Behind the scenes of JUnit 5 – running an independent open source project by example - OCX 2024

Subscribers:
24,000
Published on ● Video Link: https://www.youtube.com/watch?v=fsrtgVpOI3Q



Duration: 0:00
25 views
2


Although the act of building container images is an easy and accessible practice, perfecting them is still an art that is challenging to master. In pursuit of the smallest, most secure and yet functional container images, developers face themselves with distroless practices that usually involve complex tooling, deep distro knowledge and error-prone trimming strategies. In fact, such practices often neglect the use of package managers, contributing to a security abyss, as most vulnerability scanners rely on package manager metadata to detect the software components within the container image. Chisel introduces a novel pattern for building distroless-like container images from the ground up. It is a self-contained tool that cuts Ubuntu packages into a minimal filesystem, from scratch. Unlike a typical package manager, Chisel works with package “slices”, i.e. predefined subsets of existing packages that have been designed to compartmentalize functionality and leave out contents that are not required for the container application to run. The result is a minimal, yet functional slice of an Ubuntu filesystem, with a reduced attack surface. There is no need to repackage or manipulate one’s application dependencies, meaning that whatever applications already work today with Ubuntu, will still work with Chiselled Ubuntu. In this talk, we'll cover the fundamentals of Chisel and demonstrate how easy it is for anyone to build their own minimal and secure container image. Attendees should be comfortable with Linux systems (especially packaging) and container technologies. Some advanced topics, like distroless containers, will be used for reference and as such, will also be introduced for those who are less familiar with the concept. By the end of the session, even the less technical attendees should be able to generate an ultra-small Ubuntu-based container image, with a reduced attack surface and default compliance with security standards like CIS and STIG.




Other Videos By Eclipse Foundation


2024-11-15Actions in the Wild: Usability and ease of use of open source security tools - OCX 2024
2024-11-15Building Graphical Web Applications A Case Study on SysON - OCX 2024
2024-11-15Introducing the Open Collaboration Tools Project - OCX 2024
2024-11-15Open Worlds - Why Diversity in Open Source Foundations Matters - OCX 2024
2024-11-15Bringing cross platform graphical applications to the Oniro ecosystem through react native-OCX 2024
2024-11-15New concepts for cross company data sharing: Eclipse Dataspace Components Framework - OCX 2024
2024-11-15Initiative 31: Investigating Options to Modernize Eclipse SWT and Eclipse IDE's UI UX - OCX 2024
2024-11-15Navigating a security audit, the insights, challenges, experiences and lessons learnt - OCX 2024
2024-11-15From Monolith to Modulith: The Evolution of Sirius Web's Architecture OCX 2024
2024-11-15GitHub Copilot + Spring Making AI-assisted Coding Spring aware - OCX 2024
2024-11-14Behind the scenes of JUnit 5 – running an independent open source project by example - OCX 2024
2024-11-07What's the lifecycle of an Eclipse project?
2024-11-07Eclipse Ecosystem
2024-11-07What’s an Eclipse project?
2024-11-06Progress and Release Reviews of an Eclipse Project
2024-10-28Research @ Eclipse
2024-10-28Thank You For An Incredible OCX 2024!
2024-10-24Check the Day 3 highlights at OCX!
2024-10-23Let's wrap up Day 2 at OCX 2024!
2024-10-23CRA Standards Making: Understanding Key Standards and Their Production Timeline
2024-10-22Video blog "travel with me to OCX 2024"