Compare commits
478 Commits
api/v1.0.0
...
main
Author | SHA1 | Date |
---|---|---|
|
124402b53a | |
|
8e90ab8008 | |
|
8c1d87ba6a | |
|
8479377cd7 | |
|
ebee7880e7 | |
|
9f784c5e9f | |
|
07837f603c | |
|
ee8981f35d | |
|
40a75725dd | |
|
f1cfd9f0c8 | |
|
f54038e15d | |
|
6efc3ebe0a | |
|
9eb8ca73ca | |
|
24e54da3cf | |
|
ff76a91987 | |
|
f2db6a2db6 | |
|
ada569f859 | |
|
1d32962c17 | |
|
e537b99a17 | |
|
8303b0854d | |
|
55be958932 | |
|
c25690c4c1 | |
|
0d6ab9f762 | |
|
413118e9a7 | |
|
98adddbf2e | |
|
92070be338 | |
|
c54d9f6bec | |
|
d775ed3a19 | |
|
ac963f92f4 | |
|
d157045895 | |
|
361a28eed9 | |
|
690c8c8a74 | |
|
88ccb5a3d5 | |
|
8079722607 | |
|
3ac784dbc8 | |
|
a5e315e923 | |
|
59bbc527b6 | |
|
e2794590cd | |
|
a8edbb96d1 | |
|
60afb73327 | |
|
2d89eb6010 | |
|
35fd6c158b | |
|
2437aaf32e | |
|
b715ca0e60 | |
|
6c7da05677 | |
|
12628b8187 | |
|
cb67f6f015 | |
|
6b139adfaa | |
|
860d5f8339 | |
|
42b9036bf3 | |
|
dc0e5853c0 | |
|
6c001f2862 | |
|
c353f1e532 | |
|
4ad6f256f6 | |
|
12b3acbaaa | |
|
8b6f4bc6e9 | |
|
0837a4217a | |
|
a7e4927fed | |
|
444b8d265e | |
|
adfde39e9a | |
|
66e0c439c0 | |
|
9ce7db7d96 | |
|
676fc6107f | |
|
5d2bcf93ff | |
|
fc2a95e2d5 | |
|
3b0de408cf | |
|
f82ae38844 | |
|
cc89da1d28 | |
|
6790333116 | |
|
947be82e71 | |
|
230b55fde5 | |
|
ac22c113a1 | |
|
281d998261 | |
|
c371376808 | |
|
07a74c8576 | |
|
f329ea1693 | |
|
e4546048c8 | |
|
bb09c69eb1 | |
|
4a9a093a21 | |
|
ea10ba4495 | |
|
5e620a5b25 | |
|
6455cfec59 | |
|
59676860b8 | |
|
eccdbad35a | |
|
550576e48b | |
|
6022571c75 | |
|
a284bfb889 | |
|
10a5e869f6 | |
|
c2e4ed653f | |
|
c41cb827c5 | |
|
aa1a99b3af | |
|
c38ebabf1b | |
|
a87337c3c5 | |
|
5ab5f14341 | |
|
64ee754432 | |
|
ccfbf44613 | |
|
ca407130a3 | |
|
d36aa14d77 | |
|
9d65ff8c76 | |
|
9974a49b8a | |
|
61fa7da3b8 | |
|
4d03cf05c1 | |
|
3791888141 | |
|
53cca793b9 | |
|
933ef1f1d7 | |
|
49770ea4cc | |
|
29080cbd8c | |
|
681573b3e6 | |
|
443c96a788 | |
|
d7bad03364 | |
|
a77f044558 | |
|
d4f22ebe54 | |
|
527ec3ed66 | |
|
cecc4452fa | |
|
02ab2ebecd | |
|
72ae7db334 | |
|
3d87349536 | |
|
1d1a06b24a | |
|
8e39f7bf0f | |
|
0d28f0f240 | |
|
1899e6c6e1 | |
|
0add02b9cb | |
|
67c86a01c0 | |
|
9ad0b15dff | |
|
8d40190498 | |
|
2b44187c23 | |
|
aabb41fc5d | |
|
eedc8a7516 | |
|
c00854e7d7 | |
|
46f6cf80f4 | |
|
1e9d28b251 | |
