Skip to content

Commit

Permalink
Sync Latest Updates from Team RapidFort by Rapidfort Readme Bot
Browse files Browse the repository at this point in the history
Signed-off-by: RapidFort Sync Bot <[email protected]>
  • Loading branch information
RapidFort Sync Bot committed Sep 24, 2024
1 parent e3a15ab commit c4a0a5a
Show file tree
Hide file tree
Showing 36 changed files with 497 additions and 20 deletions.
47 changes: 47 additions & 0 deletions community_images/ansible-operator/ironbank/image.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
name: ansible-operator-ib
official_name: Ansible-Operator Iron Bank
official_website: https://sdk.operatorframework.io/docs/building-operators/ansible/
source_image_provider: Platform One
source_image_repo: registry1.dso.mil/ironbank/opensource/ansible/ansible-operator
source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/ironbank%2Fopensource%2Fansible%2Fansible-operator
source_image_readme: https://repo1.dso.mil/dsop/opensource/ansible/ansible-operator/-/blob/development/README.md
rf_docker_link: rapidfort/ansible-operator-ib
image_workflow_name: ansible-operator_ironbank
github_location: ansible-operator/ironbank
report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fopensource%2Fansible%2Fansible-operator
usage_instructions: |
## Prerequisites:
- Ensure you have a running Kubernetes cluster
- Ensure you have the necessary CRDs (Custom Resource Definitions) applied in your Kubernetes cluster.
## Running the Ansible Operator with Docker:
The Ansible Operator runs as a container and requires access to a Kubernetes cluster to manage custom resources.
$ docker run -d -v $HOME/.kube:/root/.kube:ro -v /path/to/watches.yml:/opt/ansible/watches.yml:ro rapidfort/ansible-operator-ib
After running the operator, apply the necessary CRDs in your Kubernetes cluster
$ kubectl apply -f /path/to/crd.yml
Once the CRD is applied, create custom resources for the Ansible Operator to manage
$ kubectl apply -f /path/to/cr.yml
what_is_text: |
Ansible-Operator allows you to manage Kubernetes resources by running Ansible playbooks, providing a simplified way to automate Kubernetes operations using Ansible.
disclaimer: |
Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
is_locked: "False"
input_registry:
registry: registry1.dso.mil
account: ironbank
repo_sets:
- opensource/ansible/ansible-operator:
input_base_tag: "v1.35."
output_repo: ansible-operator-ib
runtimes:
- type: docker_compose
script: dc_coverage.sh
compose_file: docker-compose.yml
image_keys:
ansible-operator-ib:
repository: "ANSBILE_OPERATOR_IMAGE_REPOSITORY"
tag: "ANSBILE_OPERATOR_IMAGE_TAG"
2 changes: 1 addition & 1 deletion community_images/argocd/ironbank/image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ input_registry:
account: ironbank
repo_sets:
- opensource/argoproj/argocd:
input_base_tag: "v2.13."
input_base_tag: "v2.12."
output_repo: argocd-ib
runtimes:
- type: k8s
Expand Down
33 changes: 33 additions & 0 deletions community_images/boundary/ironbank/image.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
name: boundary-ib
official_name: Boundary Iron Bank
official_website: https://boundaryproject.io/
source_image_provider: Platform One
source_image_repo: registry1.dso.mil/ironbank/hashicorp/boundary
source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/hashicorp%2Fboundary%2Fboundary
source_image_readme: https://repo1.dso.mil/dsop/hashicorp/boundary/boundary/-/blob/development/README.md
rf_docker_link: rapidfort/boundary-ib
image_workflow_name: boundary_ironbank
github_location: boundary/ironbank
report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fhashicorp%2Fboundary%2Fboundary
usage_instructions: |
$ docker run -d --name boundary -v "$PWD"/config.hcl:/boundary/config.hcl rapidfort/boundary-ib [COMMAND]
what_is_text: |
HashiCorp Boundary is an identity-aware proxy aimed at simplifying and securing least-privileged access to cloud infrastructure
disclaimer: |
Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
input_registry:
registry: registry1.dso.mil
account: ironbank
is_locked: "False"
repo_sets:
- hashicorp/boundary:
input_base_tag: "0.17."
