diff --git a/community_images/ansible-operator/ironbank/image.yml b/community_images/ansible-operator/ironbank/image.yml new file mode 100644 index 0000000000..710973c878 --- /dev/null +++ b/community_images/ansible-operator/ironbank/image.yml @@ -0,0 +1,47 @@ +name: ansible-operator-ib +official_name: Ansible-Operator Iron Bank +official_website: https://sdk.operatorframework.io/docs/building-operators/ansible/ +source_image_provider: Platform One +source_image_repo: registry1.dso.mil/ironbank/opensource/ansible/ansible-operator +source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/ironbank%2Fopensource%2Fansible%2Fansible-operator +source_image_readme: https://repo1.dso.mil/dsop/opensource/ansible/ansible-operator/-/blob/development/README.md +rf_docker_link: rapidfort/ansible-operator-ib +image_workflow_name: ansible-operator_ironbank +github_location: ansible-operator/ironbank +report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fopensource%2Fansible%2Fansible-operator +usage_instructions: | + ## Prerequisites: + - Ensure you have a running Kubernetes cluster + - Ensure you have the necessary CRDs (Custom Resource Definitions) applied in your Kubernetes cluster. + + ## Running the Ansible Operator with Docker: + + The Ansible Operator runs as a container and requires access to a Kubernetes cluster to manage custom resources. + $ docker run -d -v $HOME/.kube:/root/.kube:ro -v /path/to/watches.yml:/opt/ansible/watches.yml:ro rapidfort/ansible-operator-ib + + After running the operator, apply the necessary CRDs in your Kubernetes cluster + $ kubectl apply -f /path/to/crd.yml + + Once the CRD is applied, create custom resources for the Ansible Operator to manage + $ kubectl apply -f /path/to/cr.yml + +what_is_text: | + Ansible-Operator allows you to manage Kubernetes resources by running Ansible playbooks, providing a simplified way to automate Kubernetes operations using Ansible. +disclaimer: | + Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement. +is_locked: "False" +input_registry: + registry: registry1.dso.mil + account: ironbank +repo_sets: + - opensource/ansible/ansible-operator: + input_base_tag: "v1.35." + output_repo: ansible-operator-ib +runtimes: + - type: docker_compose + script: dc_coverage.sh + compose_file: docker-compose.yml + image_keys: + ansible-operator-ib: + repository: "ANSBILE_OPERATOR_IMAGE_REPOSITORY" + tag: "ANSBILE_OPERATOR_IMAGE_TAG" diff --git a/community_images/argocd/ironbank/image.yml b/community_images/argocd/ironbank/image.yml index 55f24e7288..820a679d73 100755 --- a/community_images/argocd/ironbank/image.yml +++ b/community_images/argocd/ironbank/image.yml @@ -22,7 +22,7 @@ input_registry: account: ironbank repo_sets: - opensource/argoproj/argocd: - input_base_tag: "v2.13." + input_base_tag: "v2.12." output_repo: argocd-ib runtimes: - type: k8s diff --git a/community_images/boundary/ironbank/image.yml b/community_images/boundary/ironbank/image.yml new file mode 100644 index 0000000000..20b0bfcf05 --- /dev/null +++ b/community_images/boundary/ironbank/image.yml @@ -0,0 +1,33 @@ +name: boundary-ib +official_name: Boundary Iron Bank +official_website: https://boundaryproject.io/ +source_image_provider: Platform One +source_image_repo: registry1.dso.mil/ironbank/hashicorp/boundary +source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/hashicorp%2Fboundary%2Fboundary +source_image_readme: https://repo1.dso.mil/dsop/hashicorp/boundary/boundary/-/blob/development/README.md +rf_docker_link: rapidfort/boundary-ib +image_workflow_name: boundary_ironbank +github_location: boundary/ironbank +report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fhashicorp%2Fboundary%2Fboundary +usage_instructions: | + $ docker run -d --name boundary -v "$PWD"/config.hcl:/boundary/config.hcl rapidfort/boundary-ib [COMMAND] +what_is_text: | + HashiCorp Boundary is