInstallTemplate, strings.Join(pkgStrings, " "))
327+
installCmd = fmt.Sprintf(aptGetInstallTemplate, strings.Join(pkgStrings, " "))
328328
} else {
329329
// if updates is not specified, update all packages
330-
installCmd = `sh -c "output=$(apt upgrade -y && apt clean -y && apt autoremove 2>&1); if [ $? -ne 0 ]; then echo "$output" >>error_log.txt; fi"`
330+
installCmd = `sh -c "output=$(apt-get upgrade -y && apt-get clean -y && apt-get autoremove 2>&1); if [ $? -ne 0 ]; then echo "$output" >>error_log.txt; fi"`
331331
}
332332

333-
aptInstalled := aptUpdated.Run(llb.Shlex(installCmd), llb.WithProxy(utils.GetProxy())).Root()
333+
aptGetInstalled := aptGetUpdated.Run(llb.Shlex(installCmd), llb.WithProxy(utils.GetProxy())).Root()
334334

335335
// Validate no errors were encountered if updating all
336336
if updates == nil && !ignoreErrors {
337-
aptInstalled = aptInstalled.Run(buildkit.Sh("if [ -s error_log.txt ]; then cat error_log.txt; exit 1; fi")).Root()
337+
aptGetInstalled = aptGetInstalled.Run(buildkit.Sh("if [ -s error_log.txt ]; then cat error_log.txt; exit 1; fi")).Root()
338338
}
339339

340340
// Write results.manifest to host for post-patch validation
341341
const outputResultsTemplate = `sh -c 'grep "^Package:\|^Version:" "%s" >> "%s"'`
342342
outputResultsCmd := fmt.Sprintf(outputResultsTemplate, dpkgStatusPath, resultManifest)
343-
resultsWritten := aptInstalled.Dir(resultsPath).Run(llb.Shlex(outputResultsCmd)).Root()
344-
resultsDiff := llb.Diff(aptInstalled, resultsWritten)
343+
resultsWritten := aptGetInstalled.Dir(resultsPath).Run(llb.Shlex(outputResultsCmd)).Root()
344+
resultsDiff := llb.Diff(aptGetInstalled, resultsWritten)
345345

346346
resultsBytes, err := buildkit.ExtractFileFromState(ctx, dm.config.Client, &resultsDiff, filepath.Join(resultsPath, resultManifest))
347347
if err != nil {
@@ -354,7 +354,7 @@ func (dm *dpkgManager) installUpdates(ctx context.Context, updates unversioned.U
354354
prevPatchDiff := llb.Diff(dm.config.ImageState, dm.config.PatchedImageState)
355355

356356
// Diff the base image and new patches
357-
newPatchDiff := llb.Diff(aptUpdated, aptInstalled)
357+
newPatchDiff := llb.Diff(aptGetUpdated, aptGetInstalled)
358358

359359
// Merging these two diffs will discard everything in the filesystem that hasn't changed
360360
// Doing llb.Scratch ensures we can keep everything in the filesystem that has not changed
@@ -368,7 +368,7 @@ func (dm *dpkgManager) installUpdates(ctx context.Context, updates unversioned.U
368368
}
369369

370370
// Diff the installed updates and merge that into the target image
371-
patchDiff := llb.Diff(aptUpdated, aptInstalled)
371+
patchDiff := llb.Diff(aptGetUpdated, aptGetInstalled)
372372
patchMerge := llb.Merge([]llb.State{dm.config.ImageState, patchDiff})
373373

374374
return &patchMerge, resultsBytes, nil
@@ -387,9 +387,9 @@ func (dm *dpkgManager) unpackAndMergeUpdates(ctx context.Context, updates unvers
387387
llb.ResolveModeDefault,
388388
)
389389

