Thanks for your interest in the Conjur base image. We welcome contributions!
For general contribution and community guidelines, please see the community repo.
Before getting started, you should install some developer tools.
-
Search our open issues in GitHub to see what features are planned.
-
Select an existing issue or open a new issue to propose changes or fixes.
-
Add the
implementinglabel to the issue that you open or modify. -
Run existing tests locally and ensure they pass.
-
Create a branch and add your changes. Include appropriate tests and ensure that they pass.
-
Ensure the changelog contains all relevant recent changes with references to GitHub issues or PRs, if possible.
-
Submit a pull request, linking the issue in the description (e.g. Connected to #123).
-
Add the
implementedlabel to the issue and request that a Cyberark engineer reviews and merges your code.
From here your pull request is reviewed. Once you have implemented all reviewer feedback, your code is merged into the project. Congratulations, you're a contributor!
It's easy to get started with Conjur base image
-
Clone this repository
To build Ubuntu base image:
$ cd dev
$ ./ubuntu-ruby-fips.shTo build Phusion base image:
$ cd dev
$ ./phusion-ruby-fips.shTests are defined in test.yaml using GoogleContainerTools/container-structure-test.
To run tests, build image and execute
docker run --rm \
-v /var/run/docker.sock:/var/run/docker.sock \
-v $(pwd):/workspace \
gcr.io/gcp-runtimes/container-structure-test:latest \
test --image "image:tag" --config "/workspace/test.yml" --test-report "/workspace/test-results/report.json"To run vulnerability scanning using trivy execute
docker run --rm \
-v /var/run/docker.sock:/var/run/docker.sock \
-v ${pwd}:/workspace \
aquasec/trivy:latest \
--no-progress --ignorefile /workspace/.trivyignore --ignore-unfixed "image:tag"Every night Jenkins job is triggered, and both images ubuntu-ruby-fips:20.04-latest and phusion-ruby-fips:0.11-latest updated and been delivered to Docker Hub.