Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Docker hub #406

Merged
merged 59 commits into from
Apr 6, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
59 commits
Select commit Hold shift + click to select a range
e51e768
trying to add hadolint in actions
Mar 31, 2020
d078582
trying to add hadolint in actions
Mar 31, 2020
3833e16
added sudo for root permissions
Mar 31, 2020
0d8f7f6
trying docker pull image for debian version of hadolint
Mar 31, 2020
834b496
udpated to use hadolint action
Mar 31, 2020
dcf6dba
udpated to use hadolint action
Mar 31, 2020
9f0883c
udpated to use hadolint action
Mar 31, 2020
fff7743
corrected Dockerfile for errors DL3006 DL3020 DL3025 from hadolint
Mar 31, 2020
8379fa6
set env HADOLINT_ACTION_COMMENT to false
Mar 31, 2020
3c50d40
specified golang version in Dockerfile
Mar 31, 2020
82d7201
corrected docker tag and push in github action yaml
Mar 31, 2020
709ea87
corrected docker tag and push in github action yaml
Mar 31, 2020
7b2d789
first attempt using docker-bench-security stand alone
Apr 1, 2020
a2494f5
working with error in regards to docker build -no-cache
Apr 1, 2020
aab3b68
working with error in regards to docker build -no-cache
Apr 1, 2020
3cdc64e
adjusting docker build error to use pipe
Apr 1, 2020
2015116
removing docker image scan checking for errors
Apr 1, 2020
8b41d02
Test using anchore api call docker image scan
Apr 1, 2020
f2fd5a9
Test using anchore api call docker image scan
Apr 1, 2020
13b1644
removing custom policy bundle from command
Apr 1, 2020
8a00fc2
adjusitng image scan for local image instead of Dockerhup repo
Apr 1, 2020
18a536c
adding Dockerfile location to pipe for curl anchore api
Apr 1, 2020
91d407b
explicityly stating docker image instead of value
Apr 1, 2020
b696bdf
moving steps to pull from repo instead of inline local image pull
Apr 1, 2020
e00bd0e
explicitly calling out :latest in image tag
Apr 1, 2020
fb52ef7
adding dockerfile and docker image check to action ami-check
Apr 1, 2020
d98d670
adding dockerfile and docker image check to check-reaper
Apr 1, 2020
b3f403d
adding golang version for check-reaper Dockerfile
Apr 1, 2020
f35038f
adding golang version for check-reaper Dockerfile
Apr 1, 2020
6d592cd
adding Dockerfile and Docker image check to action check-reaper
Apr 1, 2020
e8f4eec
removed apk upgrade in Dockerfile check-reaper
Apr 1, 2020
2a93f6c
adding Dockerfile and Docker image check to action deployment-check
Apr 1, 2020
22f49c6
adding Dockerfile and Docker image check to action dns-resolution-check
Apr 1, 2020
3463faa
adding Dockerfile and Docker image check to action http-check
Apr 1, 2020
9f985cc
adding Dockerfile and Docker image check to action kiam-check
Apr 1, 2020
5a5bff7
adding Dockerfile and Docker image check to action pod-restarts-check
Apr 1, 2020
d1a5078
adding Dockerfile and Docker image check to action pod-status-check
Apr 1, 2020
29832f0
adding Dockerfile and Docker image check to action resource-quota-check
Apr 1, 2020
8e037f1
adding Dockerfile and Docker image check to action test-external-check
Apr 1, 2020
c715348
adding user to Dockerfile for least privileges for http-content-checker
Apr 2, 2020
c6b9893
adding user to Dockerfile perm 777 for http-content-checker
Apr 2, 2020
fefd39a
adding user docker to Dockerfile for http-content-checker
Apr 2, 2020
c883335
updating permission of entrypoint in Dockerfile
Apr 2, 2020
c889f69
updating workdir perm before build
Apr 2, 2020
1f5bea7
chmod added to COPY command Dockerfile
Apr 2, 2020
e39ba2d
chmod added to COPY command Dockerfile
Apr 2, 2020
633862b
added user to container to run as non-root for http-content-check action
Apr 3, 2020
f7d526a
added user to container to run as non-root for http-content-check action
Apr 3, 2020
6d41122
updated Dockerfile ami-check to add non-root user
Apr 3, 2020
76bb222
updated Dockerfile check-reaper to add non-root user
Apr 3, 2020
ac99f9e
updated Dockerfile daemonset-check to add non-root user
Apr 3, 2020
2ac82f0
updated Dockerfile deployment-check to add non-root user
Apr 3, 2020
d84d394
updated Dockerfile dns-resolution-check to add non-root user
Apr 3, 2020
f4f2904
updated Dockerfile http-check to add non-root user
Apr 3, 2020
b25f58a
updated Dockerfile kiam-check to add non-root user
Apr 3, 2020
6597f89
updated Dockerfile pod-restarts-check to add non-root user
Apr 3, 2020
58344d6
updated Dockerfile pod-status-check to add non-root user
Apr 3, 2020
ef8ce5c
updated Dockerfile test-external-check to add non-root user
Apr 3, 2020
a63ebee
updated helm values.yaml to new tags
Apr 6, 2020
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-ami-check.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/ami-check
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/ami-check/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-check-reaper.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/check-reaper
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/check-reaper/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-daemonset-check.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/daemonset-check
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/daemonset-check/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-deployment-check.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/deployment-check
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/deployment-check/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-dns-resolution-check.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/dns-resolution-check
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/dns-resolution-check/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-http-check.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/http-check
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/http-check/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-http-content-check.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/http-content-check
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/http-content-check/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-kiam-check.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/kiam-check
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/kiam-check/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-pod-restarts-check.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/pod-restarts-check
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/pod-restarts-check/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-pod-status-check.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/pod-status-check
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/pod-status-check/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-resource-quota-check.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/resource-quota-check
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/resource-quota-check/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
8 changes: 8 additions & 0 deletions .github/workflows/build-latest-test-external-check.yml
Expand Up @@ -14,6 +14,12 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: dockerfile sweep for best practices
uses: burdzwastaken/hadolint-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
HADOLINT_ACTION_DOCKERFILE_FOLDER: cmd/test-external-check
HADOLINT_ACTION_COMMENT: false
- name: build container
run: docker build --file cmd/test-external-check/Dockerfile --tag $IMAGE_NAME .
- name: Log into docker hub
Expand All @@ -22,3 +28,5 @@ jobs:
run: |
docker tag $IMAGE_NAME kuberhealthy/$IMAGE_NAME
docker push kuberhealthy/$IMAGE_NAME
- name: scan docker image for vulnerabilities
run: curl -s https://ci-tools.anchore.io/inline_scan-v0.6.0 | bash -s -- -p -r kuberhealthy/$IMAGE_NAME:latest
2 changes: 1 addition & 1 deletion cmd/ami-check/.test
@@ -1 +1 @@
"Final Test"
"testing"
12 changes: 8 additions & 4 deletions cmd/ami-check/Dockerfile
@@ -1,9 +1,13 @@
FROM golang AS builder
ADD . /build
FROM golang:1.13 AS builder
RUN groupadd -g 999 user && \
useradd -r -u 999 -g user user
COPY --chown=user:user . /build
WORKDIR /build/cmd/ami-check
RUN CGO_ENABLED=0 go build -v

