mirror of
https://github.com/SAP/jenkins-library.git
synced 2024-12-14 11:03:09 +02:00
d29ba346f2
* modify wrapper http to hold ca rot * modifying the http client for maven build * adding checks * eliminating seperate jks * test tls true * insecure flag remove * error debug * storing cert * sap root cert * error * only child cert * test * maven test * moving outside loop * changing pointer * dont download existing certs * typo fix * removing mavenBuild test * code clean up * making hadolint using always cert true * custom tls link for hadolint trust * error handel * extended condition for modifying custom tls * unit test case * checing when to add the customLinks * not breaking existing hadolint client config Co-authored-by: Your Name <you@example.com>
86 lines
3.3 KiB
YAML
86 lines
3.3 KiB
YAML
metadata:
|
|
name: hadolintExecute
|
|
description: Executes the Haskell Dockerfile Linter which is a smarter Dockerfile linter that helps you build [best practice](https://docs.docker.com/develop/develop-images/dockerfile_best-practices/) Docker images.
|
|
longDescription: |-
|
|
Executes the Haskell Dockerfile Linter which is a smarter Dockerfile linter that helps you build [best practice](https://docs.docker.com/develop/develop-images/dockerfile_best-practices/) Docker images.
|
|
The linter is parsing the Dockerfile into an abstract syntax tree (AST) and performs rules on top of the AST.
|
|
spec:
|
|
inputs:
|
|
secrets:
|
|
- name: configurationCredentialsId
|
|
type: jenkins
|
|
description: Jenkins 'Username with password' credentials ID containing username/password for access to your remote configuration file.
|
|
params:
|
|
- name: configurationUrl
|
|
type: string
|
|
description: URL pointing to the .hadolint.yaml exclude configuration to be used for linting. Also have a look at `configurationFile` which could avoid central configuration download in case the file is part of your repository.
|
|
mandatory: false
|
|
scope:
|
|
- PARAMETERS
|
|
- STAGES
|
|
- STEPS
|
|
default: null
|
|
- name: configurationUsername
|
|
type: string
|
|
description: The username to authenticate
|
|
scope:
|
|
- PARAMETERS
|
|
- STAGES
|
|
- STEPS
|
|
secret: true
|
|
resourceRef:
|
|
- name: configurationCredentialsId
|
|
type: secret
|
|
param: username
|
|
- name: configurationPassword
|
|
type: string
|
|
description: The password to authenticate
|
|
scope:
|
|
- PARAMETERS
|
|
- STAGES
|
|
- STEPS
|
|
secret: true
|
|
resourceRef:
|
|
- name: configurationCredentialsId
|
|
type: secret
|
|
param: password
|
|
- name: dockerFile
|
|
aliases:
|
|
- name: dockerfile
|
|
type: string
|
|
description: Dockerfile to be used for the assessment.
|
|
mandatory: false
|
|
scope:
|
|
- GENERAL
|
|
- PARAMETERS
|
|
- STAGES
|
|
- STEPS
|
|
default: ./Dockerfile
|
|
- name: configurationFile
|
|
type: string
|
|
description: Name of the configuration file used locally within the step. If a file with this name is detected as part of your repo downloading the central configuration via `configurationUrl` will be skipped. If you change the file's name make sure your stashing configuration also reflects this.
|
|
mandatory: false
|
|
scope:
|
|
- PARAMETERS
|
|
- STAGES
|
|
- STEPS
|
|
default: .hadolint.yaml
|
|
- name: reportFile
|
|
type: string
|
|
description: Name of the result file used locally within the step.
|
|
scope:
|
|
- PARAMETERS
|
|
- STAGES
|
|
- STEPS
|
|
default: hadolint.xml
|
|
- name: customTlsCertificateLinks
|
|
type: "[]string"
|
|
description: "List of download links to custom TLS certificates. This is required to ensure trusted connections between Piper and the system where the configuration file is to be downloaded from."
|
|
scope:
|
|
- PARAMETERS
|
|
- STAGES
|
|
- STEPS
|
|
containers:
|
|
- name: hadolint
|
|
image: hadolint/hadolint:latest-debian
|