File tree 6 files changed +45
-26
lines changed
6 files changed +45
-26
lines changed Original file line number Diff line number Diff line change @@ -25,3 +25,5 @@ azure.json
25
25
.DS_Store
26
26
27
27
.idea /
28
+
29
+ _output /
Original file line number Diff line number Diff line change 1
- trigger : none
1
+ trigger :
2
+ branches :
3
+ include :
4
+ - master
2
5
3
6
pr :
4
7
branches :
Original file line number Diff line number Diff line change
1
+ steps :
2
+ - script : |
3
+ export REGISTRY="e2e"
4
+ export IMAGE_VERSION="test"
5
+ make build-image
6
+ wget https://github.com/aquasecurity/trivy/releases/download/v$(TRIVY_VERSION)/trivy_$(TRIVY_VERSION)_Linux-64bit.tar.gz
7
+ tar zxvf trivy_$(TRIVY_VERSION)_Linux-64bit.tar.gz
8
+
9
+ # show all vulnerabilities in the logs
10
+ ./trivy "${REGISTRY}/keyvault:${IMAGE_VERSION}"
11
+
12
+ ./trivy --exit-code 1 --ignore-unfixed --severity MEDIUM,HIGH,CRITICAL "${REGISTRY}/keyvault:${IMAGE_VERSION}" || exit 1
13
+ displayName: "Scan images for vulnerability"
Original file line number Diff line number Diff line change 1
1
jobs :
2
2
- job : unit_tests
3
- timeoutInMinutes : 20
3
+ timeoutInMinutes : 10
4
4
cancelTimeoutInMinutes : 5
5
5
workspace :
6
6
clean : all
23
23
CLIENT_ID: $(AZURE_CLIENT_ID)
24
24
CLIENT_SECRET: $(AZURE_CLIENT_SECRET)
25
25
- script : |
26
- sudo ./kubernetes-kms > /dev/null &
26
+ sudo ./_output/ kubernetes-kms > /dev/null &
27
27
echo Waiting 2 seconds for the server to start
28
28
sleep 2
29
29
make integration-test
30
- displayName: Run intergration tests
30
+ displayName: Run integration tests
31
+ - template : scan-images.yml
Original file line number Diff line number Diff line change 1
- FROM alpine:3.12
2
- WORKDIR /bin
1
+ FROM us.gcr.io/k8s-artifacts-prod/build-image/debian-base-amd64:buster-v1.2.0
2
+ COPY ./_output/kubernetes-kms /bin/
3
+ # upgrading apt &libapt-pkg5.0 due to CVE-2020-27350
4
+ # upgrading libp11-kit0 due to CVE-2020-29362, CVE-2020-29363 and CVE-2020-29361
5
+ RUN apt-mark unhold apt && \
6
+ clean-install ca-certificates apt libapt-pkg5.0 libp11-kit0 wget
3
7
4
- ADD ./kubernetes-kms /bin/k8s-azure-kms
5
-
6
- CMD ["./k8s-azure-kms" ]
8
+ ENTRYPOINT [ "/bin/kubernetes-kms" ]
Original file line number Diff line number Diff line change 1
- binary := kubernetes-kms
2
1
REGISTRY_NAME ?= upstreamk8sci
3
- REGISTRY ?= $(REGISTRY_NAME ) .azurecr.io
4
2
REPO_PREFIX ?= k8s/kms
5
- DOCKER_IMAGE := $(REGISTRY ) /$(REPO_PREFIX ) /keyvault
6
- VERSION ?= v0.0.9
3
+ REGISTRY ?= $(REGISTRY_NAME ) .azurecr.io/$(REPO_PREFIX )
4
+ IMAGE_NAME ?= keyvault
5
+ IMAGE_VERSION ?= v0.0.9
6
+ IMAGE_TAG ?= $(REGISTRY ) /$(IMAGE_NAME ) :$(IMAGE_VERSION )
7
7
CGO_ENABLED_FLAG := 0
8
8
9
+ # docker env var
10
+ DOCKER_BUILDKIT = 1
11
+ export DOCKER_BUILDKIT
12
+
9
13
ifeq ($(OS ) ,Windows_NT)
10
14
GOOS_FLAG = windows
11
15
else
@@ -21,26 +25,20 @@ endif
21
25
.PHONY : build
22
26
build : authors
23
27
@echo " Building..."
24
- $Q GOOS=${ GOOS_FLAG} CGO_ENABLED=${ CGO_ENABLED_FLAG} go build .
28
+ $Q GOOS=$( GOOS_FLAG ) CGO_ENABLED=$( CGO_ENABLED_FLAG ) go build -o _output/kubernetes-kms .
25
29
26
- build-image : authors deps
27
- @echo " Building..."
28
- $Q GOOS=linux CGO_ENABLED=${CGO_ENABLED_FLAG} go build .
30
+ build-image : authors clean build
29
31
@echo " Building docker image..."
30
- $Q docker build -t $(DOCKER_IMAGE ) : $( VERSION ) .
32
+ $Q docker build -t $(IMAGE_TAG ) .
31
33
32
- push : build-image
33
- $Q docker push $(DOCKER_IMAGE ) : $( VERSION )
34
+ push-image : build-image
35
+ $Q docker push $(IMAGE_TAG )
34
36
35
- .PHONY : clean deps unit-test integration-test
37
+ .PHONY : clean unit-test integration-test
36
38
37
39
clean :
38
40
@echo " Clean..."
39
- $Q rm -rf $(binary )
40
-
41
- setup : clean
42
- @echo " Setup..."
43
- go get -u github.com/golang/dep/cmd/dep
41
+ $Q rm -rf _output/
44
42
45
43
authors :
46
44
$Q git log --all --format=' %aN <%cE>' | sort -u | sed -n ' /github/!p' > GITAUTHORS
You can’t perform that action at this time.
0 commit comments