ENV CGO_ENABLED=0
RUN go build -v
FROM scratch
COPY --from=builder /etc/passwd /etc/passwd
USER user
COPY --from=builder /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/
COPY --from=builder /build/cmd/ami-check/ami-check /app/ami-check
ENTRYPOINT ["/app/ami-check"]
4 changes: 2 additions & 2 deletions cmd/ami-check/Makefile
@@ -1,5 +1,5 @@
build:
docker build -t kuberhealthy/ami-check:v1.1.0 -f Dockerfile ../../
docker build -t kuberhealthy/ami-check:v1.2.0 -f Dockerfile ../../

push:
docker push kuberhealthy/ami-check:v1.1.0
docker push kuberhealthy/ami-check:v1.2.0
2 changes: 1 addition & 1 deletion cmd/check-reaper/.test
@@ -1 +1 @@
"Final Test"
"testing 123"
9 changes: 6 additions & 3 deletions cmd/check-reaper/Dockerfile
@@ -1,10 +1,13 @@
FROM golang AS builder
ADD . /build
FROM golang:1.13 AS builder
RUN groupadd -g 999 user && \
useradd -r -u 999 -g user user
COPY --chown=user:user . /build
WORKDIR /build/cmd/check-reaper
ENV CGO_ENABLED=0
RUN go build -v

FROM scratch
COPY --from=builder /etc/passwd /etc/passwd
USER user
COPY --from=builder /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/
COPY --from=builder /build/cmd/check-reaper/check-reaper /app/check-reaper
ENTRYPOINT ["/app/check-reaper"]
4 changes: 2 additions & 2 deletions cmd/check-reaper/Makefile
@@ -1,5 +1,5 @@
build:
docker build -t kuberhealthy/check-reaper:v1.2.1 -f Dockerfile ../../
docker build -t kuberhealthy/check-reaper:v1.3.1 -f Dockerfile ../../

push:
docker push kuberhealthy/check-reaper:v1.2.1
docker push kuberhealthy/check-reaper:v1.3.1
2 changes: 1 addition & 1 deletion cmd/daemonset-check/.test
@@ -1 +1 @@
"Final Test"
"testing 123"
11 changes: 6 additions & 5 deletions cmd/daemonset-check/Dockerfile
@@ -1,12 +1,13 @@
FROM golang:1.13-alpine AS builder
RUN apk upgrade
ADD . /build
FROM golang:1.13 AS builder
RUN groupadd -g 999 user && \
useradd -r -u 999 -g user user
COPY --chown=user:user . /build
WORKDIR /build/cmd/daemonset-check
ENV CGO_ENABLED=0
RUN go test -v
RUN go build -v

