removing kubernetes stuff
This commit is contained in:
@@ -1,7 +0,0 @@
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: git-secret
|
||||
type: Opaque
|
||||
data:
|
||||
token: Nzk1YTFhMGQxMWQ0MDJiY2FiOGM3MjkyZDk5ODIyMzg2NDNkM2U3OQo=
|
||||
@@ -1,33 +0,0 @@
|
||||
apiVersion: v1
|
||||
kind: PersistentVolumeClaim
|
||||
metadata:
|
||||
name: tektoncd-workspaces
|
||||
namespace: default
|
||||
spec:
|
||||
accessModes:
|
||||
- ReadWriteMany
|
||||
resources:
|
||||
requests:
|
||||
storage: 40Gi
|
||||
storageClassName: nfs-ssd-ebin02
|
||||
volumeMode: Filesystem
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: PersistentVolume
|
||||
metadata:
|
||||
name: tektoncd-workspaces
|
||||
spec:
|
||||
storageClassName: "nfs-ssd-ebin02"
|
||||
nfs:
|
||||
path: /data/raid1-ssd/k8s-data/tektoncd-workspaces
|
||||
server: ebin02
|
||||
capacity:
|
||||
storage: 40Gi
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
volumeMode: Filesystem
|
||||
persistentVolumeReclaimPolicy: Retain
|
||||
claimRef:
|
||||
kind: PersistentVolumeClaim
|
||||
name: tektoncd-workspaces
|
||||
namespace: default
|
||||
@@ -1,101 +0,0 @@
|
||||
apiVersion: tekton.dev/v1beta1
|
||||
kind: Task
|
||||
metadata:
|
||||
name: git-clone
|
||||
spec:
|
||||
workspaces:
|
||||
- name: output
|
||||
description: The git repo will be cloned onto the volume backing this workspace
|
||||
params:
|
||||
- name: url
|
||||
description: git url to clone
|
||||
type: string
|
||||
default: http://git-ui.lan/chaos/kubernetes.git
|
||||
- name: revision
|
||||
description: git revision to checkout (branch, tag, sha, ref…)
|
||||
type: string
|
||||
default: master
|
||||
- name: refspec
|
||||
description: (optional) git refspec to fetch before checking out revision
|
||||
default: ""
|
||||
- name: submodules
|
||||
description: defines if the resource should initialize and fetch the submodules
|
||||
type: string
|
||||
default: "true"
|
||||
- name: depth
|
||||
description: performs a shallow clone where only the most recent commit(s) will be fetched
|
||||
type: string
|
||||
default: "1"
|
||||
- name: sslVerify
|
||||
description: defines if http.sslVerify should be set to true or false in the global git config
|
||||
type: string
|
||||
default: "true"
|
||||
- name: subdirectory
|
||||
description: subdirectory inside the "output" workspace to clone the git repo into
|
||||
type: string
|
||||
default: ""
|
||||
- name: deleteExisting
|
||||
description: clean out the contents of the repo's destination directory (if it already exists) before trying to clone the repo there
|
||||
type: string
|
||||
default: "true"
|
||||
- name: httpProxy
|
||||
description: git HTTP proxy server for non-SSL requests
|
||||
type: string
|
||||
default: ""
|
||||
- name: httpsProxy
|
||||
description: git HTTPS proxy server for SSL requests
|
||||
type: string
|
||||
default: ""
|
||||
- name: noProxy
|
||||
description: git no proxy - opt out of proxying HTTP/HTTPS requests
|
||||
type: string
|
||||
default: ""
|
||||
results:
|
||||
- name: commit
|
||||
description: The precise commit SHA that was fetched by this Task
|
||||
steps:
|
||||
- name: clone
|
||||
image: gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/git-init:v0.30.2
|
||||
script: |
|
||||
CHECKOUT_DIR="$(workspaces.output.path)/$(params.subdirectory)"
|
||||
|
||||
cleandir() {
|
||||
# Delete any existing contents of the repo directory if it exists.
|
||||
#
|
||||
# We don't just "rm -rf $CHECKOUT_DIR" because $CHECKOUT_DIR might be "/"
|
||||
# or the root of a mounted volume.
|
||||
if [[ -d "$CHECKOUT_DIR" ]] ; then
|
||||
# Delete non-hidden files and directories
|
||||
rm -rf "$CHECKOUT_DIR"/*
|
||||
# Delete files and directories starting with . but excluding ..
|
||||
rm -rf "$CHECKOUT_DIR"/.[!.]*
|
||||
# Delete files and directories starting with .. plus any other character
|
||||
rm -rf "$CHECKOUT_DIR"/..?*
|
||||
fi
|
||||
}
|
||||
|
||||
if [[ "$(params.deleteExisting)" == "true" ]] ; then
|
||||
cleandir
|
||||
fi
|
||||
|
||||
test -z "$(params.httpProxy)" || export HTTP_PROXY=$(params.httpProxy)
|
||||
test -z "$(params.httpsProxy)" || export HTTPS_PROXY=$(params.httpsProxy)
|
||||
test -z "$(params.noProxy)" || export NO_PROXY=$(params.noProxy)
|
||||
|
||||
/ko-app/git-init \
|
||||
-url "$(params.url)" \
|
||||
-revision "$(params.revision)" \
|
||||
-refspec "$(params.refspec)" \
|
||||
-path "$CHECKOUT_DIR" \
|
||||
-sslVerify="$(params.sslVerify)" \
|
||||
-submodules="$(params.submodules)" \
|
||||
-depth "$(params.depth)"
|
||||
cd "$CHECKOUT_DIR"
|
||||
RESULT_SHA="$(git rev-parse HEAD | tr -d '\n')"
|
||||
EXIT_CODE="$?"
