-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Add docker images built using FIPS binaries #7392
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: release-5.8
Are you sure you want to change the base?
Conversation
|
API Changes no api changes detected |
PR Reviewer Guide 🔍Here are some key observations to aid the review process:
|
PR Code Suggestions ✨Explore these optional code suggestions:
|
|


User description
Description
Auto generated changes by gromit to add fips compliant docker images to releases. These changes are in response to a customer request for fips compliant docker images. These are provided by using our existing fips binaries in a distroless image. THESE ARE NOT FIPS VALIDATED IMAGES. Tyk's FIPS documentation has been updated as a result of this request.
Related Issue
see this ticket. A PR has also been made against branch
release-5.8ontyk-analyticsMotivation and Context
These images were request to be included in regular releases by a client.
How This Has Been Tested
goreleaser was run locally, everything seems okay a fips image is built using the fips binary. More end to end testing is needed with the other fips components.
Types of changes
Checklist
PR Type
Enhancement, Other
Description
Add FIPS Docker builds and manifests
Enable multi-arch FIPS packages (amd64/arm64/s390x)
CI workflow pushes FIPS images to CI/prod
Adjust std Dockerfile install and cleanup
Diagram Walkthrough
File Walkthrough
release.yml
CI pipeline to build and publish FIPS images.github/workflows/release.yml
Dockerfile.std
Standard Dockerfile installs from dist and cleansci/Dockerfile.std
goreleaser.yml
Goreleaser: FIPS multi-arch builds and manifestsci/goreleaser/goreleaser.yml