- Implement export-malicious-ips task that queries distinct IPs flagged
as is_suspicious from database and writes to exports/malicious_ips.txt
- Add exports volume mount to docker-compose.yaml for host persistence
- Update entrypoint.sh to fix ownership of exports directory for krawl user
- Update Dockerfile to create /app/exports directory during build
Other tasks can be added by creating them in the tasks dir using the same setup as this task.
All tasks *MUST* include a TASK_CONFIG dict and a main method in the file to work correctly.
29 lines
670 B
Docker
29 lines
670 B
Docker
FROM python:3.11-slim
|
|
|
|
LABEL org.opencontainers.image.source=https://github.com/BlessedRebuS/Krawl
|
|
|
|
WORKDIR /app
|
|
|
|
# Install gosu for dropping privileges
|
|
RUN apt-get update && apt-get install -y --no-install-recommends gosu && \
|
|
rm -rf /var/lib/apt/lists/*
|
|
|
|
COPY requirements.txt /app/
|
|
RUN pip install --no-cache-dir -r requirements.txt
|
|
|
|
COPY src/ /app/src/
|
|
COPY wordlists.json /app/
|
|
COPY entrypoint.sh /app/
|
|
|
|
RUN useradd -m -u 1000 krawl && \
|
|
mkdir -p /app/logs /app/data /app/exports && \
|
|
chown -R krawl:krawl /app && \
|
|
chmod +x /app/entrypoint.sh
|
|
|
|
EXPOSE 5000
|
|
|
|
ENV PYTHONUNBUFFERED=1
|
|
|
|
ENTRYPOINT ["/app/entrypoint.sh"]
|
|
CMD ["python3", "src/server.py"]
|