We curently support the following Istio branches:
- master
- 1.10
- 1.11
- 1.12
Our private images are available at ECR and HPE HUB, respectively, 529024819027.dkr.ecr.us-east-1.amazonaws.com/mithril and hub.docker.hpecorp.net.
For development purposes, we have the following images:
- Jenkins pipeline: (hub.docker.hpecorp.net/sec-eng/ubuntu:pipeline)
- Mithril dependencies: (529024819027.dkr.ecr.us-east-1.amazonaws.com/mithril)
At the moment, we provide images, scripts, and code patches.
The Mithril images are uploaded to a private ECR and HPE HUB during the build-and-push-istio-images stage at our pipeline.
Our scripts and patches are uploaded to a public S3 bucket with versioning. This means that we download the latest versions by default, but the older versions are still available for consulting. This process occurs automatically within the distribute-poc stage at our pipeline, with the scripts and patches being uploaded in parallel.
Our images are available for customer consumption in the public ECR. Our public ECR HUB is public.ecr.aws/e4m8j0n8/mithril.
At distribute-assets stage, a tar.gz
file is created with the desired assets.
tar -zcvf mithril.tar.gz \
bookinfo spire istio \
deploy-all.sh create-namespaces.sh cleanup-all.sh \
forward-port.sh create-kind-cluster.sh \
doc/poc-instructions.md demo/demo-script.sh \
demo/README.md demo/federation-demo.sh \
../usecases/federation
Then, this file is uploaded to the bucket s3://mithril-customer-assets and set as publicly readable through an ACL object.
Then, this file is uploaded to the bucket s3://mithril-poc-patchset and set as publicly readable through an ACL object.
tar -zcvf mithril-poc-patchset.tar.gz patches
Our current images are:
- stable_20211209
- stable_20211022
- stable_20210920