conjur-debify 3.0.3.pre.145 → 3.0.3.pre.248

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 749d66a8a64cbc22abc88af81e4f1851ee888d178c875d8c384da86e9c84a472
4
- data.tar.gz: 7d0713e5b38339ce6ac39d4c6714593d00ace8f6515e8c8d3f5b0914a2a14d48
3
+ metadata.gz: dee5ebc68d4c02c548b5f419b373ade1fbfcaf0270333df348ba8ca3df15b1ea
4
+ data.tar.gz: cf726fa0b7bc1d818f8fac867fbdbdf0f23820f8c812065f283ab84a4f5ca9fe
5
5
  SHA512:
6
- metadata.gz: '07198fe9a64df0947c30bf59ec95af4c63ca81abbfc7dff9d46188b480f21e373bbcccdd84ff3be97b0c37d41db7dd4f05f34ed82376de62f28206c23423c2b0'
7
- data.tar.gz: 2ac3dc9e0bbda1d32a046fcd376f5b8aabf24df4b1a09695a3300e935e3d4ed8ab301e0cf6ae8a1af12c8de84554375b9971d92deec45011fc1e67f357e41314
6
+ metadata.gz: c942a9241ea475dc79bc7d89e3b66f0ab9d8d7f21a4d610b142869852328dadfe6bf008ff11666ca9a2d9a38961c1de77a1ed0326523ad06e08569d96b93ae65
7
+ data.tar.gz: 589b532b54bd9a5639d85f88da084e39e24affd765b6dfe9fe02907364c836d4f4a90cf1f513b5fdb048680af83ddac212e40ad2ac819039bfd40d866a0c7801
data/Dockerfile CHANGED
@@ -2,7 +2,7 @@ FROM ruby:3.2
2
2
 
3
3
  RUN apt-get update -qq && \
4
4
  apt-get upgrade -qqy && \
5
- apt-get install -qqy \
5
+ apt-get install --no-install-recommends -qqy \
6
6
  apt-transport-https \
7
7
  ca-certificates \
8
8
  curl && \
@@ -10,7 +10,7 @@ RUN apt-get update -qq && \
10
10
  rm -rf /var/lib/apt/lists/*
11
11
 
12
12
  # Install Docker client tools
13
- ENV DOCKERVERSION=27.0.3
13
+ ENV DOCKERVERSION=27.2.1
14
14
  RUN curl -fsSLO https://download.docker.com/linux/static/stable/x86_64/docker-${DOCKERVERSION}.tgz \
15
15
  && tar xzvf docker-${DOCKERVERSION}.tgz --strip 1 \
16
16
  -C /usr/local/bin docker/docker \
data/Jenkinsfile CHANGED
@@ -1,5 +1,10 @@
1
1
  #!/usr/bin/env groovy
2
2
 
3
+ @Library("product-pipelines-shared-library") _
4
+
5
+ def productName = 'Debify'
6
+ def productTypeName = 'Conjur Internal'
7
+
3
8
  // Automated release, promotion and dependencies
4
9
  properties([
5
10
  // Include the automated release parameters for the build
@@ -16,6 +21,33 @@ if (params.MODE == "PROMOTE") {
16
21
  // Any publishing of targetVersion artifacts occur here
17
22
  // Anything added to assetDirectory will be attached to the Github Release
18
23
 
24
+ env.INFRAPOOL_PRODUCT_NAME = "${productName}"
25
+ env.INFRAPOOL_DD_PRODUCT_TYPE_NAME = "${productTypeName}"
26
+
27
+ def scans = [:]
28
+
29
+ scans["AMD64"] = {
30
+ stage("Scan Docker image (AMD64 based)") {
31
+ runSecurityScans(infrapool,
32
+ image: "registry.tld/conjurinc/debify:${sourceVersion}-amd64",
33
+ buildMode: params.MODE,
34
+ branch: env.BRANCH_NAME,
35
+ architecure: 'linux/amd64')
36
+ }
37
+ }
38
+
39
+ scans["ARM64"] = {
40
+ stage("Scan Docker image (ARM64 based)") {
41
+ runSecurityScans(infrapool,
42
+ image: "registry.tld/conjurinc/debify:${sourceVersion}-arm64",
43
+ buildMode: params.MODE,
44
+ branch: env.BRANCH_NAME,
45
+ architecure: 'linux/arm64')
46
+ }
47
+ }
48
+
49
+ parallel(scans)
50
+
19
51
  //Note: assetDirectory is on the infrapool agent, not the local Jenkins agent.
20
52
  infrapool.agentSh './publish-rubygem.sh'
21
53
  }
@@ -38,6 +70,10 @@ pipeline {
38
70
  environment {
39
71
  // Sets the MODE to the specified or autocalculated value as appropriate
40
72
  MODE = release.canonicalizeMode()
73
+
74
+ // Values to direct scan results to the right place in DefectDojo
75
+ INFRAPOOL_PRODUCT_NAME = "${productName}"
76
+ INFRAPOOL_DD_PRODUCT_TYPE_NAME = "${productTypeName}"
41
77
  }
42
78
 
