promenade/tools/g2/lib
anthony.bellino 0e8b5cfe59 Uplift Promenade image to address CVEs
The current Promenade image is vulnerable to several CVEs:
CVE-2019-3462
CVE-2018-16865
CVE-2018-16864

Which Ubuntu 16.04/18.04 addresses.
This patchset makes the following changes:
1. Adds new distro specific dockerfiles for xenial/bionic.
2. Updates gates to be specific about the ubuntu image being
   checked.
3. Updates .zuul.yaml checks/gates/post jobs for xenial/bionic.
4. Updates build-image.sh docker build for specific dockerfile
   specified in config.sh (IMAGE_PROMENADE_DISTRO).

Change-Id: I89e5297a3baa8c2d2c142e5e29932476fc628398
2020-05-28 16:09:40 +00:00
..
all.sh Make gate scripts more robust 2018-02-14 14:27:26 -06:00
config.sh Uplift Promenade image to address CVEs 2020-05-28 16:09:40 +00:00
const.sh Gate: Use ShellCheck to lint scripts 2017-10-31 10:38:23 -05:00
docker.sh Make gate scripts more robust 2018-02-14 14:27:26 -06:00
etcd.sh Gate: Use ShellCheck to lint scripts 2017-10-31 10:38:23 -05:00
kube.sh New source for hyperkube binary definition 2019-06-06 10:30:29 -07:00
log.sh Make gate scripts more robust 2018-02-14 14:27:26 -06:00
nginx.sh Make gate scripts more robust 2018-02-14 14:27:26 -06:00
openstack.sh Add deckhand design_ref support 2018-01-22 08:28:19 -06:00
promenade.sh Add optional external_ip to promjoin 2019-04-23 08:45:34 -05:00
registry.sh New source for hyperkube binary definition 2019-06-06 10:30:29 -07:00
ssh.sh Add keystone integration test 2017-12-19 16:00:20 -06:00
validate.sh Use Kubernetes lease endpoint reconciler 2018-06-15 13:13:02 -05:00
virsh.sh containerd support 2019-11-20 16:31:30 -08:00