|
||||
if [ "$EXIT_CODE" != 0 ]
|
||||
then
|
||||
exit $EXIT_CODE
|
||||
fi
|
||||
# Make sure we don't add a trailing newline to the result!
|
||||
echo -n "$RESULT_SHA" > $(results.commit.path)
|
||||
@@ -1,45 +0,0 @@
|
||||
apiVersion: tekton.dev/v1beta1
|
||||
kind: Pipeline
|
||||
metadata:
|
||||
name: kaniko
|
||||
spec:
|
||||
params:
|
||||
- name: git-url
|
||||
- name: git-revision
|
||||
- name: image-name
|
||||
- name: path-to-image-context
|
||||
- name: path-to-dockerfile
|
||||
workspaces:
|
||||
- name: git-source
|
||||
tasks:
|
||||
- name: fetch-from-git
|
||||
taskRef:
|
||||
name: git-clone
|
||||
params:
|
||||
- name: url
|
||||
value: $(params.git-url)
|
||||
- name: revision
|
||||
value: $(params.git-revision)
|
||||
- name: submodules
|
||||
value: false
|
||||
- subdirectory:
|
||||
value: "source"
|
||||
workspaces:
|
||||
- name: source
|
||||
workspace: git-source
|
||||
- name: build-image
|
||||
taskRef:
|
||||
name: kaniko
|
||||
params:
|
||||
- name: IMAGE
|
||||
value: $(params.image-name)
|
||||
- name: CONTEXT
|
||||
value: $(params.path-to-image-context)
|
||||
- name: DOCKERFILE
|
||||
value: $(params.path-to-dockerfile)
|
||||
workspaces:
|
||||
- name: source
|
||||
workspace: git-source
|
||||
# If you want you can add a Task that uses the IMAGE_DIGEST from the kaniko task
|
||||
# via $(tasks.build-image.results.IMAGE_DIGEST) - this was a feature we hadn't been
|
||||
# able to fully deliver with the Image PipelineResource!
|
||||
@@ -1,78 +0,0 @@
|
||||
apiVersion: tekton.dev/v1beta1
|
||||
kind: Task
|
||||
metadata:
|
||||
name: kaniko
|
||||
labels:
|
||||
app.kubernetes.io/version: "0.5"
|
||||
annotations:
|
||||
tekton.dev/pipelines.minVersion: "0.17.0"
|
||||
tekton.dev/categories: Image Build
|
||||
tekton.dev/tags: image-build
|
||||
tekton.dev/displayName: "Build and upload container image using Kaniko"
|
||||
tekton.dev/platforms: "linux/arm64"
|
||||
spec:
|
||||
description: >-
|
||||
This Task builds source into a container image using Google's kaniko tool.
|
||||
|
||||
Kaniko doesn't depend on a Docker daemon and executes each
|
||||
command within a Dockerfile completely in userspace. This enables
|
||||
building container images in environments that can't easily or
|
||||
securely run a Docker daemon, such as a standard Kubernetes cluster.
|
||||
|
||||
params:
|
||||
- name: IMAGE
|
||||
description: Name (reference) of the image to build.
|
||||
- name: DOCKERFILE
|
||||
description: Path to the Dockerfile to build.
|
||||
default: ./Dockerfile
|
||||
- name: CONTEXT
|
||||
description: The build context used by Kaniko.
|
||||
default: ./
|
||||
- name: EXTRA_ARGS
|
||||
type: array
|
||||
default: []
|
||||
- name: BUILDER_IMAGE
|
||||
description: The image on which builds will run (default is v1.5.1)
|
||||
default: gcr.io/kaniko-project/executor:v1.9.1
|
||||
workspaces:
|
||||
- name: source
|
||||
description: Holds the context and docker file
|
||||
- name: dockerconfig
|
||||
description: Includes a docker `config.json`
|
||||
optional: true
|
||||
mountPath: /kaniko/.docker
|
||||
results:
|
||||
- name: IMAGE-DIGEST
|
||||
description: Digest of the image just built.
|
||||
|
||||
steps:
|
||||
- name: debug
|
||||
workingDir: $(workspaces.source.path)
|
||||
image: bash
|
||||
script: |
|
||||
#!/usr/bin/env bash
|
||||
export
|
||||
pwd
|
||||
mount
|
||||
ls -al
|
||||
- name: build-and-push
|
||||
workingDir: $(workspaces.source.path)
|
||||
image: $(params.BUILDER_IMAGE)
|
||||
args:
|
||||
- $(params.EXTRA_ARGS[*])
|
||||
- --dockerfile=$(params.DOCKERFILE)
|
||||
- --context=$(params.CONTEXT) # The user does not need to care the workspace and the source.
|
||||
- --destination=$(params.IMAGE)
|
||||
- --digest-file=/tekton/results/IMAGE-DIGEST
|
||||
- --snapshotMode=redo
|
||||
- --single-snapshot
|
||||
- --use-new-run
|
||||
- --skip-tls-verify
|
||||
- --cache
|
||||
- --cache-copy-layers
|
||||
- --cache-dir=/workspace/cache
|
||||
# kaniko assumes it is running as root, which means this example fails on platforms
|
||||
# that default to run containers as random uid (like OpenShift). Adding this securityContext
|
||||
# makes it explicit that it needs to run as root.
|
||||
securityContext:
|
||||
runAsUser: 0
|
||||
Reference in New Issue
Block a user