390-
// Run apt update && apt download list of updates to target folder
390+
// Run apt-get update && apt-get download list of updates to target folder
391391
updated := toolingBase.Run(
392-
llb.Shlex("apt update"),
392+
llb.Shlex("apt-get update"),
393393
llb.WithProxy(utils.GetProxy()),
394394
llb.IgnoreCache,
395395
).Root()
@@ -411,7 +411,7 @@ func (dm *dpkgManager) unpackAndMergeUpdates(ctx context.Context, updates unvers
411411
while IFS=':' read -r package version; do
412412
pkg_name=$(echo "$package" | sed 's/^"\(.*\)"$/\1/')
413413
pkg_version=$(echo "$version" | sed 's/^"\(.*\)"$/\1/')
414-
latest_version=$(apt show $pkg_name 2>/dev/null | awk -F ': ' '/Version:/{print $2}')
414+
latest_version=$(apt-get show $pkg_name 2>/dev/null | awk -F ': ' '/Version:/{print $2}')
415415
416416
if [ "$latest_version" != "$pkg_version" ]; then
417417
update_packages="$update_packages $pkg_name"
@@ -423,8 +423,8 @@ func (dm *dpkgManager) unpackAndMergeUpdates(ctx context.Context, updates unvers
423423
exit 1
424424
fi
425425
426-
mkdir /var/cache/apt/archives
427-
cd /var/cache/apt/archives
426+
mkdir /var/cache/apt-get/archives
427+
cd /var/cache/apt-get/archives
428428
echo "$update_packages" > packages.txt
429429
`,
430430
})).Root()
@@ -436,17 +436,17 @@ func (dm *dpkgManager) unpackAndMergeUpdates(ctx context.Context, updates unvers
436436
var downloadCmd string
437437
pkgStrings := []string{}
438438
if updates != nil {
439-
aptDownloadTemplate := "apt download --no-install-recommends %s"
439+
aptGetDownloadTemplate := "apt-get download --no-install-recommends %s"
440440
for _, u := range updates {
441441
pkgStrings = append(pkgStrings, u.Name)
442442
}
443-
downloadCmd = fmt.Sprintf(aptDownloadTemplate, strings.Join(pkgStrings, " "))
443+
downloadCmd = fmt.Sprintf(aptGetDownloadTemplate, strings.Join(pkgStrings, " "))
444444
} else {
445445
// only update the outdated pacakges from packages.txt
446446
downloadCmd = `
447447
packages=$(<packages.txt)
448448
for package in $packages; do
449-
output=$(apt download --no-install-recommends "$package" 2>&1)
449+
output=$(apt-get download --no-install-recommends "$package" 2>&1)
450450
if [ $? -ne 0 ]; then
451451
echo "$output" >>error_log.txt
452452
fi

pkg/pkgmgr/dpkg_test.go

+7-7
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ var (
196196
func TestDpkgParseResultsManifest(t *testing.T) {
197197
t.Run("valid manifest", func(t *testing.T) {
198198
expectedMap := map[string]string{
199-
"apt": "1.8.2.3",
199+
"apt-get": "1.8.2.3",
200200
"base-files": "10.3+deb10u13",
201201
}
202202
actualMap, err := dpkgParseResultsManifest(validDPKGManifest)
@@ -286,19 +286,19 @@ func TestValidateDebianPackageVersions(t *testing.T) {
286286
{
287287
name: "version lower than requested",
288288
updates: unversioned.UpdatePackages{
289-
{Name: "apt", FixedVersion: "2.0"},
289+
{Name: "apt-get", FixedVersion: "2.0"},
290290
},
291291
cmp: dpkgComparer,
292292
resultsBytes: validDPKGManifest,
293293
ignoreErrors: false,
294294
expectedError: `1 error occurred:
295-
* downloaded package apt version 1.8.2.3 lower than required 2.0 for update`,
296-
expectedErrPkgs: []string{"apt"},
295+
* downloaded package apt-get version 1.8.2.3 lower than required 2.0 for update`,
296+
expectedErrPkgs: []string{"apt-get"},
297297
},
298298
{
299299
name: "version lower than requested with ignore errors",
300300
updates: unversioned.UpdatePackages{
301-
{Name: "apt", FixedVersion: "2.0"},
301+
{Name: "apt-get", FixedVersion: "2.0"},
302302
},
303303
cmp: dpkgComparer,
304304
resultsBytes: validDPKGManifest,
@@ -307,7 +307,7 @@ func TestValidateDebianPackageVersions(t *testing.T) {
307307
{
308308
name: "version equal to requested",
309309
updates: unversioned.UpdatePackages{
310-
{Name: "apt", FixedVersion: "1.8.2.3"},
310+
{Name: "apt-get", FixedVersion: "1.8.2.3"},
311311
},
312312
cmp: dpkgComparer,
313313
resultsBytes: validDPKGManifest,
@@ -316,7 +316,7 @@ func TestValidateDebianPackageVersions(t *testing.T) {
316316
{
317317
name: "version greater than requested",
318318
updates: unversioned.UpdatePackages{
319-
{Name: "apt", FixedVersion: "0.9"},
319+
{Name: "apt-get", FixedVersion: "0.9"},
320320
},
321321
cmp: dpkgComparer,
322322
resultsBytes: validDPKGManifest,

pkg/pkgmgr/testdata/dpkg_invalid.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Package: apt
1+
Package: apt-get
22
Version: a.b.c.d
33
Package: base-files
44
Version: x.y.z

pkg/pkgmgr/testdata/dpkg_valid.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Package: apt
1+
Package: apt-get
22
Version: 1.8.2.3
33
Package: base-files
44
Version: 10.3+deb10u13

website/docs/design.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ title: Design
1616

1717
The design of copa arises from the application of those tenets to the observed issues in previous efforts directly update container images via rebasing, for example, the experimental [`crane rebase`](https://github.com/google/go-containerregistry/blob/main/cmd/crane/rebase.md):
1818

