Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: docker/grouper
base: 2.4.0-a1-u0-w0-p0-test
Choose a base ref
...
head repository: docker/grouper
compare: main
Choose a head ref
Able to merge. These branches can be automatically merged.

Commits on Sep 4, 2018

  1. Copy the full SHA
    c27e192 View commit details
  2. Merge pull request #54 from docker/2.3.0-a109-u47-w12-p20

    Patch up to pspng patch 20
    chubing committed Sep 4, 2018
    Copy the full SHA
    bff1860 View commit details

Commits on Sep 7, 2018

  1. Copy the full SHA
    e7cbf6f View commit details
  2. Merge pull request #55 from docker/2.3.0-a109-u47-w12-p20

    grouper_v2_3_0_api_patch_109,grouper_v2_3_0_ui_patch_47
    chubing committed Sep 7, 2018
    Copy the full SHA
    d64b6a1 View commit details

Commits on Sep 10, 2018

  1. Copy the full SHA
    7b24ed0 View commit details

Commits on Sep 18, 2018

  1. API patch 2

    chubing committed Sep 18, 2018
    Copy the full SHA
    20aedfd View commit details

Commits on Oct 1, 2018

  1. Update README.md

    chubing committed Oct 1, 2018
    Copy the full SHA
    454e7c6 View commit details

Commits on Oct 2, 2018

  1. Testing Aqua Microscanner

    chubing committed Oct 2, 2018
    Copy the full SHA
    1f1797d View commit details

Commits on Oct 4, 2018

  1. Copy the full SHA
    c83210b View commit details
  2. Update Jenkinsfile

    chubing committed Oct 4, 2018
    Copy the full SHA
    9445f31 View commit details
  3. Copy the full SHA
    298594f View commit details
  4. Update Jenkinsfile

    chubing committed Oct 4, 2018
    Copy the full SHA
    b156912 View commit details
  5. Update Jenkinsfile

    chubing committed Oct 4, 2018
    Copy the full SHA
    6d0199c View commit details
  6. Update Jenkinsfile

    chubing committed Oct 4, 2018
    Copy the full SHA
    846dc96 View commit details
  7. Update Jenkinsfile

    chubing committed Oct 4, 2018
    Copy the full SHA
    a4fa056 View commit details
  8. Update Jenkinsfile

    chubing committed Oct 4, 2018
    Copy the full SHA
    c08db92 View commit details

Commits on Oct 8, 2018

  1. Create clairscan.sh

    chubing committed Oct 8, 2018
    Copy the full SHA
    fdfd1f6 View commit details
  2. Create main.bats

    chubing committed Oct 8, 2018
    Copy the full SHA
    d5241b5 View commit details
  3. Update Jenkinsfile

    chubing committed Oct 8, 2018
    Copy the full SHA
    91c611f View commit details
  4. Update Jenkinsfile

    chubing committed Oct 8, 2018
    Copy the full SHA
    a783a1a View commit details
  5. added x bit

    chubing committed Oct 8, 2018
    Copy the full SHA
    e566718 View commit details
  6. Update Jenkinsfile

    chubing committed Oct 8, 2018
    Copy the full SHA
    d37730b View commit details
  7. Update main.bats

    chubing committed Oct 8, 2018
    Copy the full SHA
    effd521 View commit details
  8. Update main.bats

    chubing committed Oct 8, 2018
    Copy the full SHA
    5a963c1 View commit details
  9. Update main.bats

    chubing committed Oct 8, 2018
    Copy the full SHA
    4cc64f0 View commit details
  10. Update main.bats

    chubing committed Oct 8, 2018
    Copy the full SHA
    cf745da View commit details
  11. Update main.bats

    chubing committed Oct 8, 2018
    Copy the full SHA
    5c9e23c View commit details
  12. Update main.bats

    chubing committed Oct 8, 2018
    Copy the full SHA
    7d975ab View commit details
  13. Update Jenkinsfile

    chubing committed Oct 8, 2018
    Copy the full SHA
    1b24c3b View commit details

Commits on Oct 9, 2018

  1. Update Jenkinsfile

    chubing committed Oct 9, 2018
    Copy the full SHA
    fe4fdf4 View commit details
  2. Update Jenkinsfile

    chubing committed Oct 9, 2018
    Copy the full SHA
    ffd56bd View commit details
  3. Update Jenkinsfile

    chubing committed Oct 9, 2018
    Copy the full SHA
    5f9098a View commit details
  4. Update main.bats

    chubing committed Oct 9, 2018
    Copy the full SHA
    f0eae16 View commit details
  5. Update Jenkinsfile

    chubing committed Oct 9, 2018
    Copy the full SHA
    44b1d57 View commit details
  6. Update main.bats

    chubing committed Oct 9, 2018
    Copy the full SHA
    515c650 View commit details
  7. Update main.bats

    chubing committed Oct 9, 2018
    Copy the full SHA
    d179cf7 View commit details
  8. Update main.bats

    chubing committed Oct 9, 2018
    Copy the full SHA
    0046363 View commit details

Commits on Oct 16, 2018

  1. Copy the full SHA
    2701cfa View commit details

Commits on Nov 1, 2018

  1. API patch 3

    chubing committed Nov 1, 2018
    Copy the full SHA
    7ea8949 View commit details

Commits on Nov 7, 2018

  1. Copy the full SHA
    cada700 View commit details

Commits on Dec 7, 2018

  1. a11-u5-w0-p0

    chubing committed Dec 7, 2018
    Copy the full SHA
    6f9502e View commit details
  2. Update Jenkinsfile

    chubing committed Dec 7, 2018
    Copy the full SHA
    de3486b View commit details

Commits on Jan 4, 2019

  1. Copy the full SHA
    67cf458 View commit details
  2. Update Jenkinsfile

    chubing committed Jan 4, 2019
    Copy the full SHA
    9891cf0 View commit details
  3. Update Dockerfile

    chubing committed Jan 4, 2019
    Copy the full SHA
    b12c150 View commit details
  4. Update Dockerfile

    chubing committed Jan 4, 2019
    Copy the full SHA
    f760521 View commit details
  5. Update Dockerfile

    chubing committed Jan 4, 2019
    Copy the full SHA
    bfa62a7 View commit details

Commits on Jan 7, 2019

  1. Copy the full SHA
    39679df View commit details
  2. Copy the full SHA
    ed2fbd5 View commit details

Commits on Jan 8, 2019

  1. Copy the full SHA
    661fb87 View commit details
Showing with 190 additions and 30 deletions.
  1. +23 −12 Dockerfile
  2. +55 −13 Jenkinsfile
  3. +14 −3 README.md
  4. +4 −1 container_files/grouper.installer.properties
  5. +4 −0 container_files/httpd/grouper-www.conf
  6. +1 −0 container_files/morphString.properties
  7. +1 −1 test-compose/data/Dockerfile
  8. +72 −0 tests/clairscan.sh
  9. +16 −0 tests/main.bats
35 changes: 23 additions & 12 deletions Dockerfile
@@ -3,9 +3,12 @@ FROM centos:centos7 as installing
RUN yum update -y \
&& yum install -y wget tar unzip dos2unix \
&& yum clean all

ARG GROUPER_CONTAINER_VERSION

ENV GROUPER_VERSION=2.4.0 \
JAVA_HOME=/usr/lib/jvm/zulu-8/
JAVA_HOME=/usr/lib/jvm/zulu-8/ \
GROUPER_CONTAINER_VERSION=$GROUPER_CONTAINER_VERSION

# use Zulu package
RUN rpm --import http://repos.azulsystems.com/RPM-GPG-KEY-azulsystems \
@@ -36,6 +39,9 @@ RUN echo 'Downloading Grouper Installer...' \
&& wget -q -O /opt/grouper/$GROUPER_VERSION/grouperInstaller.jar http://software.internet2.edu/grouper/release/$GROUPER_VERSION/grouperInstaller.jar

COPY container_files/grouper.installer.properties /opt/grouper/$GROUPER_VERSION
# Temporary morphString file used for building, not used in production
COPY container_files/morphString.properties /opt/grouper/$GROUPER_VERSION


RUN echo 'Installing Grouper'; \
PATH=$PATH:$JAVA_HOME/bin; \
@@ -47,7 +53,7 @@ RUN echo 'Installing Grouper'; \
FROM centos:centos7 as cleanup

