Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add jitsucom-bulker image: bulker, ingest, syncctl #2631

Merged
merged 7 commits into from
May 8, 2024

Conversation

Dentrax
Copy link
Contributor

@Dentrax Dentrax commented May 6, 2024

jitsucom-bulker:

Note

Before: 211MB, 253 packages, 135 CVEs (1 critical, 5 high, 25 medium, 3 low, 65 negligible) - jitsucom/bulker:latest
After: 82.4MB, 149 packages, 0-CVE

jitsucom-ingest:

Note

Before: 150MB, 182 packages, 133 CVEs (1 critical, 5 high, 23 medium, 3 low, 65 negligible) - jitsucom/syncctl:latest
After: 37MB, 7 packages, 0-CVE

jitsucom-sycctl:

Note

Before: 173MB, 187 packages, 133 CVEs (1 critical, 5 high, 23 medium, 3 low, 65 negligible) - jitsucom/bulker:latest
After: 44.4MB, 79 packages, 0-CVE

New Image Pull Request Template

Image Size

  • The Image is smaller in size than its common public counterpart.
  • The Image is larger in size than its common public counterpart (please explain in the notes).

Notes:

Image Vulnerabilities

  • The Grype vulnerability scan returned 0 CVE(s).
  • The Grype vulnerability scan returned > 0 CVE(s) (please explain in the notes).

Notes:

Image Tagging

  • The image is not tagged with version tags.
  • The image is tagged with :latest
  • The image is not tagged with :latest (please explain in the notes).

Notes:

Basic Testing - K8s cluster

  • The container image was successfully loaded into a kind cluster.
  • The container image could not be loaded into a kind cluster (please explain in the notes).

Notes:

Basic Testing - Package/Application

  • The application is accessible to the user/cluster/etc. after start-up.
  • The application is not accessible to the user/cluster/etc. after start-up. (please explain in the notes).

Notes:

Helm

  • A Helm chart has been provided and the container image can be used with the chart. If needed, please add a -compat package to close any gaps with the public helm chart.
  • A Helm chart has been provided and the container image is not working with the chart (please explain in the notes).
  • A Helm chart was not provided.

Notes:

Processor Architectures

  • The image was built and tested for x86_64.
  • The image could not be built for x86_64 (please explain in the notes).
  • The image was built and tested for aarch64.
  • The image could not be built for aarch64. (please explain in the notes).

Notes:

Functional Testing + Documentation

  • Functional tests have been included and the tests are passing. All tests have been documnted in the notes section.

Notes:

Environment Testing + Documentation

  • There has not been a request and/or there is no indication that this image needs tested on a public cloud provider.
  • The container image has been tested successfully on a public cloud provider (AWS, GCP, Azure).
  • The container image has not been tested successfully on a public cloud provider (AWS, GCP, Azure) (please explain in the notes).

Notes:

Version

  • The package version is the latest version of the package. The latest tag points to this version.
  • The package version is the not the latest version of the package (please explain in the notes).

Notes:

Dev Tag Availability

  • There is a dev tag available that includes a shell and apk tools (by depending on 'wolfi-base')
  • There is not a dev tag available that includes a shell and apk tools (by depending on 'wolfi-base') (please explain in the notes).

Notes:

Access Control + Authentication

  • The image runs as nonroot and GID/UID are set to 65532 or upstream default
  • Alternatively the username and GID/UID may be a commonly used one from the ecosystem e.g: postgres
  • The image requires a non-standard username or non-standard GID/UID (please explain in the notes).

ENTRYPOINT

  • applications/servers/utilities set to call main program with no arguments e.g. [redis-server]
  • applications/servers/utilities not set to call main program with no arguments e.g. [redis-server] (please explain in the notes)
  • base images leave empty.
  • base image and not empty (please explain in the notes).
  • dev variants is set to entrypoint script that falls back to system.
  • dev variants is not set to entrypoint script that falls back to system (please explain in the notes).

CMD

  • For server applications give arguments to start in daemon mode (may be empty)
  • For utilities/tooling bring up help e.g. –help
  • For base images with a shell, call it e.g. [/bin/sh]

Environment Variables

  • Environment variables added.
  • Environment variables not added and not required.

SIGTERM

  • The image responds to SIGTERM (e.g., docker kill $(docker run -d --rm cgr.dev/chainguard/nginx))

Logs

  • Error logs write to stderr and normal logs to stdout. Logs DO NOT write to file.

Documentation - README

  • A README file has been provided and it follows the README template.

@Dentrax Dentrax force-pushed the jitsucom-bulker branch 2 times, most recently from 7a554e8 to 452021f Compare May 6, 2024 14:27
@Dentrax Dentrax marked this pull request as ready for review May 6, 2024 14:51
@developer-guy developer-guy marked this pull request as draft May 6, 2024 14:54
@Dentrax Dentrax force-pushed the jitsucom-bulker branch from 452021f to 23a52f9 Compare May 6, 2024 16:37
imjasonh
imjasonh previously approved these changes May 6, 2024
@Dentrax Dentrax force-pushed the jitsucom-bulker branch 3 times, most recently from bde9390 to 7621c1d Compare May 6, 2024 21:45
Dentrax and others added 4 commits May 7, 2024 10:39
Signed-off-by: Furkan Türkal <furkan.turkal@chainguard.dev>
Co-authored-by: Jason Hall <jason@chainguard.dev>
Signed-off-by: Furkan Türkal <furkan.turkal@hotmail.com>
Signed-off-by: Furkan Türkal <furkan.turkal@chainguard.dev>
Signed-off-by: Furkan Türkal <furkan.turkal@chainguard.dev>
@Dentrax Dentrax force-pushed the jitsucom-bulker branch 3 times, most recently from 57ffb5c to 5f1e223 Compare May 7, 2024 09:23
Signed-off-by: Furkan Türkal <furkan.turkal@chainguard.dev>
@Dentrax Dentrax force-pushed the jitsucom-bulker branch from 5f1e223 to 846b5a1 Compare May 7, 2024 09:33
Dentrax added 2 commits May 7, 2024 14:17
Signed-off-by: Furkan Türkal <furkan.turkal@chainguard.dev>
Signed-off-by: Furkan Türkal <furkan.turkal@chainguard.dev>
@Dentrax Dentrax marked this pull request as ready for review May 7, 2024 11:31
@mamccorm mamccorm merged commit e8793ee into chainguard-images:main May 8, 2024
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants