Andrei Gherzan de9bfd04d5 ci: Fix dco-check job with newer git versions
Due to https://nvd.nist.gov/vuln/detail/cve-2022-24765, git introduced a
feature where without explicitly allowing it, it won't parse or consider
hooks that are owned by another git user while erroring out with:

  fatal: detected dubious ownership in repository at [...]

This won't be an issue in our setup due to how we guard the code via PRs
so we configure git to avoid this check.

Signed-off-by: Andrei Gherzan <andrei@gherzan.com>
2022-11-08 08:21:47 +00:00
..
2022-02-19 09:27:59 +00:00

Docker images for CI

Each directory contains the files for a docker image.

Building an image

When building a docker image, the build context is expected to be where this README.md file resides. This means that building the images will require passing the appropriate -f argument.

Here is an example for building the dco-check image:

docker build . -f dco-check/Dockerfile -t dco-check