ENV GROUPER_VERSION=2.4.0 \
TOMCAT_VERSION=8.5.12 \
TOMCAT_VERSION=8.5.42 \
TOMEE_VERSION=7.0.0

COPY --from=installing /opt/grouper/$GROUPER_VERSION/grouperInstaller.jar /opt/grouper/
@@ -60,20 +66,20 @@ COPY --from=installing /opt/grouper/$GROUPER_VERSION/apache-tomcat-$TOMCAT_VERSI
COPY --from=installing /opt/grouper/$GROUPER_VERSION/apache-tomee-webprofile-$TOMEE_VERSION/ /opt/tomee/
COPY --from=installing /etc/alternatives/java /etc/alternatives/java

ADD http://central.maven.org/maven2/org/apache/logging/log4j/log4j-core/2.11.0/log4j-core-2.11.0.jar /opt/tomcat/bin
ADD http://central.maven.org/maven2/org/apache/logging/log4j/log4j-api/2.11.0/log4j-api-2.11.0.jar /opt/tomcat/bin
ADD http://central.maven.org/maven2/org/apache/logging/log4j/log4j-jul/2.11.0/log4j-jul-2.11.0.jar /opt/tomcat/bin
ADD https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-core/2.11.0/log4j-core-2.11.0.jar /opt/tomcat/bin
ADD https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-api/2.11.0/log4j-api-2.11.0.jar /opt/tomcat/bin
ADD https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-jul/2.11.0/log4j-jul-2.11.0.jar /opt/tomcat/bin

ADD http://central.maven.org/maven2/org/apache/logging/log4j/log4j-core/2.11.0/log4j-core-2.11.0.jar /opt/tomee/bin
ADD http://central.maven.org/maven2/org/apache/logging/log4j/log4j-api/2.11.0/log4j-api-2.11.0.jar /opt/tomee/bin
ADD http://central.maven.org/maven2/org/apache/logging/log4j/log4j-jul/2.11.0/log4j-jul-2.11.0.jar /opt/tomee/bin
ADD https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-core/2.11.0/log4j-core-2.11.0.jar /opt/tomee/bin
ADD https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-api/2.11.0/log4j-api-2.11.0.jar /opt/tomee/bin
ADD https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-jul/2.11.0/log4j-jul-2.11.0.jar /opt/tomee/bin

RUN cd /opt/grouper/grouper.apiBinary/; \
rm -fr ddlScripts/ grouper.lck grouper.log grouper.script grouper.tmp/ gshAddGrouperSystemWsGroup.gsh logs/
rm -fr ddlScripts/ grouper.properties grouper.lck grouper.log grouper.script grouper.tmp/ gshAddGrouperSystemWsGroup.gsh logs/

RUN cd /opt/tomcat/; \
chmod +r bin/log4j-*.jar; \
rm -fr webapps/docs/ webapps/examples/ webapps/host-manager/ webapps/manager/ logs/* temp/* work/* conf/logging.properties
rm -fr webapps/docs/ webapps/examples/ webapps/host-manager/ webapps/manager/ webapps/ROOT/ logs/* temp/* work/* conf/logging.properties

RUN cd /opt/tomee/; \
chmod +r bin/log4j-*.jar; \
@@ -86,17 +92,20 @@ COPY container_files/tomcat/ /opt/tomcat/
COPY container_files/tomee/ /opt/tomee/


FROM tier/shibboleth_sp
FROM tier/shibboleth_sp:3.0.4_03122019

LABEL author="tier-packaging@internet2.edu <tier-packaging@internet2.edu>" \
Vendor="TIER" \
ImageType="Grouper" \
ImageName=$imagename \
ImageOS=centos7

ARG GROUPER_CONTAINER_VERSION

ENV JAVA_HOME=/usr/lib/jvm/zulu-8/ \
PATH=$PATH:$JAVA_HOME/bin \
GROUPER_HOME=/opt/grouper/grouper.apiBinary
GROUPER_HOME=/opt/grouper/grouper.apiBinary \
GROUPER_CONTAINER_VERSION=$GROUPER_CONTAINER_VERSION

RUN ln -sf /usr/share/zoneinfo/UTC /etc/localtime

@@ -138,6 +147,8 @@ WORKDIR /opt/grouper/grouper.apiBinary/

EXPOSE 80 443

HEALTHCHECK NONE

ENTRYPOINT ["/usr/local/bin/entrypoint.sh"]

CMD ["bin/gsh", "-loader"]
68 changes: 55 additions & 13 deletions Jenkinsfile
@@ -21,13 +21,15 @@ pipeline {
echo "You must define an imagename in common.bash"
currentBuild.result = 'FAILURE'
}
sh 'mkdir -p bin'
sh 'mkdir -p tmp'
sh 'mkdir -p tmp && mkdir -p bin'
dir('tmp'){
git([ url: "https://github.internet2.edu/docker/util.git", credentialsId: "jenkins-github-access-token" ])
sh 'ls'
sh 'mv bin/* ../bin/.'
sh 'rm -rf ../bin/*'
sh 'mv ./bin/* ../bin/.'
}
// Build and test scripts expect that 'tag' is present in common.bash. This is necessary for both Jenkins and standalone testing.
// We don't care if there are more 'tag' assignments there. The latest one wins.
sh "echo >> common.bash ; echo \"tag=\\\"${tag}\\\"\" >> common.bash ; echo common.bash ; cat common.bash"
}
}
}
@@ -48,15 +50,55 @@ pipeline {
stage('Build') {
steps {
script {
docker.withRegistry('https://registry.hub.docker.com/', "dockerhub-$maintainer") {
def baseImg = docker.build("$maintainer/$imagename", "--no-cache .")
// test the environment
sh 'cd test-compose && ./compose.sh'
// bring down after testing
sh 'cd test-compose && docker-compose down'
baseImg.push("$tag")
}
}
try{
docker.withRegistry('https://registry.hub.docker.com/', "dockerhub-$maintainer") {
baseImg = docker.build("$maintainer/$imagename", "--build-arg GROUPER_CONTAINER_VERSION=$tag --no-cache .")
}
} catch(error) {
def error_details = readFile('./debug');
def message = "BUILD ERROR: There was a problem building ${imagename}:${tag}. \n\n ${error_details}"
sh "rm -f ./debug"
handleError(message)
}
}
}
}
stage('Test') {
steps {
script {
try {
sh 'bin/test.sh 2>&1 | tee debug ; test ${PIPESTATUS[0]} -eq 0'
} catch (error) {
def error_details = readFile('./debug')
def message = "BUILD ERROR: There was a problem testing ${imagename}:${tag}. \n\n ${error_details}"
sh "rm -f ./debug"
handleError(message)
}
}
}
}

stage('Push') {
steps {
script {
//// scan the image with clair
// sh 'docker run -p 5432:5432 -d --name clairdb arminc/clair-db:latest'
// sh 'docker run -p 6060:6060 --link clairdb:postgres -d --name clair arminc/clair-local-scan:v2.0.5'
// sh 'curl -L -o clair-scanner https://github.com/arminc/clair-scanner/releases/download/v8/clair-scanner_linux_amd64'
// sh 'chmod 755 clair-scanner'
// sh "./clair-scanner --ip 172.17.0.1 -r test.out $maintainer/$imagename:latest"
//// test the environment
// sh 'docker kill clairdb'
// sh 'docker rm clairdb'
// sh 'docker kill clair'
// sh 'docker rm clair'
// sh 'cd test-compose && ./compose.sh'
//// bring down after testing
//sh 'cd test-compose && docker-compose down'
docker.withRegistry('https://registry.hub.docker.com/', "dockerhub-$maintainer") {
baseImg.push("$tag")
}
}
}
}
stage('Notify') {
17 changes: 14 additions & 3 deletions README.md
@@ -1,24 +1,35 @@
[![Build Status](https://jenkins.testbed.tier.internet2.edu/job/docker/job/grouper/job/master/badge/icon)](https://jenkins.testbed.tier.internet2.edu/job/docker/job/grouper/job/master/)
[![Build Status](https://jenkins.testbed.tier.internet2.edu/buildStatus/icon?job=docker/grouper/master)](https://jenkins.testbed.tier.internet2.edu/buildStatus/icon?job=docker/grouper/master)



This repository contains the source code used to create the InCommon Trusted Access Platform Grouper container. This standalone container is pushed to Dockerhub, various tags are available at the following URL: https://hub.docker.com/r/tier/grouper/tags. This repo can also be cloned and the container built locally.

The test-compose directory contains an example Grouper environment that starts up the various Grouper components. This example demonstrates how one might go about customizing and deploying their Grouper containers, using the TIER Grouper image as a base image. If evaluating Grouper, this is a good place to start.


# Upgrading from 2.3 to 2.4

If upgrading from Grouper version 2.3 to 2.4 and using LDAP, modifications will be needed in subject.properties and grouper-loaders.proprties. Further details about this can be found at the following URL:
https://spaces.at.internet2.edu/display/Grouper/vt-ldap+to+ldaptive+migration+for+LDAP+access

In particular, in subject.properties, *.param.base.value should be adjusted to only contain the RDN (Relative Distinguished Name), not the full DN. For example, "OU=People", not "OU=People,DC=domain,DC=edu"

Additional upgrade information can be found at the following URL: https://spaces.at.internet2.edu/display/Grouper/v2.4+Upgrade+Instructions+from+v2.3



# Supported tags

- latest
- patch specific tags* (i.e. 2.3.0-a97-u41-w11-p16)
- patch specific tags with date timestamp* (i.e. 2.4.0-80-u51-w10-p11-20191118)

\* Patch builds are routinely produced, but not necessarily for each patch release. The following monikers are used to construct the tag name:

- a = api patch number
- u = ui patch number
- w = ws patch number
- p = pspng patch number
- last field = the year, month and day the image was built

# Quick reference

@@ -165,7 +176,7 @@ For passing full files into the container, this container will make any secrets
Docker Secrets can also be used to pass in strings, such as a database connection string password, into the component config. To pass in the Grouper database connection string, one might set the property and value as such:

```text
hibernate.connection.password.elConfig = ${java.lang.System.getenv().get('GROUPER_DATABASE_PASSWORD_FILE') != null ? org.apache.commons.io.FileUtils.readFileToString(java.lang.System.getenv().get('GROUPER_DATABASE_PASSWORD_FILE'), "utf-8") : java.lang.System.getenv().get('GROUPER_DATABASE_PASSWORD') }
hibernate.connection.password.elConfig = ${java.lang.System.getenv().get('GROUPER_DATABASE_PASSWORD_FILE') != null ? org.apache.commons.io.FileUtils.readFileToString(new("java.io.File", java.lang.System.getenv().get('GROUPER_DATABASE_PASSWORD_FILE')), "utf-8") : java.lang.System.getenv().get('GROUPER_DATABASE_PASSWORD') }
```

Note that the default property name has been changed by appending `.elConfig`. (This causes Grouper to evaluate the string before saving the value.) The expression allows deployers to use a file containing only the database password as a Docker Secret and reference the file name via the `GROUPER_DATABASE_PASSWORD_FILE` environment property. This allows the config files to be baked into the image, if desired. Also, but not recommended, the database password could just be set in the Docker Service definition as an environment variable, `GROUPER_DATABASE_PASSWORD`. (Technically the expression can be broken up and just the desired functionality used.) Of course, using Grouper's MorphString functionality is supported and likely is the best option, but does require more effort in setting it up.
5 changes: 4 additions & 1 deletion container_files/grouper.installer.properties
@@ -14,9 +14,12 @@ grouperInstaller.default.installOrUpgrade = install
##
##############################

grouperInstaller.autorun.forceInstallPatch = t
grouperInstaller.autorun.installAllPatches = false
grouperInstaller.autorun.installPatchesUpToACertainPatchLevel = true
grouperInstaller.autorun.installPatchesUpToThesePatchLevels = grouper_v2_4_0_api_patch_1,grouper_v2_4_0_ui_patch_0,grouper_v2_4_0_ws_patch_0,grouper_v2_4_0_pspng_patch_0
# 2.4.0-a93-u56-w11-p12-20200214-rc1
grouperInstaller.autorun.installPatchesUpToThesePatchLevels = grouper_v2_4_0_api_patch_93,grouper_v2_4_0_ui_patch_56,grouper_v2_4_0_ws_patch_11,grouper_v2_4_0_pspng_patch_12


#### set this to true to try to use defaults for everything. Only things without default values will need to be set
grouperInstaller.autorun.useDefaultsAsMuchAsAvailable = true
4 changes: 4 additions & 0 deletions container_files/httpd/grouper-www.conf
@@ -7,6 +7,10 @@ ProxyPass /grouper ajp://localhost:8009/grouper timeout=2400
ProxyPass /grouper-ws ajp://localhost:8009/grouper-ws timeout=2400
ProxyPass /grouper-ws-scim ajp://localhost:8009/grouper-ws-scim timeout=2400

