Complete swiss-army-knife v2 setup with comprehensive tooling and Docker build fixes #5
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
This PR sets up swiss-army-knife v2 with comprehensive debugging tools, security improvements, and fixes for Docker build failures.
Key Features
• Multi-stage Docker build with Go echo-server application for testing/debugging
• Updated kubectl to use stable version from upstream releases
• Comprehensive networking tools: tcpdump, traceroute, telnet, netcat, dig, nslookup, socat
• Build tools: gcc, make, automake, autoconf for compiling applications
• GitHub Actions workflows for automated building and releases with Trivy security scanning
• Updated documentation with Docker and containerd usage examples
Docker Build Improvements ✅
• Fixed external repository dependency that was causing 404 errors in GitHub Actions
• Removed problematic zypper addrepo command for network utilities
• Added graceful fallbacks for potentially missing packages (conntrack, mtr, iperf)
• All packages now install from standard SUSE BCI repositories
• Resolves GitHub Actions build failures with comprehensive error handling
Security Improvements
• Base image: SUSE BCI 15.7 for enterprise stability
• Trivy security scanning integrated into CI/CD pipeline
• Proper vulnerability management with .trivyignore for acceptable risks
• Comprehensive tool installation with proper cleanup
Technical Details
• Go application: Static echo-server binary for network testing
• Package management: Robust installation with fallback mechanisms
• kubectl: Latest stable version with autocompletion configured
• Default behavior: Interactive bash shell for debugging
Test plan
Commit Signature Compliance ✅
This PR features a single, properly signed commit with:
[email protected]
)🤖 Generated with Claude Code