|
c2ae692fc0 | |
|
7895c43d04 | |
|
519dac1be2 | |
|
6c91a199fd | |
|
55474461ba | |
|
ce4432de3a | |
|
5cc9e27484 | |
|
2b870e872e | |
|
99c2f20697 | |
|
5d30ea57d1 | |
|
e34bc86000 | |
|
0be2bcea4a | |
|
720639dd7e | |
|
937837b36e | |
|
a21e977cad | |
|
a1a33f2add | |
|
ad38b1cb84 | |
|
e70e5b36a3 | |
|
d1cec06972 | |
|
909fae7be3 | |
|
0007a71e6c | |
|
4ff4145b42 | |
|
a490f79296 | |
|
5e0b7f8329 | |
|
55e08776a3 | |
|
83fbfeee89 | |
|
458d7e23d8 | |
|
4a02b3faf3 | |
|
882f6a7963 | |
|
dfcd4ed30a | |
|
e81120ae25 | |
|
780954fa6a | |
|
99792deb25 | |
|
fc663de87f | |
|
f0f9b032b0 | |
|
639f074d91 | |
|
501c03733f | |
|
31aab514fa | |
|
3e512c54b6 | |
|
3fded0b0e4 | |
|
5de415791f | |
|
49c0498c4d | |
|
e9f5628ecc | |
|
065268ef6e | |
|
440b9da8d8 | |
|
f21f65eca7 | |
|
73b1b4b032 | |
|
c1e6bc5025 | |
|
fa5cebbcd2 | |
|
b810013ab5 | |
|
76cc820d31 | |
|
f8ace6f930 | |
|
1837d1c2e4 | |
|
4f471c7dab | |
|
b2daff1783 | |
|
eaaa5113ef | |
|
45c50c7894 | |
|
f445fd2454 | |
|
224d3deab4 | |
|
26dcfd1aa1 | |
|
8f462db168 | |
|
d1797fdb47 | |
|
8c46760606 | |
|
d74d31b363 | |
|
e70c61c2f7 | |
|
11f5cafe96 | |
|
256064606d | |
|
5e0be4019b | |
|
7aa669055c | |
|
877febcd40 | |
|
1506e23075 | |
|
ee0c3bcec2 | |
|
4c209ef126 | |
|
4de0503b63 | |
|
68cae5daa8 | |
|
b51dd326ca | |
|
94b64517f0 | |
|
e5e210e807 | |
|
d48a9e0f28 | |
|
61f37d05b6 | |
|
97a9b88d45 | |
|
02de663f5d | |
|
9ac8b7fe80 | |
|
1afa6a89bf | |
|
19d8d55dca | |
|
d7ad5ca7cd | |
|
a2258023fc | |
|
42307e2ffc | |
|
40c7bc6c5a | |
|
30679fe6ff | |
|
936a5b8552 | |
|
ce413533dd | |
|
f3262b15a4 | |
|
d40e4002e0 | |
|
8e8acd2c8b | |
|
5939682eff | |
|
5f4b1424d4 | |
|
e4f5aaef85 | |
|
a5539050ed | |
|
d7edcd4e4c | |
|
402cc53f38 | |
|
003dbd944b | |
|
92a078585e | |
|
a3f081f9c4 | |
|
c668ed3ea5 | |
|
eb9c6c7347 | |
|
d1793df442 | |
|
76813d8a0d | |
|
ec91d8ad2c | |
|
22af020dc4 | |
|
e487f84d30 | |
|
da6318c22e | |
|
b3345ff518 | |
|
9b508ba44e | |
|
ddadd97262 | |
|
8deb2343e0 | |
|
738101481e | |
|
efdfc0cf19 | |
|
95dca6d384 | |
|
234fa658ec | |
|
fc1d20e6e1 | |
|
717ce6ee22 | |
|
04cd9398fd | |
|
dfb2dcc22f | |
|
30a0d86d06 | |
|
e3d2d7b99f | |
|
edd1f875cf | |
|
6e72247aaf | |
|
4d474e96ed | |
|
e8ad8de868 | |
|
86ab9adaa9 | |
|
788d6e0c1a | |
|
ba308c5a39 | |
|
bc33fc9573 | |
|
9917b953a9 | |
|
0ced44094a | |