RewriteEngine on
RewriteCond %{REQUEST_URI} "^/$"
RewriteRule . %{REQUEST_SCHEME}://%{HTTP_HOST}/grouper/ [R=301,L]

<Location /grouper>
AuthType shibboleth
ShibRequestSetting requireSession 1
1 change: 1 addition & 0 deletions container_files/morphString.properties
@@ -0,0 +1 @@
encrypt.key=fh43IRJ4Nf5
2 changes: 1 addition & 1 deletion test-compose/data/Dockerfile
@@ -11,7 +11,7 @@ RUN yum install -y epel-release \
&& yum clean all \
&& rm -rf /var/cache/yum

RUN mysql_install_db \
RUN mysql_install_db --force \
&& chown -R mysql:mysql /var/lib/mysql/ \
&& sed -i 's/^\(bind-address\s.*\)/# \1/' /etc/my.cnf \
&& sed -i 's/^\(log_error\s.*\)/# \1/' /etc/my.cnf \
72 changes: 72 additions & 0 deletions tests/clairscan.sh
@@ -0,0 +1,72 @@
#!/bin/bash

startsecs=$(date +'%s')
starttime=$(date +%H:%M:%S)

echo 'starting:' ${starttime}

#ensure clair-scanner
if [ ! -s ./clair-scanner ]; then
echo 'downloading curl-scanner...'
curl -s -L -o ./clair-scanner https://github.com/arminc/clair-scanner/releases/download/v8/clair-scanner_linux_amd64
chmod 755 clair-scanner
else
echo 'using existing clair-scanner...'
fi

#ensure DB container
echo 'ensuring a fresh clair-db container...'
docker ps | grep clair-db &>/dev/null
if [ $? == "0" ]; then
echo 'removing existing clair-db container...'
docker kill db &>/dev/null
docker rm db &>/dev/null
docker run -p 5432:5432 -d --name db arminc/clair-db:latest &>/dev/null
else
docker run -p 5432:5432 -d --name db arminc/clair-db:latest &>/dev/null
fi
sleep 30

#ensure clair-scan container
echo 'ensuring a fresh clair-scan container...'
docker ps | grep clair-local-scan &>/dev/null
if [ $? == "0" ]; then
echo 'removing existing clair-scan container...'
docker kill clair &>/dev/null
docker rm clair &>/dev/null
docker run -p 6060:6060 --link db:postgres -d --name clair arminc/clair-local-scan:v2.0.5 &>/dev/null
else
docker run -p 6060:6060 --link db:postgres -d --name clair arminc/clair-local-scan:v2.0.5 &>/dev/null
fi
sleep 30

#get ip where clair-scanner will listen
clairip=$(/sbin/ifconfig docker0 | grep 'inet ' | sed 's/^[[:space:]]*//g' | cut -f 2 -d ' ' | sed 's/^[[:space:]]*//g')
echo 'sending ip addr' ${clairip} 'to clair-scan server...'

#run scan
echo 'running scan...'
./clair-scanner --ip ${clairip} $1
retcode=$?

#eval results
if [ $retcode == '0' ]; then
echo 'scan found nothing.'
else
echo 'scan found issues.'
fi

#cleanup
echo 'removing temporary containers...'
docker kill clair &>/dev/null
docker rm clair &>/dev/null
docker kill db &>/dev/null
docker rm db &>/dev/null

endsecs=$(date +'%s')
endtime=$(date +%H:%M:%S)
echo 'finished:' $endtime ' ('$((endsecs - startsecs)) 'seconds)'
echo ""

#pass along return code from scan
exit $retcode
16 changes: 16 additions & 0 deletions tests/main.bats
@@ -0,0 +1,16 @@
#!/usr/bin/env bats

load ../common

@test "010 Image is present and healthy" {
docker image inspect ${maintainer}/${imagename}
}

@test "030 Test Compose the environment" {
cd test-compose && ./compose.sh && docker-compose down
}


@test "070 There are no known security vulnerabilities" {
./tests/clairscan.sh ${maintainer}/${imagename}:latest
}