Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 1.0.gamma #191

Closed
wants to merge 67 commits into from
Closed

Release 1.0.gamma #191

wants to merge 67 commits into from

Conversation

Gregory-Pereira
Copy link
Contributor

/cc @sallyom force push rejected for protected branch

bouskaJ and others added 30 commits November 10, 2023 10:38
* Update resources to work with image SHAs

* Use final image names

* Update images
* Update resources to work with image SHAs (#85)

* Nightly metrics (#81)

* Added nightly cronjob template
Updated templates based on the segment-backup-job repo

* adding job for post-install and moving job to cronjob for nightly metrics

* chore: update segment-backup-job sha

Signed-off-by: Lance Ball <[email protected]>

* adding job for post-install and moving job to cronjob for nightly metrics

---------

Signed-off-by: Lance Ball <[email protected]>
Co-authored-by: greg pereira <[email protected]>
Co-authored-by: Lance Ball <[email protected]>

---------

Signed-off-by: Lance Ball <[email protected]>
Co-authored-by: Jan Bouska <[email protected]>
Co-authored-by: Tommy Dalton <[email protected]>
Co-authored-by: greg pereira <[email protected]>
Co-authored-by: red-hat-trusted-app-pipeline <123456+red-hat-trusted-app-pipeline[bot]@users.noreply.github.com>
EC failures are unrelated. Merging.
Co-authored-by: red-hat-trusted-app-pipeline <123456+red-hat-trusted-app-pipeline[bot]@users.noreply.github.com>
Signed-off-by: Sally O'Malley <[email protected]>

rh-pre-commit.version: 2.0.3
rh-pre-commit.check-secrets: ENABLED
* Allow for database credentials to be provided
* default values chart that shows more options avail
---------

Signed-off-by: Ryan Cook <[email protected]>
Co-authored-by: red-hat-trusted-app-pipeline <123456+red-hat-trusted-app-pipeline[bot]@users.noreply.github.com>
* enable keycloak install with binary
* enable cert setup
* configure pull secret
* update pull secret logic, add rekor/fulcio secret
* add helm installation
* handle backup segment job
Signed-off-by: Sally O'Malley <[email protected]>

rh-pre-commit.version: 2.0.3
rh-pre-commit.check-secrets: ENABLED
rh-pre-commit.version: 2.0.3
rh-pre-commit.check-secrets: ENABLED
rh-pre-commit.version: 2.0.3
rh-pre-commit.check-secrets: ENABLED
rh-pre-commit.version: 2.0.3
rh-pre-commit.check-secrets: ENABLED
rh-pre-commit.version: 2.0.3
rh-pre-commit.check-secrets: ENABLED
rh-pre-commit.version: 2.0.3
rh-pre-commit.check-secrets: ENABLED
Signed-off-by: Sally O'Malley <[email protected]>

rh-pre-commit.version: 2.0.3
rh-pre-commit.check-secrets: ENABLED
Co-authored-by: red-hat-trusted-app-pipeline <123456+red-hat-trusted-app-pipeline[bot]@users.noreply.github.com>
* Updating CLI Server to have more architectures

* Fixing cli donload for cosign
JasonPowr and others added 24 commits January 24, 2024 10:55
* Adding the ability to opt in or out of using Rekor-Search-Ui

* Small Adjustments for Rekor-Search

* Chart Version Bump

* Remove Ingress

* Removing Extra references to ingress present in other files

* Updating Missing Image

* Final Teaks to ci

---------

Co-authored-by: tommyd450 <[email protected]>
* Updating ClientServer Cosign Linux Name for more unified naming standard

* Adding Cli Download Entries for the Enterprise Contracts

* Changing ec name to lowercase

* Chart Bump

* Removing Extra Line

* Updating Ec description and name

---------

Co-authored-by: tommyd450 <[email protected]>
In the #160 PR the binary cli tools are fetched using `ec image
extract`, hence we'll need the buildah task to allow network access.

This should be reverted once we have a better solution for the "too
many base images overflow tekton task result" problem.
This avoids the BASE_IMAGE_DIGESTS Tekton task result in the Konflux
build pipeline result exceeding the maximum size and causing the
build to fail.
Since the `oc image extract` technique introduced in #160 has the
side-effect of making the automatically generated source container
images not include all the sources for each binary, lets add some
commentary to the Dockerfile to explain where to look for those
additional source containers.
* Updating ClientServer Cosign Linux Name for more unified naming standard

* Updating CLI Images to that of the Candidates

* Updating mv command

* Removing duplicate cosign entry

---------

Co-authored-by: tommyd450 <[email protected]>
Rather than copy the files and then move them, we can copy them
directly to their required location and filename.

Also add some vertical alignment to the long commands for improved
readability.
* Updating with Current Snapshots

* bumping chart version to resolve linting

* Updating with Registry Coordinates

* Final Registry Image Updates

* Chart Bump

---------

Co-authored-by: tommyd450 <[email protected]>
Co-authored-by: greg pereira <[email protected]>
Co-authored-by: tommyd450 <[email protected]>
* swapping in productized version of redis

* update redis image

* bump chart version

---------
* Updating Tuf Roots

* Chart Bump

---------

Co-authored-by: tommyd450 <[email protected]>
Co-authored-by: tommyd450 <[email protected]>
* update sigstore/scaffold version, chart version and  images in values.yaml

Signed-off-by: sallyom <[email protected]>
* chore: update chart w/SHAs from release snapshots

Uses release snapshot SHAs from TP2

Signed-off-by: Lance Ball <[email protected]>

* Removing Typo from chart.yaml

* Chart Bump

---------

Signed-off-by: Lance Ball <[email protected]>
Co-authored-by: Tommy Dalton <[email protected]>
Co-authored-by: tommyd450 <[email protected]>
@openshift-merge-robot
Copy link

PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Copy link

openshift-ci bot commented Feb 26, 2024

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: Gregory-Pereira
Once this PR has been reviewed and has the lgtm label, please assign jasonpowr for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link

openshift-ci bot commented Feb 26, 2024

@Gregory-Pereira: GitHub didn't allow me to request PR reviews from the following users: rejected, for, protected, branch, force, push.

Note that only securesign members and repo collaborators can review this PR, and authors cannot review their own PRs.

In response to this:

/cc @sallyom force push rejected for protected branch

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.