43
79
  stages {
@@ -103,82 +139,77 @@ pipeline {
103
139
  }
104
140
  }
105
141
  }
106
- stage('Scan Docker image') {
142
+ stage('Push Docker image') {
107
143
  parallel {
108
- stage('Scan Docker image for fixable issues (AMD64 based)') {
109
- steps{
110
- script {
111
- VERSION = INFRAPOOL_EXECUTORV2_AGENT_0.agentSh(returnStdout: true, script: 'cat VERSION')
112
- }
113
- scanAndReport(INFRAPOOL_EXECUTORV2_AGENT_0, "debify:${VERSION}", "HIGH", false)
114
- }
115
- }
116
- stage('Scan Docker image for all issues (AMD64 based)') {
117
- steps{
118
- script {
119
- VERSION = INFRAPOOL_EXECUTORV2_AGENT_0.agentSh(returnStdout: true, script: 'cat VERSION')
120
- }
121
- scanAndReport(INFRAPOOL_EXECUTORV2_AGENT_0, "debify:${VERSION}", "NONE", true)
122
- }
123
- }
124
- stage('Scan Docker image for fixable issues (ARM64 based)') {
125
- steps{
144
+ stage('Push AMD64 image') {
145
+ steps {
126
146
  script {
127
- VERSION = INFRAPOOL_EXECUTORV2ARM_AGENT_0.agentSh(returnStdout: true, script: 'cat VERSION')
147
+ INFRAPOOL_EXECUTORV2_AGENT_0.agentSh './push-image.sh amd64'
128
148
  }
129
- scanAndReport(INFRAPOOL_EXECUTORV2ARM_AGENT_0, "debify:${VERSION}", "HIGH", false)
130
149
  }
131
150
  }
132
- stage('Scan Docker image for all issues (ARM64 based)') {
133
- steps{
151
+
152
+ stage('Push ARM64 image') {
153
+ steps {
134
154
  script {
135
- VERSION = INFRAPOOL_EXECUTORV2ARM_AGENT_0.agentSh(returnStdout: true, script: 'cat VERSION')
155
+ INFRAPOOL_EXECUTORV2ARM_AGENT_0.agentSh './push-image.sh arm64'
136
156
  }
137
- scanAndReport(INFRAPOOL_EXECUTORV2ARM_AGENT_0, "debify:${VERSION}", "NONE", true)
138
157
  }
139
158
  }
140
159
  }
141
160
  }
142
161
 
143
- stage('Run feature tests') {
162
+ stage('Push Docker manifest with multi-arch') {
144
163
  steps {
145
164
  script {
146
- INFRAPOOL_EXECUTORV2_AGENT_0.agentSh './test.sh'
147
- INFRAPOOL_EXECUTORV2_AGENT_0.agentStash name: 'test-results', includes: 'features/reports/*.xml'
165
+ INFRAPOOL_EXECUTORV2_AGENT_0.agentSh './push-manifest.sh'
148
166
  }
149
167
  }
150
- post { always {
151
- unstash 'test-results'
152
- junit 'features/reports/*.xml'
153
- }}
154
168
  }
155
-
156
- stage('Push Docker image') {
169
+ stage('Scan Docker image') {
157
170
  parallel {
158
- stage('Push AMD64 image') {
159
- steps {
171
+ stage('Scan Docker image (AMD64 based)') {
172
+ steps{
160
173
  script {
161
- INFRAPOOL_EXECUTORV2_AGENT_0.agentSh './push-image.sh amd64'
174
+ // Take the first value of the image-tags output
175
+ VERSION = INFRAPOOL_EXECUTORV2_AGENT_0.agentSh(returnStdout: true, script: './image-tags | cut -d" " -f1')
162
176
  }
177
+ runSecurityScans(INFRAPOOL_EXECUTORV2_AGENT_0,
178
+ image: "registry.tld/conjurinc/debify:${VERSION}",
179
+ buildMode: MODE,
180
+ branch: env.BRANCH_NAME,
181
+ arch: "linux/amd64"
182
+ )
163
183
  }
164
184
  }
165
-
166
- stage('Push ARM64 image') {
167
- steps {
185
+ stage('Scan Docker image (ARM64 based)') {
186
+ steps{
168
187
  script {
169
- INFRAPOOL_EXECUTORV2ARM_AGENT_0.agentSh './push-image.sh arm64'
188
+ // Take the first value of the image-tags output
189
+ VERSION = INFRAPOOL_EXECUTORV2ARM_AGENT_0.agentSh(returnStdout: true, script: './image-tags | cut -d" " -f1')
170
190
  }
191
+ runSecurityScans(INFRAPOOL_EXECUTORV2ARM_AGENT_0,
192
+ image: "registry.tld/conjurinc/debify:${VERSION}",
193
+ buildMode: MODE,
194
+ branch: env.BRANCH_NAME,
195
+ arch: "linux/arm64"
196
+ )
171
197
  }
172
198
  }
173
199
  }
174
200
  }
175
201
 
