Skip to content

Commit 30356e0

Browse files
committed
🏩 fix page nav, remove commented out section 🏩
1 parent 0dc399a commit 30356e0

File tree

1 file changed

+0
-42
lines changed

1 file changed

+0
-42
lines changed

docs/3-revenge-of-the-automated-testing/7a-jenkins.md

-42
Original file line numberDiff line numberDiff line change
@@ -92,45 +92,3 @@
9292
<p class="tip">We should have broken the pipeline and fix these violations in order to continue to our pipeline. Please refer _Here Be Dragons_ section for it.</p>
9393
9494
![acs-pet-battle-violations](images/acs-pet-battle-violations.png)
95-
<!--
96-
## Breaking the Build
97-
98-
Let's run through a scenario where we break/fix the build using a build policy violation.
99-
100-
1. Let's try breaking a *Build Policy* within ACS by triggering the *Build* policy we enabled earlier.
101-
102-
2. Edit the `pet-battle-api/Dockerfile` and add the following line right above last line `CMD`:
103-
104-
```bash
105-
EXPOSE 22
106-
```
107-
108-
3. Check in this change and watch the build that is triggered.
109-
110-
```bash
111-
# git add, commit, push your changes..
112-
cd /projects/pet-battle
113-
git add .
114-
git commit -m "🐉 Expose port 22 🐉"
115-
git push
116-
```
117-
118-
4. This should now fail on the image scanning stage:
119-
120-
![images/acs-image-fail.png](images/acs-image-fail.png)
121-
122-
5. Back in ACS we can also see the failure in the *Violations* view.
123-
124-
![images/acs-violations.png](images/acs-violations.png)
125-
126-
6. Remove the `EXPOSE 22` from the `Dockerfile` and check it in to make the build pass.
127-
128-
```bash
129-
cd /project/pet-battle
130-
git add .
131-
git commit -m "🐧 FIX - Security violation, remove port 22 exposure 🐧"
132-
git push
133-
```
134-
135-
🪄 Observe the **pet-battle** pipeline running successfully again.
136-
-->

0 commit comments

Comments
 (0)