mirror of
https://github.com/hackerschoice/segfault.git
synced 2024-06-29 18:21:22 +00:00
cleanup
This commit is contained in:
parent
cb474c36e6
commit
14821a612f
@ -66,6 +66,7 @@ RUN apt-get update -y \
|
||||
pagekite \
|
||||
socat \
|
||||
thc-ipv6 \
|
||||
weevely \
|
||||
&& /pkg-install.sh FULL apt-get install -y --no-install-recommends \
|
||||
ngrep \
|
||||
python-is-python3 \
|
||||
|
@ -1,3 +1,9 @@
|
||||
all: Dockerfile
|
||||
all: fs-root/bin/docker-exec-sigproxy Dockerfile
|
||||
docker build -t sf-host .
|
||||
|
||||
fs-root/bin/docker-exec-sigproxy: docker-exec-sigproxy.c
|
||||
-docker run --name alpine-gcc alpine sh -c "apk update && apk add gcc libc-dev" \
|
||||
&& docker commit alpine-gcc alpine-gcc
|
||||
docker run --rm -v${PWD}:/src -w /src alpine-gcc gcc -Wall -O2 -o fs-root/bin/docker-exec-sigproxy docker-exec-sigproxy.c
|
||||
@echo SUCCESS
|
||||
|
||||
|
@ -29,13 +29,6 @@
|
||||
// docker instance. Thus we need to 'break out' of that instance to get access
|
||||
// to the host's pid system and to find out the host-pid of the ash process.
|
||||
// If you do not do this then comment out "SIGPROXY_INSIDE_CONTAINER"....
|
||||
//
|
||||
// Notes to compile for our needs (not relevant to anyone else):
|
||||
// docker run --name alpine-gcc -it alpine
|
||||
// apk update && apk add gcc libc-dev && exit
|
||||
// docker commit alpine-gcc alpine-gcc
|
||||
// docker run --rm -v$(pwd):/src -w /src -it alpine-gcc sh -c "gcc -Wall -O2 -o fs-root/bin/docker-exec-sigproxy docker-exec-sigproxy.c"
|
||||
// And we then ship the compiled binary inside our image.
|
||||
|
||||
#include <sys/types.h>
|
||||
#include <sys/socket.h>
|
||||
|
Loading…
Reference in New Issue
Block a user