|
819eeb900b | |
|
84c446aa87 | |
|
96a772293a | |
|
f2014ab988 | |
|
bd536e1850 | |
|
250f620fbe | |
|
68a09b1835 | |
|
6c54f6839c | |
|
23ee5a66ec | |
|
05614b1a96 | |
|
7d672d3da5 | |
|
ec4554d897 | |
|
5d296bce24 | |
|
9f97c19a7a | |
|
863eb20947 | |
|
abdfab3dde | |
|
3f2fa66f6f | |
|
ebd8699210 | |
|
5ba36c34e8 | |
|
e3a3b00fb0 | |
|
17ea2419dc | |
|
1f8978085e | |
|
4f8c0cc509 | |
|
564580049a | |
|
2caf1dd4dd | |
|
97d20097e5 | |
|
644261e5f8 | |
|
04cec3fc7a | |
|
1edb95d764 | |
|
6b11f7766b | |
|
4a00021b89 | |
|
af9368295e | |
|
205a0b4fea | |
|
364ce9f98a | |
|
87fd394ce4 | |
|
77cf93394c | |
|
2009190603 | |
|
bab4411abe | |
|
6b055f52b1 | |
|
0c2376e88f | |
|
53be775d48 | |
|
9812910b41 | |
|
1f697348af | |
|
a23791da6c | |
|
182c51b564 | |
|
21e75ffb13 | |
|
8f86fc425f | |
|
1fb27b810c | |
|
ef135a141f | |
|
768968d061 | |
|
dff4c265b2 | |
|
3f04beaf4f | |
|
5962420fa8 | |
|
f33becf504 | |
|
96e02159c6 | |
|
5e11b653da | |
|
bc61228dcf | |
|
968df5e84d | |
|
08729e83b9 | |
|
ec296d96fc | |
|
b760a4167c | |
|
f6aa02481e | |
|
d0e3d4cd08 | |
|
108fa84a51 | |
|
636e0d3e7c | |
|
364fa96145 | |
|
593db54f29 | |
|
55a8c9df6d | |
|
cbb475697b | |
|
6dcf08b21e | |
|
d02c5ff505 | |
|
1eaa29c618 | |
|
b808e9e0c4 | |
|
bc3859dfb4 | |
|
548de2f51a | |
|
1854a9f9dd | |
|
2e50f41755 | |
|
6c67d3811c | |
|
815f3f0530 | |
|
ef8de4ddf4 | |
|
f2d4f07e01 | |
|
383b402b3c | |
|
506d03d3e9 | |
|
a6a19d175a | |
|
998879c715 | |
|
c59cd67669 | |
|
60e5470674 | |
|
ca15d4a4d4 | |
|
57e7bbe59e | |
|
34717699af | |
|
385df6785d | |
|
060f153268 | |
|
c4f9b5cc03 | |
|
6b6f1d4a18 | |
|
4c1ea27a01 | |
|
743cb798b1 | |
|
6d32b082f7 | |
|
6b85c71fdd | |
|
6c9c239d65 | |
|
f6411a1fc3 | |
|
3eac0ed40b | |
|
b74c152953 | |
|
3cf612aa84 | |
|
3131986141 | |
|
0657083383 | |
|
0bc265c71c | |
|
6b494a2863 | |
|
0a2efbd824 | |
|
460a165fda | |
|
7765f0c509 | |
|
610ec69ca4 | |
|
77e13eb579 | |
|
f8dec0226e | |
|
3dd132cb9e | |
|
4c3495ca02 | |
|
91a26c1675 | |
|
8d9a181165 | |
|
b5a286ffc8 | |
|
bca3b717aa | |
|
4f3023f4a3 | |
|
eb77efd798 | |
|
b1d2b72b11 | |
|
0fe37838c8 | |
|
39b44e61f5 | |
|
e5113ae61d | |
|
40678c22d9 | |
|
eb6c79f7f2 | |
|
c122f60fe6 | |
|
498030535c | |
|
ede27ccf61 | |
|
ffdd1c2304 | |
|
7c4ce08d1a | |
|
35b3facb1f | |
|
bce720002d | |
|
e77ddbc0d6 | |
|
704776d50d | |