an identity-aware proxy aimed at simplifying and securing least-privileged access to cloud infrastructure +disclaimer: | + Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement. +input_registry: + registry: registry1.dso.mil + account: ironbank +is_locked: "False" +repo_sets: + - hashicorp/boundary: + input_base_tag: "0.17." + output_repo: boundary-ib +runtimes: + - type: docker_compose + script: dc_coverage.sh + compose_file: docker-compose.yml + image_keys: + boundary-ib: + repository: "BOUNDARY_IMAGE_REPOSITORY" + tag: "BOUNDARY_IMAGE_TAG" diff --git a/community_images/camel-k/ironbank/image.yml b/community_images/camel-k/ironbank/image.yml new file mode 100644 index 0000000000..62584f4003 --- /dev/null +++ b/community_images/camel-k/ironbank/image.yml @@ -0,0 +1,40 @@ +name: camel-k-ib +official_name: Apache Camel-K IronBank +official_website: https://camel.apache.org/camel-k/2.4.x/ +source_image_provider: Platform One +source_image_repo: registry1.dso.mil/ironbank/opensource/apache/camel-k +source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/opensource%2Fapache%2Fcamel-k +source_image_readme: https://repo1.dso.mil/dsop/opensource/apache/camel-k/-/blob/development/README.md +rf_docker_link: rapidfort/camel-k-ib +image_workflow_name: camel-k_ironbank +github_location: camel-k/ironbank +report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fopensource%2Fcamel-k%2Fcamel-k2 +usage_instructions: | + # Using docker run: + $ docker run -d -it --name my-camel-k-app rapidfort/camel-k-ib +what_is_text: | + Apache Camel K is a lightweight integration framework built from Apache Camel that runs natively on Kubernetes and is specifically designed for serverless and microservice architectures. +disclaimer: | + Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement. +is_locked: "False" +input_registry: + registry: registry1.dso.mil + account: ironbank +repo_sets: + - opensource/apache/camel-k: + input_base_tag: "2.4." + output_repo: camel-k-ib +runtimes: + - type: k8s + script: k8s_coverage.sh + readiness_check_script: camel_k_readiness_check.sh + helm: + repo: camel-k + repo_url: https://apache.github.io/camel-k/charts/ + chart: camel-k + image_keys: + camel-k-ib: + image: "operator.image" + override_file: "overrides.yml" + helm_additional_params: + platform.build.registry.address: "docker.io" diff --git a/community_images/clickhouse/ironbank/image.yml b/community_images/clickhouse/ironbank/image.yml new file mode 100755 index 0000000000..30a1df9e6b --- /dev/null +++ b/community_images/clickhouse/ironbank/image.yml @@ -0,0 +1,33 @@ +name: clickhouse-ib +official_name: clickhouse Iron Bank +official_website: https://clickhouse.com +source_image_provider: Platform One +source_image_repo: registry1.dso.mil/ironbank/opensource/clickhouse +source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/opensource%2Fclickhouse +source_image_readme: https://repo1.dso.mil/dsop/opensource/clickhouse/clickhouse/-/blob/development/README.md +rf_docker_link: rapidfort/clickhouse-ib +image_workflow_name: clickhouse_ironbank +github_location: clickhouse/ironbank +report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fopensource%2Fclickhouse +usage_instructions: | + #Run the clickhouse container: + $ docker run -d --name clickhouse-server rapidfort/clickhouse-ib +what_is_text: | + ClickHouse is an open-source column-oriented database management system that allows generating analytical data reports in real-time. +disclaimer: | + Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement. +input_registry: + registry: registry1.dso.mil + account: ironbank +repo_sets: + - opensource/clickhouse: + input_base_tag: "22.3." + output_repo: clickhouse-ib +runtimes: + - type: docker_compose + script: dc_coverage.sh + compose_file: docker-compose.yml + image_keys: + clickhouse-ib: + repository: "CLICKHOUSE_IMAGE_REPOSITORY" + tag: "CLICKHOUSE_IMAGE_TAG" diff --git a/community_images/cockroachdb/ironbank/image.yml b/community_images/cockroachdb/ironbank/image.yml new file mode 100644 index 0000000000..07897db741 --- /dev/null +++ b/community_images/cockroachdb/ironbank/image.yml @@ -0,0 +1,48 @@ +name: cockroachdb-ib +official_name: CockroachDB Ironbank +official_website: https://www.cockroachlabs.com +source_image_provider: Platform One +source_image_repo: registry1.dso.mil/ironbank/opensource/cockroachdb/cockroachdb +source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/opensource%2Fcockroachdb%2Fcockroachdb +source_image_readme: https://repo1.dso.mil/dsop/opensource/cockroachdb/cockroachdb/-/blob/development/README.md +rf_docker_link: rapidfort/cockroachdb-ib +image_workflow_name: cockroachdb_ironbank +github_location: cockroachdb/ironbank +report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fopensource%2Fcockroachdb%2Fcockroachdb +usage_instructions: | + # Add helm repo + $ helm repo add cockroachdb https://charts.cockroachdb.com/ + $ helm repo update + + # Install helm chart + $ helm install cockroachdb cockroachdb/cockroachdb --set image.repository=rapidfort/cockroachdb-ib +what_is_text: | + CockroachDB is a distributed SQL database built on a transactional and strongly-consistent key-value store. It scales horizontally; survives disk, machine, rack, and even datacenter failures with minimal latency disruption and no manual intervention; supports strongly-consistent ACID transactions; and provides a familiar SQL API for structuring, manipulating, and querying data. +disclaimer: | + Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement. +is_locked: "False" +input_registry: + registry: registry1.dso.mil + account: ironbank +repo_sets: + - opensource/cockroachdb/cockroachdb: + input_base_tag: "v24.1." + output_repo: cockroachdb-ib +runtimes: + - type: k8s + script: k8s_coverage.sh + helm: + repo: cockroachdb + repo_url: https://charts.cockroachdb.com/ + chart: cockroachdb + override_dir: cockroachdb + image_keys: + cockroachdb-ib: + repository: "image.repository" + tag: "image.tag" + override_file: "overrides.yml" + readiness_wait_pod_name_suffix: + - "0" + - "1" + - "2" + diff --git a/community_images/elasticsearch-dump/ironbank/assets/github_logo.png b/community_images/elasticsearch-dump/ironbank/assets/github_logo.png new file mode 100644 index 0000000000..ad5b38ffc9 Binary files /dev/null and b/community_images/elasticsearch-dump/ironbank/assets/github_logo.png differ diff --git a/community_images/elasticsearch-dump/ironbank/image.yml b/community_images/elasticsearch-dump/ironbank/image.yml index 1931b387e1..357e9025fa 100644 --- a/community_images/elasticsearch-dump/ironbank/image.yml +++ b/community_images/elasticsearch-dump/ironbank/image.yml @@ -21,7 +21,7 @@ input_registry: account: ironbank repo_sets: - opensource/elasticdump/elasticsearch-dump: - input_base_tag: "6.112." + input_base_tag: "6.113." output_repo: elasticsearch-dump-ib runtimes: - type: docker_compose @@ -29,5 +29,5 @@ runtimes: compose_file: docker-compose.yml image_keys: elasticsearch-dump-ib: - repository: "ELASTICSEARCH-DUMP_IMAGE_REPOSITORY" - tag: "ELASTICSEARCH-DUMP_IMAGE_TAG" + repository: "ELASTICSEARCH_DUMP_IMAGE_REPOSITORY" + tag: "ELASTICSEARCH_DUMP_IMAGE_TAG" diff --git a/community_images/elasticsearch-exporter/ironbank/image.yml b/community_images/elasticsearch-exporter/ironbank/image.yml index 54f6a5ce5c..99e59faa6c 100644 --- a/community_images/elasticsearch-exporter/ironbank/image.yml +++ b/community_images/elasticsearch-exporter/ironbank/image.yml @@ -21,7 +21,7 @@ input_registry: account: ironbank repo_sets: - opensource/bitnami/elasticsearch-exporter: - input_base_tag: "1.7." + input_base_tag: "1.8." output_repo: elasticsearch-exporter-ib runtimes: - type: docker_compose diff --git