output_repo: boundary-ib
runtimes:
- type: docker_compose
script: dc_coverage.sh
compose_file: docker-compose.yml
image_keys:
boundary-ib:
repository: "BOUNDARY_IMAGE_REPOSITORY"
tag: "BOUNDARY_IMAGE_TAG"
40 changes: 40 additions & 0 deletions community_images/camel-k/ironbank/image.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
name: camel-k-ib
official_name: Apache Camel-K IronBank
official_website: https://camel.apache.org/camel-k/2.4.x/
source_image_provider: Platform One
source_image_repo: registry1.dso.mil/ironbank/opensource/apache/camel-k
source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/opensource%2Fapache%2Fcamel-k
source_image_readme: https://repo1.dso.mil/dsop/opensource/apache/camel-k/-/blob/development/README.md
rf_docker_link: rapidfort/camel-k-ib
image_workflow_name: camel-k_ironbank
github_location: camel-k/ironbank
report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fopensource%2Fcamel-k%2Fcamel-k2
usage_instructions: |
# Using docker run:
$ docker run -d -it --name my-camel-k-app rapidfort/camel-k-ib
what_is_text: |
Apache Camel K is a lightweight integration framework built from Apache Camel that runs natively on Kubernetes and is specifically designed for serverless and microservice architectures.
disclaimer: |
Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
is_locked: "False"
input_registry:
registry: registry1.dso.mil
account: ironbank
repo_sets:
- opensource/apache/camel-k:
input_base_tag: "2.4."
output_repo: camel-k-ib
runtimes:
- type: k8s
script: k8s_coverage.sh
readiness_check_script: camel_k_readiness_check.sh
helm:
repo: camel-k
repo_url: https://apache.github.io/camel-k/charts/
chart: camel-k
image_keys:
camel-k-ib:
image: "operator.image"
override_file: "overrides.yml"
helm_additional_params:
platform.build.registry.address: "docker.io"
33 changes: 33 additions & 0 deletions community_images/clickhouse/ironbank/image.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
name: clickhouse-ib
official_name: clickhouse Iron Bank
official_website: https://clickhouse.com
source_image_provider: Platform One
source_image_repo: registry1.dso.mil/ironbank/opensource/clickhouse
source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/opensource%2Fclickhouse
source_image_readme: https://repo1.dso.mil/dsop/opensource/clickhouse/clickhouse/-/blob/development/README.md
rf_docker_link: rapidfort/clickhouse-ib
image_workflow_name: clickhouse_ironbank
github_location: clickhouse/ironbank
report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fopensource%2Fclickhouse
usage_instructions: |
#Run the clickhouse container:
$ docker run -d --name clickhouse-server rapidfort/clickhouse-ib
what_is_text: |
ClickHouse is an open-source column-oriented database management system that allows generating analytical data reports in real-time.
disclaimer: |
Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
input_registry:
registry: registry1.dso.mil
account: ironbank
repo_sets:
- opensource/clickhouse:
input_base_tag: "22.3."
output_repo: clickhouse-ib
runtimes:
- type: docker_compose
script: dc_coverage.sh
compose_file: docker-compose.yml
image_keys:
clickhouse-ib:
repository: "CLICKHOUSE_IMAGE_REPOSITORY"
tag: "CLICKHOUSE_IMAGE_TAG"
48 changes: 48 additions & 0 deletions community_images/cockroachdb/ironbank/image.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
name: cockroachdb-ib
official_name: CockroachDB Ironbank
official_website: https://www.cockroachlabs.com
source_image_provider: Platform One
source_image_repo: registry1.dso.mil/ironbank/opensource/cockroachdb/cockroachdb
source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/opensource%2Fcockroachdb%2Fcockroachdb
source_image_readme: https://repo1.dso.mil/dsop/opensource/cockroachdb/cockroachdb/-/blob/development/README.md
rf_docker_link: rapidfort/cockroachdb-ib
image_workflow_name: cockroachdb_ironbank
github_location: cockroachdb/ironbank
report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fopensource%2Fcockroachdb%2Fcockroachdb
usage_instructions: |
# Add helm repo
$ helm repo add cockroachdb https://charts.cockroachdb.com/
$ helm repo update
# Install helm chart
$ helm install cockroachdb cockroachdb/cockroachdb --set image.repository=rapidfort/cockroachdb-ib
what_is_text: |
CockroachDB is a distributed SQL database built on a transactional and strongly-consistent key-value store. It scales horizontally; survives disk, machine, rack, and even datacenter failures with minimal latency disruption and no manual intervention; supports strongly-consistent ACID transactions; and provides a familiar SQL API for structuring, manipulating, and querying data.
