-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release 1.0.gamma #191
Release 1.0.gamma #191
Conversation
* Update resources to work with image SHAs * Use final image names * Update images
* Update resources to work with image SHAs (#85) * Nightly metrics (#81) * Added nightly cronjob template Updated templates based on the segment-backup-job repo * adding job for post-install and moving job to cronjob for nightly metrics * chore: update segment-backup-job sha Signed-off-by: Lance Ball <[email protected]> * adding job for post-install and moving job to cronjob for nightly metrics --------- Signed-off-by: Lance Ball <[email protected]> Co-authored-by: greg pereira <[email protected]> Co-authored-by: Lance Ball <[email protected]> --------- Signed-off-by: Lance Ball <[email protected]> Co-authored-by: Jan Bouska <[email protected]> Co-authored-by: Tommy Dalton <[email protected]> Co-authored-by: greg pereira <[email protected]>
Co-authored-by: red-hat-trusted-app-pipeline <[email protected]>
Co-authored-by: red-hat-trusted-app-pipeline <123456+red-hat-trusted-app-pipeline[bot]@users.noreply.github.com>
EC failures are unrelated. Merging.
EC failures are unrelated. Merging.
Co-authored-by: red-hat-trusted-app-pipeline <123456+red-hat-trusted-app-pipeline[bot]@users.noreply.github.com>
Signed-off-by: Sally O'Malley <[email protected]> rh-pre-commit.version: 2.0.3 rh-pre-commit.check-secrets: ENABLED
* implementing the tas-intializer job
* Allow for database credentials to be provided * default values chart that shows more options avail --------- Signed-off-by: Ryan Cook <[email protected]>
Co-authored-by: red-hat-trusted-app-pipeline <123456+red-hat-trusted-app-pipeline[bot]@users.noreply.github.com>
* enable keycloak install with binary * enable cert setup * configure pull secret * update pull secret logic, add rekor/fulcio secret * add helm installation * handle backup segment job
Signed-off-by: Sally O'Malley <[email protected]> rh-pre-commit.version: 2.0.3 rh-pre-commit.check-secrets: ENABLED
rh-pre-commit.version: 2.0.3 rh-pre-commit.check-secrets: ENABLED
rh-pre-commit.version: 2.0.3 rh-pre-commit.check-secrets: ENABLED
rh-pre-commit.version: 2.0.3 rh-pre-commit.check-secrets: ENABLED
rh-pre-commit.version: 2.0.3 rh-pre-commit.check-secrets: ENABLED
rh-pre-commit.version: 2.0.3 rh-pre-commit.check-secrets: ENABLED
Signed-off-by: Sally O'Malley <[email protected]> rh-pre-commit.version: 2.0.3 rh-pre-commit.check-secrets: ENABLED
Co-authored-by: red-hat-trusted-app-pipeline <123456+red-hat-trusted-app-pipeline[bot]@users.noreply.github.com>
* Updating CLI Server to have more architectures * Fixing cli donload for cosign
Co-authored-by: JasonPowr <[email protected]>
Co-authored-by: JasonPowr <[email protected]>
* Adding the ability to opt in or out of using Rekor-Search-Ui * Small Adjustments for Rekor-Search * Chart Version Bump * Remove Ingress * Removing Extra references to ingress present in other files * Updating Missing Image * Final Teaks to ci --------- Co-authored-by: tommyd450 <[email protected]>
* Updating ClientServer Cosign Linux Name for more unified naming standard * Adding Cli Download Entries for the Enterprise Contracts * Changing ec name to lowercase * Chart Bump * Removing Extra Line * Updating Ec description and name --------- Co-authored-by: tommyd450 <[email protected]>
In the #160 PR the binary cli tools are fetched using `ec image extract`, hence we'll need the buildah task to allow network access. This should be reverted once we have a better solution for the "too many base images overflow tekton task result" problem.
This avoids the BASE_IMAGE_DIGESTS Tekton task result in the Konflux build pipeline result exceeding the maximum size and causing the build to fail.
Since the `oc image extract` technique introduced in #160 has the side-effect of making the automatically generated source container images not include all the sources for each binary, lets add some commentary to the Dockerfile to explain where to look for those additional source containers.
* Updating ClientServer Cosign Linux Name for more unified naming standard * Updating CLI Images to that of the Candidates * Updating mv command * Removing duplicate cosign entry --------- Co-authored-by: tommyd450 <[email protected]>
Rather than copy the files and then move them, we can copy them directly to their required location and filename. Also add some vertical alignment to the long commands for improved readability.
* Updating with Current Snapshots * bumping chart version to resolve linting * Updating with Registry Coordinates * Final Registry Image Updates * Chart Bump --------- Co-authored-by: tommyd450 <[email protected]> Co-authored-by: greg pereira <[email protected]>
Co-authored-by: tommyd450 <[email protected]>
* swapping in productized version of redis * update redis image * bump chart version ---------
Co-authored-by: tommyd450 <[email protected]>
* Updating Tuf Roots * Chart Bump --------- Co-authored-by: tommyd450 <[email protected]>
Co-authored-by: JasonPowr <[email protected]>
Co-authored-by: tommyd450 <[email protected]>
* update sigstore/scaffold version, chart version and images in values.yaml Signed-off-by: sallyom <[email protected]>
* chore: update chart w/SHAs from release snapshots Uses release snapshot SHAs from TP2 Signed-off-by: Lance Ball <[email protected]> * Removing Typo from chart.yaml * Chart Bump --------- Signed-off-by: Lance Ball <[email protected]> Co-authored-by: Tommy Dalton <[email protected]> Co-authored-by: tommyd450 <[email protected]>
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: Gregory-Pereira The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@Gregory-Pereira: GitHub didn't allow me to request PR reviews from the following users: rejected, for, protected, branch, force, push. Note that only securesign members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/cc @sallyom force push rejected for protected branch