|
| 1 | +package: |
| 2 | + name: sealed-secrets |
| 3 | + version: 0.28.0 |
| 4 | + epoch: 0 |
| 5 | + description: A Kubernetes controller and tool for one-way encrypted Secrets |
| 6 | + copyright: |
| 7 | + - license: Apache-2.0 |
| 8 | + |
| 9 | +pipeline: |
| 10 | + - uses: git-checkout |
| 11 | + with: |
| 12 | + repository: https://github.com/bitnami-labs/sealed-secrets |
| 13 | + tag: v${{package.version}} |
| 14 | + expected-commit: 6b1b331a2cd3a58569ce4d819a7cabc59c0a3e50 |
| 15 | + |
| 16 | + - uses: go/bump |
| 17 | + with: |
| 18 | + deps: |- |
| 19 | + golang.org/x/crypto@v0.35.0 |
| 20 | + golang.org/x/oauth2@v0.27.0 |
| 21 | + golang.org/x/net@v0.36.0 |
| 22 | +
|
| 23 | + - uses: go/build |
| 24 | + with: |
| 25 | + packages: ./cmd/controller |
| 26 | + output: controller |
| 27 | + ldflags: -X main.VERSION=${{package.version}} |
| 28 | + |
| 29 | +subpackages: |
| 30 | + - name: ${{package.name}}-kubeseal |
| 31 | + dependencies: |
| 32 | + provides: |
| 33 | + - kubeseal=${{package.full-version}} |
| 34 | + pipeline: |
| 35 | + - uses: go/build |
| 36 | + with: |
| 37 | + packages: ./cmd/kubeseal |
| 38 | + output: kubeseal |
| 39 | + ldflags: -X main.VERSION=${{package.version}} |
| 40 | + test: |
| 41 | + pipeline: |
| 42 | + - runs: | |
| 43 | + kubeseal --version | grep ${{package.version}} |
| 44 | +
|
| 45 | + - name: ${{package.name}}-kubeseal-bitnami-compat |
| 46 | + description: "compat package with bitnami/sealed-secrets-kubeseal image" |
| 47 | + pipeline: |
| 48 | + - runs: | |
| 49 | + mkdir -p ${{targets.contextdir}}/opt/bitnami/sealed-secrets-kubeseal/bin/ |
| 50 | + ln -s /usr/bin/kubeseal ${{targets.contextdir}}/opt/bitnami/sealed-secrets-kubeseal/bin/kubeseal |
| 51 | + ln -s /usr/bin/kubeseal ${{targets.contextdir}}/kubeseal |
| 52 | + test: |
| 53 | + environment: |
| 54 | + contents: |
| 55 | + packages: |
| 56 | + - ${{package.name}}-kubeseal |
| 57 | + pipeline: |
| 58 | + - runs: | |
| 59 | + stat /opt/bitnami/sealed-secrets-kubeseal/bin/kubeseal |
| 60 | + stat /kubeseal |
| 61 | + /opt/bitnami/sealed-secrets-kubeseal/bin/kubeseal --version | grep ${{package.version}} |
| 62 | +
|
| 63 | + - name: ${{package.name}}-bitnami-compat |
| 64 | + description: "compat package with bitnami/sealed-secrets-controller image" |
| 65 | + pipeline: |
| 66 | + - runs: | |
| 67 | + mkdir -p ${{targets.contextdir}}/opt/bitnami/sealed-secrets-controller/bin/ |
| 68 | + ln -s /usr/bin/controller ${{targets.contextdir}}/opt/bitnami/sealed-secrets-controller/bin/controller |
| 69 | + ln -s /usr/bin/controller ${{targets.contextdir}}/controller |
| 70 | + test: |
| 71 | + environment: |
| 72 | + contents: |
| 73 | + packages: |
| 74 | + - ${{package.name}} |
| 75 | + pipeline: |
| 76 | + - runs: | |
| 77 | + stat /opt/bitnami/sealed-secrets-controller/bin/controller |
| 78 | + stat /controller |
| 79 | + /opt/bitnami/sealed-secrets-controller/bin/controller --version | grep ${{package.version}} |
| 80 | +
|
| 81 | +update: |
| 82 | + enabled: true |
| 83 | + github: |
| 84 | + identifier: bitnami-labs/sealed-secrets |
| 85 | + strip-prefix: v |
| 86 | + |
| 87 | +# only passes with docker runner |
| 88 | +# MELANGE_EXTRA_OPTS="--runner docker" make test/sealed-secrets |
| 89 | +test: |
| 90 | + environment: |
| 91 | + environment: |
| 92 | + KUBERNETES_SERVICE_HOST: "127.0.0.1" |
| 93 | + KUBERNETES_SERVICE_PORT: 32764 |
| 94 | + pipeline: |
| 95 | + - name: version test |
| 96 | + runs: | |
| 97 | + controller --version | grep ${{package.version}} |
| 98 | + - uses: test/kwok/cluster |
| 99 | + - uses: test/daemon-check-output |
| 100 | + with: |
| 101 | + start: /usr/bin/controller |
| 102 | + setup: | |
| 103 | + mkdir -p /var/run/secrets/kubernetes.io/serviceaccount |
| 104 | + CA=$(kubectl config view --raw -o jsonpath='{.clusters[0].cluster.certificate-authority}') |
| 105 | + cp $CA /var/run/secrets/kubernetes.io/serviceaccount/ca.crt |
| 106 | + kubectl create serviceaccount default |
| 107 | + kubectl create token default > /var/run/secrets/kubernetes.io/serviceaccount/token |
| 108 | + kubectl create role secrets-admin --verb='*' --resource=secrets |
| 109 | + kubectl create rolebinding default-secrets-admin-binding --role=secrets-admin --serviceaccount=default:default |
| 110 | + timeout: 30 |
| 111 | + expected_output: | |
| 112 | + Starting sealed-secrets controller |
| 113 | + Searching for existing private keys |
| 114 | + New key written |
| 115 | + HTTP server serving |
| 116 | + HTTP metrics server serving |
0 commit comments