disclaimer: |
Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
is_locked: "False"
input_registry:
registry: registry1.dso.mil
account: ironbank
repo_sets:
- opensource/cockroachdb/cockroachdb:
input_base_tag: "v24.1."
output_repo: cockroachdb-ib
runtimes:
- type: k8s
script: k8s_coverage.sh
helm:
repo: cockroachdb
repo_url: https://charts.cockroachdb.com/
chart: cockroachdb
override_dir: cockroachdb
image_keys:
cockroachdb-ib:
repository: "image.repository"
tag: "image.tag"
override_file: "overrides.yml"
readiness_wait_pod_name_suffix:
- "0"
- "1"
- "2"

Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
6 changes: 3 additions & 3 deletions community_images/elasticsearch-dump/ironbank/image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,13 +21,13 @@ input_registry:
account: ironbank
repo_sets:
- opensource/elasticdump/elasticsearch-dump:
input_base_tag: "6.112."
input_base_tag: "6.113."
output_repo: elasticsearch-dump-ib
runtimes:
- type: docker_compose
script: dc_coverage.sh
compose_file: docker-compose.yml
image_keys:
elasticsearch-dump-ib:
repository: "ELASTICSEARCH-DUMP_IMAGE_REPOSITORY"
tag: "ELASTICSEARCH-DUMP_IMAGE_TAG"
repository: "ELASTICSEARCH_DUMP_IMAGE_REPOSITORY"
tag: "ELASTICSEARCH_DUMP_IMAGE_TAG"
2 changes: 1 addition & 1 deletion community_images/elasticsearch-exporter/ironbank/image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ input_registry:
account: ironbank
repo_sets:
- opensource/bitnami/elasticsearch-exporter:
input_base_tag: "1.7."
input_base_tag: "1.8."
output_repo: elasticsearch-exporter-ib
runtimes:
- type: docker_compose
Expand Down
2 changes: 1 addition & 1 deletion community_images/elasticsearch/official/image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ runtimes:
- type: docker_compose
script: dc_coverage.sh
compose_file: docker-compose.yml
wait_time_sec: 120
wait_time_sec: 30
image_keys:
elasticsearch-official:
repository: "ELASTICSEARCH_IMAGE_REPOSITORY"
Expand Down
8 changes: 4 additions & 4 deletions community_images/envoy/bitnami/image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,13 +26,13 @@ repo_sets:
- envoy:
input_base_tag: "1.27.7-debian-12-r"
- envoy:
input_base_tag: "1.28.5-debian-12-r"
input_base_tag: "1.28.7-debian-12-r"
- envoy:
input_base_tag: "1.29.7-debian-12-r"
input_base_tag: "1.29.9-debian-12-r"
- envoy:
input_base_tag: "1.30.4-debian-12-r"
input_base_tag: "1.30.6-debian-12-r"
- envoy:
input_base_tag: "1.31.0-debian-12-r"
input_base_tag: "1.31.2-debian-12-r"
runtimes:
- type: docker_compose
script: dc_coverage.sh
Expand Down
2 changes: 1 addition & 1 deletion community_images/fluent-bit/bitnami/image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ repo_sets:
- fluent-bit:
input_base_tag: "2.2.3-debian-12-r"
- fluent-bit:
input_base_tag: "3.1.7-debian-12-r"
input_base_tag: "3.1.8-debian-12-r"
runtimes:
- type: docker_compose
script: dc_coverage.sh
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
2 changes: 1 addition & 1 deletion community_images/ghost/bitnami/image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ input_registry:
account: bitnami
repo_sets:
- ghost:
input_base_tag: "5.94.0-debian-12-r"
input_base_tag: "5.94.1-debian-12-r"
runtimes:
- type: k8s
script: k8s_coverage.sh
Expand Down
1 change: 1 addition & 0 deletions community_images/gitaly/ironbank/image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,7 @@ runtimes:
- type: k8s
script: k8s_coverage.sh
readiness_check_script: gitaly_readiness_check.sh
readiness_check_timeout: 1200