19-
- Rebasing requires that all actors involved in creation of the image are coordinated so that some layers can be switched out without breaking the image. Attempting to switch out layers in the container overlay structure is brittle because most existing containers are created by writing over shared configuration files and data stores in base images. For example, an `apt install` during image creation will overwrite the dpkg `status` file in the base image, which will mask any package updates in a rebased layer. Since many existing container scanners rely on the reported package status to find vulnerable package versions, this can cause new vulnerabilities to not be reported or for patched binaries not to be recognized by the scanners.
19+
- Rebasing requires that all actors involved in creation of the image are coordinated so that some layers can be switched out without breaking the image. Attempting to switch out layers in the container overlay structure is brittle because most existing containers are created by writing over shared configuration files and data stores in base images. For example, an `apt-get install` during image creation will overwrite the dpkg `status` file in the base image, which will mask any package updates in a rebased layer. Since many existing container scanners rely on the reported package status to find vulnerable package versions, this can cause new vulnerabilities to not be reported or for patched binaries not to be recognized by the scanners.
2020

2121
To avoid breaking integration with the existing container ecosystem, copa patches the filesystem bundle as a whole instead of as a collection of layers so that the resulting image state is consistent. This strategy also allows copa to patch vulnerabilties introduced at any layer in the image, including OS packages added in the app layers that is not addressed by a simple rebase. It also supports the core tenet of supporting patching without requiring coordination with all the publishers of the base images that a given image transitively depends on.
2222

website/docs/faq.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: FAQ
44

55
## What kind of vulnerabilities can Copa patch?
66

7-
Copa is capable of patching "OS level" vulnerabilities. This includes packages (like `openssl`) in the image that are managed by a package manager such as `apt` or `yum`. Copa is not currently capable of patching vulnerabilities at the "application level" such as Python packages or Go modules (see [below](#what-kind-of-vulnerabilities-can-copa-not-patch) for more details).
7+
Copa is capable of patching "OS level" vulnerabilities. This includes packages (like `openssl`) in the image that are managed by a package manager such as `apt-get` or `yum`. Copa is not currently capable of patching vulnerabilities at the "application level" such as Python packages or Go modules (see [below](#what-kind-of-vulnerabilities-can-copa-not-patch) for more details).
88

99

1010
## What kind of vulnerabilities can Copa not patch?
@@ -43,7 +43,7 @@ Experimental: This feature might change without preserving backwards compatibili
4343

4444
:::
4545

46-
Copa does not support replacing the repositories in the package managers with alternatives. Images must already use the intended package repositories. For example, for debian, updating `/etc/apt/sources.list` from `http://archive.ubuntu.com/ubuntu/` to a mirror, such as `https://mirrors.wikimedia.org/ubuntu/`.
46+
Copa does not support replacing the repositories in the package managers with alternatives. Images must already use the intended package repositories. For example, for debian, updating `/etc/apt-get/sources.list` from `http://archive.ubuntu.com/ubuntu/` to a mirror, such as `https://mirrors.wikimedia.org/ubuntu/`.
4747

4848
If you need the tooling image to use a different package repository, you can create a source policy to define a replacement image and/or pin to a digest. For example, the following source policy replaces `docker.io/library/debian:11-slim` image with `foo.io/bar/baz:latest@sha256:42d3e6bc186572245aded5a0be381012adba6d89355fa9486dd81b0c634695b5`:
4949

website/docs/introduction.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ In addition to filling the operational gap not met by left-shift security practi
2727
The `copa` tool is an extensible engine that:
2828

2929
1. Parses the needed update packages from the container image’s vulnerability report produced by a scanner like Trivy. New adapters can be written to accommodate more report formats.
30-
2. Obtains and processes the needed update packages using the appropriate package manager tools such as apt, apk, etc. New adapters can be written to support more package managers.
30+
2. Obtains and processes the needed update packages using the appropriate package manager tools such as apt-get, apk, etc. New adapters can be written to support more package managers.
3131
3. Applies the resulting update binaries to the container image using buildkit.
3232

3333
<img title="report-driven vulnerability patching" src="/copacetic/website/img/vulnerability-patch.png" />

website/docs/quick-start.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ This guide illustrates how to patch outdated containers with `copa`.
123123
```bash
124124
$ docker history $IMAGE-patched
125125
IMAGE CREATED CREATED BY SIZE COMMENT
126-
262dacfeb193 About a minute ago mount / from exec sh -c apt install --no-ins… 41.1MB buildkit.exporter.image.v0
126+
262dacfeb193 About a minute ago mount / from exec sh -c apt-get install --no-ins… 41.1MB buildkit.exporter.image.v0
127127
<missing> 20 months ago /bin/sh -c #(nop) CMD ["nginx" "-g" "daemon… 0B
128128
<missing> 20 months ago /bin/sh -c #(nop) STOPSIGNAL SIGQUIT 0B
129129
<missing> 20 months ago /bin/sh -c #(nop) EXPOSE 80 0B

0 commit comments

Comments
 (0)