|
584ebdbb01 | |
|
547046cdf5 | |
|
e6494cf345 | |
|
b5eae537c5 | |
|
869732cfb5 | |
|
1f583045d0 | |
|
592cd7834e | |
|
4c91b6eed6 | |
|
dd18c720ae | |
|
91cbf35339 | |
|
b4d283862d | |
|
fb44cf52df | |
|
129c898253 | |
|
6039510c80 | |
|
a89390e0c6 | |
|
74e068c7d2 | |
|
87bd1b8ed4 | |
|
ae6963124d | |
|
5216920d58 | |
|
b1240f333c | |
|
bce316e887 | |
|
2df8210809 | |
|
58327a33bb | |
|
298946578c | |
|
2c9b5cea14 | |
|
037017c8f2 | |
|
426987a690 | |
|
a4f79dece9 | |
|
ffd3a47105 | |
|
54191b6eae | |
|
62bf8fc4b1 | |
|
1b7ddef160 | |
|
65f91e37ae | |
|
3d0bd5c893 | |
|
ad67cc6b32 | |
|
d32e845d60 | |
|
dcaa0f2500 | |
|
c8a4562c44 | |
|
3f27e1f496 | |
|
5a89f797a7 | |
|
4dd8efc82d | |
|
733ed83609 | |
|
8ba6b2028f | |
|
1802d46ef2 | |
|
8de49ddc50 | |
|
0efcbfa831 | |
|
64f0254342 | |
|
27701df190 | |
|
04c42f1c03 | |
|
724a9145e4 | |
|
dbce23b981 | |
|
9b20b7fb70 | |
|
ff28dcda4e | |
|
e8f4808ea2 | |
|
66c1e7cd28 | |
|
c61358d5a6 | |
|
806f93eb82 | |
|
c8a9ec6998 | |
|
74f0da8d06 | |
|
9204d8185c | |
|
6639bccfe6 | |
|
04ef2ddc45 | |
|
9b469c36af | |
|
d1779da0e6 | |
|
2621336695 | |
|
e1c188f86a | |
|
cb39f8de53 | |
|
b22c289248 | |
|
65727920be | |
|
a058ccf186 | |
|
54b5c06451 | |
|
02cf18c5f0 | |
|
eb5a60a90d | |
|
b49b6e1a41 | |
|
599853920b |
|
@ -1,9 +1,34 @@
|
|||
version: 2
|
||||
|
||||
updates:
|
||||
- package-ecosystem: "gomod"
|
||||
directory: "/"
|
||||
labels: ["dependencies"]
|
||||
schedule:
|
||||
interval: "monthly"
|
||||
groups:
|
||||
go-deps:
|
||||
patterns:
|
||||
- "*"
|
||||
allow:
|
||||
- dependency-type: "direct"
|
||||
ignore:
|
||||
# Kubernetes deps are updated by fluxcd/pkg
|
||||
- dependency-name: "k8s.io/*"
|
||||
- dependency-name: "sigs.k8s.io/*"
|
||||
# KMS SDKs are updated by SOPS
|
||||
- dependency-name: "github.com/Azure/*"
|
||||
- dependency-name: "github.com/aws/*"
|
||||
- dependency-name: "github.com/hashicorp/vault/*"
|
||||
# Flux APIs pkg are updated at release time
|
||||
- dependency-name: "github.com/fluxcd/kustomize-controller/api"
|
||||
- dependency-name: "github.com/fluxcd/source-controller/api"
|
||||
- package-ecosystem: "github-actions"
|
||||
directory: "/"
|
||||
labels: ["area/build"]
|
||||
labels: ["area/ci", "dependencies"]
|
||||
groups:
|
||||
ci:
|
||||
patterns:
|
||||
- "*"
|
||||
schedule:
|
||||
# by default this will be on a monday.
|
||||
interval: "weekly"
|
||||
interval: "monthly"
|
||||
|
|
|
@ -0,0 +1,40 @@
|
|||
# Configuration file to declaratively configure labels
|
||||
# Ref: https://github.com/EndBug/label-sync#Config-files
|
||||
|
||||
- name: area/kustomize
|
||||
description: Kustomize related issues and pull requests
|
||||
color: '#00e54d'
|
||||
- name: area/kstatus
|
||||
description: Health checking related issues and pull requests
|
||||
color: '#25D5CA'
|
||||
aliases: ['area/health-checks']
|
||||
- name: area/sops
|
||||
description: SOPS related issues and pull requests
|
||||
color: '#FEE5D1'
|
||||
- name: area/server-side-apply
|
||||
description: SSA related issues and pull requests
|
||||
color: '#2819CB'
|
||||
- name: area/varsub
|
||||
description: Post-build variable substitution related issues and pull requests
|
||||
color: '#8D195D'
|
||||
- name: backport:release/v1.0.x
|
||||
description: To be backported to release/v1.0.x
|
||||
color: '#ffd700'
|
||||
- name: backport:release/v1.1.x
|
||||
description: To be backported to release/v1.1.x
|
||||
color: '#ffd700'
|
||||
- name: backport:release/v1.2.x
|
||||
description: To be backported to release/v1.2.x
|
||||
color: '#ffd700'
|
||||
- name: backport:release/v1.3.x
|
||||
description: To be backported to release/v1.3.x
|
||||
color: '#ffd700'
|
||||
- name: backport:release/v1.4.x
|
||||
description: To be backported to release/v1.4.x
|
||||
color: '#ffd700'
|
||||
- name: backport:release/v1.5.x
|
||||
description: To be backported to release/v1.5.x
|
||||
color: '#ffd700'
|
||||
- name: backport:release/v1.6.x
|
||||
description: To be backported to release/v1.6.x
|
||||
color: '#ffd700'
|
|
@ -0,0 +1,34 @@
|
|||
name: backport
|
||||
|
||||
on:
|
||||
pull_request_target:
|
||||
types: [closed, labeled]
|
||||
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
jobs:
|
||||
pull-request:
|
||||
runs-on: ubuntu-latest
|
||||
permissions:
|
||||
contents: write
|
||||
pull-requests: write
|
||||
if: github.event.pull_request.state == 'closed' && github.event.pull_request.merged && (github.event_name != 'labeled' || startsWith('backport:', github.event.label.name))
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
with:
|
||||
ref: ${{ github.event.pull_request.head.sha }}
|
||||
- name: Create backport PRs
|
||||
uses: korthout/backport-action@436145e922f9561fc5ea157ff406f21af2d6b363 # v3.2.0
|
||||
# xref: https://github.com/korthout/backport-action#inputs
|
||||
with:
|
||||
# Use token to allow workflows to be triggered for the created PR
|
||||
github_token: ${{ secrets.BOT_GITHUB_TOKEN }}
|
||||
# Match labels with a pattern `backport:<target-branch>`
|
||||
label_pattern: '^backport:([^ ]+)$'
|
||||
# A bit shorter pull-request title than the default
|
||||
pull_title: '[${target_branch}] ${pull_title}'
|
||||
# Simpler PR description than default
|
||||
pull_description: |-
|
||||
Automated backport to `${target_branch}`, triggered by a label in #${pull_number}.