helm:
repo: gitlab
repo_url: http://charts.gitlab.io/
Expand Down
1 change: 1 addition & 0 deletions community_images/gitlab-exporter/ironbank/image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,7 @@ runtimes:
- type: k8s
script: k8s_coverage.sh
readiness_check_script: health_check.sh
readiness_check_timeout: 1200
helm:
repo: gitlab
repo_url: https://charts.gitlab.io
Expand Down
2 changes: 1 addition & 1 deletion community_images/gitlab-shell/ironbank/image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ runtimes:
repo_url: https://charts.gitlab.io
chart: gitlab
readiness_check_script: shell_setup.sh
readiness_check_timeout: 600
readiness_check_timeout: 1200
wait_time_sec: 40
helm_additional_params:
certmanager-issuer.email: [email protected]
Expand Down
53 changes: 53 additions & 0 deletions community_images/haproxy-latest/ironbank/image.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,53 @@
name: haproxy-latest-ib
official_name: HAProxy-latest IronBank
official_website: http://www.haproxy.org/
source_image_provider: Platform One
source_image_repo: registry1.dso.mil/ironbank/opensource/haproxy/haproxy-latest
source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/opensource%2Fhaproxy%2Fhaproxy-latest
source_image_readme: https://repo1.dso.mil/dsop/opensource/haproxy/haproxy-latest/-/blob/development/README.md
rf_docker_link: rapidfort/haproxy-latest-ib
image_workflow_name: haproxy-latest_ironbank
github_location: haproxy-latest/ironbank
report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fopensource%2Fhaproxy%2Fhaproxy-latest
usage_instructions: |
# Using docker run via bind mount:
$ docker run -d --name my-haproxy -v /path/to/etc/haproxy:/usr/local/etc/haproxy:ro --sysctl net.ipv4.ip_unprivileged_port_start=0 rapidfort/haproxy24-ib
what_is_text: |
HAProxy is a free, open source high availability solution, providing load balancing and proxying for TCP and HTTP-based applications by spreading requests across multiple servers. It is written in C and has a reputation for being fast and efficient (in terms of processor and memory usage).
wikipedia.org/wiki/HAProxy
disclaimer: |
Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
is_locked: "False"
needs_common_commands: False
input_registry:
registry: registry1.dso.mil
account: ironbank
repo_sets:
- opensource/haproxy/haproxy-latest:
input_base_tag: "3.0."
output_repo: haproxy-latest-ib
runtimes:
- type: docker_compose
script: dc_coverage.sh
compose_file: docker-compose.yml
wait_time_sec: 120
# certs are committed in the repo itself for haproxy-latest
# haproxy.pem is created by `cat server.crt server.key > haproxy.pem`
# tls_certs:
# generate: true
# out_dir: certs
image_keys:
haproxy-latest-ib:
repository: "HAPROXY_IMAGE_REPOSITORY"
tag: "HAPROXY_IMAGE_TAG"
- type: docker_compose
script: dc_coverage_tcp.sh
compose_file: docker-compose-tcp.yml
wait_time_sec: 120
# tls_certs:
# generate: true
# out_dir: certs
image_keys:
haproxy-latest-ib:
repository: "HAPROXY_IMAGE_REPOSITORY"
tag: "HAPROXY_IMAGE_TAG"
4 changes: 2 additions & 2 deletions community_images/haproxy/bitnami/image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -24,9 +24,9 @@ input_registry:
account: bitnami
repo_sets:
- haproxy:
input_base_tag: "2.9.10-debian-12-r"
input_base_tag: "2.9.11-debian-12-r"
- haproxy:
input_base_tag: "3.0.4-debian-12-r"
input_base_tag: "3.0.5-debian-12-r"
runtimes:
- type: k8s
script: k8s_coverage.sh
Expand Down
Loading

0 comments on commit c4a0a5a

Please sign in to comment.