Skip to content

Commit 50e5f17

Browse files
kranurag7Dentraxwojciechka
authored
add sealed-secrets package (#44219)
adds sealed-secrets and sealed-secrets-kubeseal with provides:kubeseal via this patch. --------- Signed-off-by: kranurag7 <81210977+kranurag7@users.noreply.github.com> Co-authored-by: Furkan Türkal <furkan.turkal@hotmail.com> Co-authored-by: Wojciech Kocjan <wojciech.kocjan@chainguard.dev>
1 parent 80ec468 commit 50e5f17

File tree

1 file changed

+116
-0
lines changed

1 file changed

+116
-0
lines changed

sealed-secrets.yaml

+116
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
package:
2+
name: sealed-secrets
3+
version: 0.28.0
4+
epoch: 0
5+
description: A Kubernetes controller and tool for one-way encrypted Secrets
6+
copyright:
7+
- license: Apache-2.0
8+
9+
pipeline:
10+
- uses: git-checkout
11+
with:
12+
repository: https://github.com/bitnami-labs/sealed-secrets
13+
tag: v${{package.version}}
14+
expected-commit: 6b1b331a2cd3a58569ce4d819a7cabc59c0a3e50
15+
16+
- uses: go/bump
17+
with:
18+
deps: |-
19+
golang.org/x/crypto@v0.35.0
20+
golang.org/x/oauth2@v0.27.0
21+
golang.org/x/net@v0.36.0
22+
23+
- uses: go/build
24+
with:
25+
packages: ./cmd/controller
26+
output: controller
27+
ldflags: -X main.VERSION=${{package.version}}
28+
29+
subpackages:
30+
- name: ${{package.name}}-kubeseal
31+
dependencies:
32+
provides:
33+
- kubeseal=${{package.full-version}}
34+
pipeline:
35+
- uses: go/build
36+
with:
37+
packages: ./cmd/kubeseal
38+
output: kubeseal
39+
ldflags: -X main.VERSION=${{package.version}}
40+
test:
41+
pipeline:
42+
- runs: |
43+
kubeseal --version | grep ${{package.version}}
44+
45+
- name: ${{package.name}}-kubeseal-bitnami-compat
46+
description: "compat package with bitnami/sealed-secrets-kubeseal image"
47+
pipeline:
48+
- runs: |
49+
mkdir -p ${{targets.contextdir}}/opt/bitnami/sealed-secrets-kubeseal/bin/
50+
ln -s /usr/bin/kubeseal ${{targets.contextdir}}/opt/bitnami/sealed-secrets-kubeseal/bin/kubeseal
51+
ln -s /usr/bin/kubeseal ${{targets.contextdir}}/kubeseal
52+
test:
53+
environment:
54+
contents:
55+
packages:
56+
- ${{package.name}}-kubeseal
57+
pipeline:
58+
- runs: |
59+
stat /opt/bitnami/sealed-secrets-kubeseal/bin/kubeseal
60+
stat /kubeseal
61+
/opt/bitnami/sealed-secrets-kubeseal/bin/kubeseal --version | grep ${{package.version}}
62+
63+
- name: ${{package.name}}-bitnami-compat
64+
description: "compat package with bitnami/sealed-secrets-controller image"
65+
pipeline:
66+
- runs: |
67+
mkdir -p ${{targets.contextdir}}/opt/bitnami/sealed-secrets-controller/bin/
68+
ln -s /usr/bin/controller ${{targets.contextdir}}/opt/bitnami/sealed-secrets-controller/bin/controller
69+
ln -s /usr/bin/controller ${{targets.contextdir}}/controller
70+
test:
71+
environment:
72+
contents:
73+
packages:
74+
- ${{package.name}}
75+
pipeline:
76+
- runs: |
77+
stat /opt/bitnami/sealed-secrets-controller/bin/controller
78+
stat /controller
79+
/opt/bitnami/sealed-secrets-controller/bin/controller --version | grep ${{package.version}}
80+
81+
update:
82+
enabled: true
83+
github:
84+
identifier: bitnami-labs/sealed-secrets
85+
strip-prefix: v
86+
87+
# only passes with docker runner
88+
# MELANGE_EXTRA_OPTS="--runner docker" make test/sealed-secrets
89+
test:
90+
environment:
91+
environment:
92+
KUBERNETES_SERVICE_HOST: "127.0.0.1"
93+
KUBERNETES_SERVICE_PORT: 32764
94+
pipeline:
95+
- name: version test
96+
runs: |
97+
controller --version | grep ${{package.version}}
98+
- uses: test/kwok/cluster
99+
- uses: test/daemon-check-output
100+
with:
101+
start: /usr/bin/controller
102+
setup: |
103+
mkdir -p /var/run/secrets/kubernetes.io/serviceaccount
104+
CA=$(kubectl config view --raw -o jsonpath='{.clusters[0].cluster.certificate-authority}')
105+
cp $CA /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
106+
kubectl create serviceaccount default
107+
kubectl create token default > /var/run/secrets/kubernetes.io/serviceaccount/token
108+
kubectl create role secrets-admin --verb='*' --resource=secrets
109+
kubectl create rolebinding default-secrets-admin-binding --role=secrets-admin --serviceaccount=default:default
110+
timeout: 30
111+
expected_output: |
112+
Starting sealed-secrets controller
113+
Searching for existing private keys
114+
New key written
115+
HTTP server serving
116+
HTTP metrics server serving

0 commit comments

Comments
 (0)