FROM scratch
COPY --from=builder /etc/passwd /etc/passwd
USER user
COPY --from=builder /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/
COPY --from=builder /build/cmd/daemonset-check/daemonset-check /app/daemonset-check
ENTRYPOINT ["/app/daemonset-check"]
4 changes: 2 additions & 2 deletions cmd/daemonset-check/Makefile
@@ -1,5 +1,5 @@
build:
docker build -t kuberhealthy/daemonset-check:v2.1.1 -f Dockerfile ../../
docker build -t kuberhealthy/daemonset-check:v2.2.1 -f Dockerfile ../../

push:
docker push kuberhealthy/daemonset-check:v2.1.1
docker push kuberhealthy/daemonset-check:v2.2.1
2 changes: 1 addition & 1 deletion cmd/deployment-check/.test
@@ -1 +1 @@
"Final Test"
"Test"
12 changes: 8 additions & 4 deletions cmd/deployment-check/Dockerfile
@@ -1,9 +1,13 @@
FROM golang AS builder
ADD . /build
FROM golang:1.13 AS builder
RUN groupadd -g 999 user && \
useradd -r -u 999 -g user user
COPY --chown=user:user . /build
WORKDIR /build/cmd/deployment-check
RUN CGO_ENABLED=0 go build -v

ENV CGO_ENABLED=0
RUN go build -v
FROM scratch
COPY --from=builder /etc/passwd /etc/passwd
USER user
COPY --from=builder /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/
COPY --from=builder /build/cmd/deployment-check/deployment-check /app/deployment-check
ENTRYPOINT ["/app/deployment-check"]
4 changes: 2 additions & 2 deletions cmd/deployment-check/Makefile
@@ -1,5 +1,5 @@
build:
docker build -t kuberhealthy/deployment-check:v1.2.4 -f Dockerfile ../../
docker build -t kuberhealthy/deployment-check:v1.3.4 -f Dockerfile ../../

push:
docker push kuberhealthy/deployment-check:v1.2.4
docker push kuberhealthy/deployment-check:v1.3.4
2 changes: 1 addition & 1 deletion cmd/dns-resolution-check/.test
@@ -1 +1 @@
"Final Test"
"Test"
10 changes: 6 additions & 4 deletions cmd/dns-resolution-check/Dockerfile
@@ -1,11 +1,13 @@
FROM golang AS builder
ADD . /build
FROM golang:1.13 AS builder
RUN groupadd -g 999 user && \
useradd -r -u 999 -g user user
COPY --chown=user:user . /build
WORKDIR /build/cmd/dns-resolution-check
ENV CGO_ENABLED=0
RUN go test -v
RUN go build -v

FROM scratch
COPY --from=builder /etc/passwd /etc/passwd
USER user
COPY --from=builder /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/
COPY --from=builder /build/cmd/dns-resolution-check/dns-resolution-check /app/dns-resolution-check
ENTRYPOINT ["/app/dns-resolution-check"]
4 changes: 2 additions & 2 deletions cmd/dns-resolution-check/Makefile
@@ -1,5 +1,5 @@
build:
docker build -t kuberhealthy/dns-resolution-check:v1.1.0 -f Dockerfile ../../
docker build -t kuberhealthy/dns-resolution-check:v1.2.0 -f Dockerfile ../../

push:
docker push kuberhealthy/dns-resolution-check:v1.1.0
docker push kuberhealthy/dns-resolution-check:v1.2.0
2 changes: 1 addition & 1 deletion cmd/http-check/.test
@@ -1 +1 @@
"Final Test"
"Test"
12 changes: 8 additions & 4 deletions cmd/http-check/Dockerfile
@@ -1,9 +1,13 @@
FROM golang AS builder
ADD . /build
FROM golang:1.13 AS builder
RUN groupadd -g 999 user && \
useradd -r -u 999 -g user user
COPY --chown=user:user . /build
WORKDIR /build/cmd/http-check
RUN CGO_ENABLED=0 go build -v

ENV CGO_ENABLED=0
RUN go build -v
FROM scratch
COPY --from=builder /etc/passwd /etc/passwd
USER user
COPY --from=builder /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/
COPY --from=builder /build/cmd/http-check/http-check /app/http-check
ENTRYPOINT ["/app/http-check"]