a/community_images/elasticsearch/official/image.yml b/community_images/elasticsearch/official/image.yml index 4c0556db7a..da070a9df4 100755 --- a/community_images/elasticsearch/official/image.yml +++ b/community_images/elasticsearch/official/image.yml @@ -34,7 +34,7 @@ runtimes: - type: docker_compose script: dc_coverage.sh compose_file: docker-compose.yml - wait_time_sec: 120 + wait_time_sec: 30 image_keys: elasticsearch-official: repository: "ELASTICSEARCH_IMAGE_REPOSITORY" diff --git a/community_images/envoy/bitnami/image.yml b/community_images/envoy/bitnami/image.yml index afdd3b3a78..5b68ce1661 100644 --- a/community_images/envoy/bitnami/image.yml +++ b/community_images/envoy/bitnami/image.yml @@ -26,13 +26,13 @@ repo_sets: - envoy: input_base_tag: "1.27.7-debian-12-r" - envoy: - input_base_tag: "1.28.5-debian-12-r" + input_base_tag: "1.28.7-debian-12-r" - envoy: - input_base_tag: "1.29.7-debian-12-r" + input_base_tag: "1.29.9-debian-12-r" - envoy: - input_base_tag: "1.30.4-debian-12-r" + input_base_tag: "1.30.6-debian-12-r" - envoy: - input_base_tag: "1.31.0-debian-12-r" + input_base_tag: "1.31.2-debian-12-r" runtimes: - type: docker_compose script: dc_coverage.sh diff --git a/community_images/fluent-bit/bitnami/image.yml b/community_images/fluent-bit/bitnami/image.yml index fb017976a3..1d358d00c7 100644 --- a/community_images/fluent-bit/bitnami/image.yml +++ b/community_images/fluent-bit/bitnami/image.yml @@ -25,7 +25,7 @@ repo_sets: - fluent-bit: input_base_tag: "2.2.3-debian-12-r" - fluent-bit: - input_base_tag: "3.1.7-debian-12-r" + input_base_tag: "3.1.8-debian-12-r" runtimes: - type: docker_compose script: dc_coverage.sh diff --git a/community_images/fluentd-kubernetes-daemonset/ironbank/assets/github_logo.png b/community_images/fluentd-kubernetes-daemonset/ironbank/assets/github_logo.png new file mode 100644 index 0000000000..ad5b38ffc9 Binary files /dev/null and b/community_images/fluentd-kubernetes-daemonset/ironbank/assets/github_logo.png differ diff --git a/community_images/ghost/bitnami/image.yml b/community_images/ghost/bitnami/image.yml index eb958caeee..753c33bfc9 100755 --- a/community_images/ghost/bitnami/image.yml +++ b/community_images/ghost/bitnami/image.yml @@ -24,7 +24,7 @@ input_registry: account: bitnami repo_sets: - ghost: - input_base_tag: "5.94.0-debian-12-r" + input_base_tag: "5.94.1-debian-12-r" runtimes: - type: k8s script: k8s_coverage.sh diff --git a/community_images/gitaly/ironbank/image.yml b/community_images/gitaly/ironbank/image.yml index 76589bc4d5..93e3cf0a8c 100755 --- a/community_images/gitaly/ironbank/image.yml +++ b/community_images/gitaly/ironbank/image.yml @@ -31,6 +31,7 @@ runtimes: - type: k8s script: k8s_coverage.sh readiness_check_script: gitaly_readiness_check.sh + readiness_check_timeout: 1200 helm: repo: gitlab repo_url: http://charts.gitlab.io/ diff --git a/community_images/gitlab-exporter/ironbank/image.yml b/community_images/gitlab-exporter/ironbank/image.yml index 5528e2bea3..5501863361 100644 --- a/community_images/gitlab-exporter/ironbank/image.yml +++ b/community_images/gitlab-exporter/ironbank/image.yml @@ -33,6 +33,7 @@ runtimes: - type: k8s script: k8s_coverage.sh readiness_check_script: health_check.sh + readiness_check_timeout: 1200 helm: repo: gitlab repo_url: https://charts.gitlab.io diff --git a/community_images/gitlab-shell/ironbank/image.yml b/community_images/gitlab-shell/ironbank/image.yml index e9c3d0af00..92246c45c4 100644 --- a/community_images/gitlab-shell/ironbank/image.yml +++ b/community_images/gitlab-shell/ironbank/image.yml @@ -34,7 +34,7 @@ runtimes: repo_url: https://charts.gitlab.io chart: gitlab readiness_check_script: shell_setup.sh - readiness_check_timeout: 600 + readiness_check_timeout: 1200 wait_time_sec: 40 helm_additional_params: certmanager-issuer.email: rf@rapidfort.com diff --git a/community_images/haproxy-latest/ironbank/image.yml