Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SECURESIGN-232] [SECURESIGN-233] [SECURESIGN-234] | Fulcio custom pipeline config #78

Merged
merged 3 commits into from
Dec 5, 2023

Conversation

tommyd450
Copy link

No description provided.

@tommyd450 tommyd450 changed the title Updating Dockerfile [SECURESIGN-232] [SECURESIGN-233] [SECURESIGN-234] | Fulcio custom pipeline config Dec 5, 2023
@tommyd450
Copy link
Author

/retest

Copy link

@JasonPowr JasonPowr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@Gregory-Pereira
Copy link

Confused why were not using the golang opnshift builder image but if registry go-tools image works thats fine.
/approve
/lgtm

Copy link

openshift-ci bot commented Dec 5, 2023

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: Gregory-Pereira, JasonPowr, tommyd450

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

# Add source code
ADD ./ $APP_ROOT/src/

RUN go build -o server main.go
RUN CGO_ENABLED=1 go build -gcflags "all=-N -l" -o server_debug main.go

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why are we removing the dubgging binary in the build process?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we need it? There is no Red Hat documentation for it, and it wasn't used in any way in TP1. I think if we don't need to include it, let's don't just to keep the surface area as small as possible.

@tommyd450
Copy link
Author

tommyd450 commented Dec 5, 2023

Confused why were not using the golang opnshift builder image but if registry go-tools image works thats fine. /approve /lgtm

@Gregory-Pereira
I hadnt even noticed I havent updated the builder!

@lance
Copy link
Member

lance commented Dec 5, 2023

Confused why were not using the golang opnshift builder image but if registry go-tools image works thats fine. /approve /lgtm

@Gregory-Pereira I hadnt even noticed I havent updated the builder!

If we can stick to the older go version without any build problems, then we should. Occasional a repo will use a 1.21 feature and that's where we get stuck and have to revert to the openshift brew image. I don't think it's necessary in this case, and pulling from registry.redhat.io is preferred.

@lance
Copy link
Member

lance commented Dec 5, 2023

@Gregory-Pereira I'm going to go ahead and merge this. If you want to pursue including the debug binary, we can do that in another PR.

@lance lance merged commit 1db1dfd into securesign:redhat-v1.4 Dec 5, 2023
10 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants