removed apt simulation doing now real apt updates/install

This commit is contained in:
2026-02-15 18:18:30 +01:00
parent bc1e17ec04
commit 34d6707ba3
4 changed files with 13 additions and 41 deletions
@@ -2,6 +2,6 @@
# Start container with the test image (interactive shell)
docker run -it --rm \
--cap-drop ALL --security-opt no-new-privileges --tmpfs /tmp:rw \
-v "$(pwd)/../post_installation_script/20251212_Nachinstallationsarbeiten_LC_Esslingen_XFCE_v8.sh":/workspace/script.sh:ro \
--tmpfs /tmp:rw \
-v "$(pwd)/../post_installation_script/":/workspace/:ro \
mint-script-test
+4 -33
View File
@@ -1,41 +1,12 @@
FROM ubuntu:22.04
# Minimal image for safe simulation of apt installs.
# Install required utilities including sudo
RUN apt-get update && apt-get install -y --no-install-recommends \
bash wget tar curl gnupg ca-certificates apt-utils apt coreutils file procps && \
bash wget tar curl gnupg ca-certificates apt-utils apt coreutils file procps sudo && \
apt-get clean && rm -rf /var/lib/apt/lists/*
# sudo wrapper: simulate apt installs and avoid making changes to the image
RUN cat > /usr/local/bin/sudo <<'EOF'
#!/bin/sh
# sudo wrapper for simulation:
# - simulate installs with `apt-get -s install ...`
# - run `apt-get update` quietly (needed so apt -s has metadata)
# - otherwise echo the command (no-op)
cmd="$1"
arg2="${2:-}"
if [ "$cmd" = "apt" ] || [ "$cmd" = "apt-get" ]; then
if [ "$arg2" = "install" ]; then
shift 2
echo "[sudo-wrapper] simulating: apt-get -s install $@"
apt-get -s install "$@"
exit $?
elif [ "$arg2" = "update" ]; then
# do not run update at runtime (may require extra privileges); simulate instead
echo "[sudo-wrapper] simulating: apt-get update (no-op in container)"
exit 0
else
echo "[sudo-wrapper] would run: $@"
exit 0
fi
else
echo "[sudo-wrapper] would run: $@"
exit 0
fi
EOF
RUN chmod +x /usr/local/bin/sudo
ENV PATH=/usr/local/bin:$PATH
# Configure passwordless sudo for all users (needed for script)
RUN echo 'ALL ALL=(ALL) NOPASSWD: ALL' >> /etc/sudoers
WORKDIR /workspace
ENTRYPOINT ["/bin/bash"]
+7 -6
View File
@@ -13,7 +13,7 @@ This directory contains everything needed to test the post-installation script i
Provides a reproducible testing environment that allows:
- Running the post-installation script without affecting the host system
- Simulating `apt` installations (safe, no real package changes)
- Real `apt` installations (isolated in container)
- Testing script logic, prompts, and error handling
- Validating syntax and tracing execution
@@ -22,8 +22,8 @@ Provides a reproducible testing environment that allows:
The Dockerfile includes:
- Ubuntu 22.04 base image
- Simulated `sudo` wrapper that runs `apt-get -s install` (simulates installs without making changes)
- Useful utilities: `bash`, `wget`, `tar`, `curl`, `gnupg`, `ca-certificates`, `file`, `procps`
- Passwordless sudo for real apt installations
- Useful utilities: `bash`, `wget`, `tar`, `curl`, `gnupg`, `ca-certificates`, `file`, `procps`, `sudo`
## Usage
@@ -49,12 +49,13 @@ sh 02_start_container_with_image.sh
After container is started an interactive session was started in the container and the script can be started for testing
```bash
sh script.sh
ls -al
sh <scriptName>.sh
```
## Security Notes
- The script is mounted read-only (`:ro` flag) to prevent container from modifying host files
- Container runs with reduced privileges (`--cap-drop ALL --security-opt no-new-privileges`)
- The `sudo` wrapper simulates apt operations, so no packages are actually installed
- All apt installations are real but isolated in the container
- Use `--tmpfs /tmp:rw` for any temporary writes inside the container
- Container is automatically removed after exit (`--rm` flag)