176
- stage('Push Docker manifest with multi-arch') {
202
+ stage('Run feature tests') {
177
203
  steps {
178
204
  script {
179
- INFRAPOOL_EXECUTORV2_AGENT_0.agentSh './push-manifest.sh'
205
+ INFRAPOOL_EXECUTORV2_AGENT_0.agentSh './test.sh'
206
+ INFRAPOOL_EXECUTORV2_AGENT_0.agentStash name: 'test-results', includes: 'features/reports/*.xml'
180
207
  }
181
208
  }
209
+ post { always {
210
+ unstash 'test-results'
211
+ junit 'features/reports/*.xml'
212
+ }}
182
213
  }
183
214
 
184
215
  stage('Release') {
@@ -216,4 +247,4 @@ pipeline {
216
247
  releaseInfraPoolAgent()
217
248
  }
218
249
  }
219
- }
250
+ }
data/VERSION CHANGED
@@ -1 +1 @@
1
- 3.0.3-145
1
+ 3.0.3-248
data/distrib/secrets.yml CHANGED
@@ -1,2 +1,4 @@
1
+ # This are used by summon, these are not hardcoded credentials
2
+ #kics-scan disable=487f4be7-3fd9-4506-a07a-eae252180c08
1
3
  ARTIFACTORY_USER: !var ci/artifactory/users/jenkins/username
2
4
  ARTIFACTORY_PASSWORD: !var ci/artifactory/users/jenkins/password
data/kics.config ADDED
@@ -0,0 +1,10 @@
1
+ exclude-queries:
2
+ - b03a748a-542d-44f4-bb86-9199ab4fd2d5 # Healthcheck Instruction Missing - it is just a tool, not a container that needs to be healthy
3
+ - 698ed579-b239-4f8f-a388-baa4bcb13ef8 # Healthcheck Not Set - it is just a tool, not a container that needs to be healthy
4
+ - fd54f200-402c-4333-a5a4-36ef6709af2f # Missing User Instruction
5
+ - f45ea400-6bbe-4501-9fc7-1c3d75c32067 # Image Version Using 'latest'
6
+ - 965a08d7-ef86-4f14-8792-4a3b2098937e # Apt Get Install Pin Version Not Defined
7
+ # The following files are used in CI or present as an example only.
8
+ exclude-paths:
9
+ - "debify/example/docker-compose.yml"
10
+ - "debify/lib/conjur/publish/Dockerfile" # Only used for publishing the image in pipeline
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: conjur-debify
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.0.3.pre.145
4
+ version: 3.0.3.pre.248
5
5
  platform: ruby
6
6
  authors:
7
7
  - CyberArk Software, Inc.
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-07-17 00:00:00.000000000 Z
11
+ date: 2024-12-06 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gli
@@ -212,6 +212,7 @@ files:
212
212
  - features/support/world.rb
213
213
  - features/test.feature
214
214
  - image-tags
215
+ - kics.config
215
216
  - lib/conjur/debify.rb
216
217
  - lib/conjur/debify/Dockerfile.fpm
217
218
  - lib/conjur/debify/action/publish.rb
@@ -251,7 +252,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
251
252
  - !ruby/object:Gem::Version
252
253
  version: 1.3.1
253
254
  requirements: []
254
- rubygems_version: 3.4.10
255
+ rubygems_version: 3.4.19
255
256
  signing_key:
256
257
  specification_version: 4
257
258
  summary: Utility commands to build and package Conjur services as Debian packages