b/community_images/haproxy-latest/ironbank/image.yml new file mode 100755 index 0000000000..02b3049af2 --- /dev/null +++ b/community_images/haproxy-latest/ironbank/image.yml @@ -0,0 +1,53 @@ +name: haproxy-latest-ib +official_name: HAProxy-latest IronBank +official_website: http://www.haproxy.org/ +source_image_provider: Platform One +source_image_repo: registry1.dso.mil/ironbank/opensource/haproxy/haproxy-latest +source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/opensource%2Fhaproxy%2Fhaproxy-latest +source_image_readme: https://repo1.dso.mil/dsop/opensource/haproxy/haproxy-latest/-/blob/development/README.md +rf_docker_link: rapidfort/haproxy-latest-ib +image_workflow_name: haproxy-latest_ironbank +github_location: haproxy-latest/ironbank +report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fopensource%2Fhaproxy%2Fhaproxy-latest +usage_instructions: | + # Using docker run via bind mount: + $ docker run -d --name my-haproxy -v /path/to/etc/haproxy:/usr/local/etc/haproxy:ro --sysctl net.ipv4.ip_unprivileged_port_start=0 rapidfort/haproxy24-ib +what_is_text: | + HAProxy is a free, open source high availability solution, providing load balancing and proxying for TCP and HTTP-based applications by spreading requests across multiple servers. It is written in C and has a reputation for being fast and efficient (in terms of processor and memory usage). + wikipedia.org/wiki/HAProxy +disclaimer: | + Trademarks: This software listing is packaged by RapidFort. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement. +is_locked: "False" +needs_common_commands: False +input_registry: + registry: registry1.dso.mil + account: ironbank +repo_sets: + - opensource/haproxy/haproxy-latest: + input_base_tag: "3.0." + output_repo: haproxy-latest-ib +runtimes: + - type: docker_compose + script: dc_coverage.sh + compose_file: docker-compose.yml + wait_time_sec: 120 + # certs are committed in the repo itself for haproxy-latest + # haproxy.pem is created by `cat server.crt server.key > haproxy.pem` + # tls_certs: + # generate: true + # out_dir: certs + image_keys: + haproxy-latest-ib: + repository: "HAPROXY_IMAGE_REPOSITORY" + tag: "HAPROXY_IMAGE_TAG" + - type: docker_compose + script: dc_coverage_tcp.sh + compose_file: docker-compose-tcp.yml + wait_time_sec: 120 + # tls_certs: + # generate: true + # out_dir: certs + image_keys: + haproxy-latest-ib: + repository: "HAPROXY_IMAGE_REPOSITORY" + tag: "HAPROXY_IMAGE_TAG" diff --git a/community_images/haproxy/bitnami/image.yml b/community_images/haproxy/bitnami/image.yml index db16fbd474..7b2b7ff446 100755 --- a/community_images/haproxy/bitnami/image.yml +++ b/community_images/haproxy/bitnami/image.yml @@ -24,9 +24,9 @@ input_registry: account: bitnami repo_sets: - haproxy: - input_base_tag: "2.9.10-debian-12-r" + input_base_tag: "2.9.11-debian-12-r" - haproxy: - input_base_tag: "3.0.4-debian-12-r" + input_base_tag: "3.0.5-debian-12-r" runtimes: - type: k8s script: k8s_coverage.sh diff --git a/community_images/jq/ironbank/image.yml b/community_images/jq/ironbank/image.yml new file mode 100755 index 0000000000..059283cb56 --- /dev/null +++ b/community_images/jq/ironbank/image.yml @@ -0,0 +1,33 @@ +name: jq-ib +official_name: JQ Iron Bank +official_website: https://jqlang.github.io/jq/ +source_image_provider: Platform One +source_image_repo: registry1.dso.mil/ironbank/stedolan/jq +source_image_repo_link: https://registry1.dso.mil/harbor/projects/3/repositories/stedolan%2Fjq +source_image_readme: https://repo1.dso.mil/dsop/opensource/stedolan/jq/-/blob/development/README.md +rf_docker_link: rapidfort/jq-ib +github_location: jq/ironbank +image_workflow_name: jq_ironbank +report_url: https://us01.rapidfort.com/app/community/imageinfo/registry1.dso.mil%2Fironbank%2Fstedolan%2Fjq +usage_instructions: | + #Run the jq container: + $ docker run -i rapidfort/jq-ib