|
|
@ -12,11 +12,11 @@ jobs:
|
|||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
|
||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
- name: Setup Go
|
||||
uses: actions/setup-go@4d34df0c2316fe8122ab82dc22947d607c0c91f9 # v4.0.0
|
||||
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5.5.0
|
||||
with:
|
||||
go-version: 1.20.x
|
||||
go-version: 1.24.x
|
||||
cache-dependency-path: |
|
||||
**/go.sum
|
||||
**/go.mod
|
||||
|
|
|
@ -4,7 +4,8 @@ on:
|
|||
pull_request:
|
||||
push:
|
||||
branches:
|
||||
- main
|
||||
- 'main'
|
||||
- 'release/**'
|
||||
|
||||
permissions:
|
||||
contents: read # for actions/checkout to fetch code
|
||||
|
@ -14,14 +15,14 @@ jobs:
|
|||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
|
||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
- name: Setup QEMU
|
||||
uses: docker/setup-qemu-action@e81a89b1732b9c48d79cd809d8d81d79c4647a18 # v2.1.0
|
||||
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
|
||||
- name: Setup Docker Buildx
|
||||
id: buildx
|
||||
uses: docker/setup-buildx-action@4b4e9c3e2d4531116a6f8ba8e71fc6e2cb6e6c8c # v2.5.0
|
||||
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
|
||||
- name: Cache Docker layers
|
||||
uses: actions/cache@88522ab9f39a2ea568f7027eddc7d8d8bc9d59c8 # v3.3.1
|
||||
uses: actions/cache@5a3ec84eff668545956fd18022155c47e93e2684 # v4.2.3
|
||||
id: cache
|
||||
with:
|
||||
path: /tmp/.buildx-cache
|
||||
|
@ -29,17 +30,18 @@ jobs:
|
|||
restore-keys: |
|
||||
${{ runner.os }}-buildx-ghcache-
|
||||
- name: Setup Go
|
||||
uses: actions/setup-go@4d34df0c2316fe8122ab82dc22947d607c0c91f9 # v4.0.0
|
||||
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5.5.0
|
||||
with:
|
||||
go-version: 1.20.x
|
||||
go-version: 1.24.x
|
||||
cache-dependency-path: |
|
||||
**/go.sum
|
||||
**/go.mod
|
||||
- name: Setup Kubernetes
|
||||
uses: helm/kind-action@d8ccf8fb623ce1bb360ae2f45f323d9d5c5e9f00 # v1.5.0
|
||||
uses: helm/kind-action@a1b0e391336a6ee6713a0583f8c6240d70863de3 # v1.12.0
|
||||
with:
|
||||
version: v0.17.0
|
||||
version: v0.20.0
|
||||
cluster_name: kind
|
||||
node_image: kindest/node:v1.27.3@sha256:3966ac761ae0136263ffdb6cfd4db23ef8a83cba8a463690e98317add2c9ba72
|
||||
- name: Setup Kustomize
|
||||
uses: fluxcd/pkg/actions/kustomize@main
|
||||
- name: Enable integration tests
|
||||
|
|
|
@ -15,16 +15,16 @@ jobs:
|
|||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
|
||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
- name: Setup QEMU
|
||||
uses: docker/setup-qemu-action@e81a89b1732b9c48d79cd809d8d81d79c4647a18 # v2.1.0
|
||||
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
|
||||
- name: Setup Docker Buildx
|
||||
id: buildx
|
||||
uses: docker/setup-buildx-action@4b4e9c3e2d4531116a6f8ba8e71fc6e2cb6e6c8c # v2.5.0
|
||||
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
|
||||
with:
|
||||
buildkitd-flags: "--debug"
|
||||
- name: Build multi-arch container image
|
||||
uses: docker/build-push-action@3b5e8027fcad23fda98b2e3ac259d8d67585f671 # v4.0.0
|
||||
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
|
||||
with:
|
||||
push: false
|
||||
builder: ${{ steps.buildx.outputs.name }}
|
||||
|
|
|
@ -11,19 +11,25 @@ on:
|
|||
required: true
|
||||
|
||||
permissions:
|
||||
contents: write # needed to write releases
|
||||
id-token: write # needed for keyless signing
|
||||
packages: write # needed for ghcr access
|
||||
contents: read
|
||||
|
||||
env:
|
||||
CONTROLLER: ${{ github.event.repository.name }}
|
||||
|
||||
jobs:
|
||||
build-push:
|
||||
release:
|
||||
outputs:
|
||||
hashes: ${{ steps.slsa.outputs.hashes }}
|
||||
image_url: ${{ steps.slsa.outputs.image_url }}
|
||||
image_digest: ${{ steps.slsa.outputs.image_digest }}
|
||||
runs-on: ubuntu-latest
|
||||
permissions:
|
||||
contents: write # for creating the GitHub release.
|
||||
id-token: write # for creating OIDC tokens for signing.
|
||||
packages: write # for pushing and signing container images.
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
|
||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
- name: Setup Kustomize
|
||||
uses: fluxcd/pkg/actions/kustomize@main
|
||||
- name: Prepare
|
||||
|
@ -36,24 +42,24 @@ jobs:
|
|||
echo "BUILD_DATE=$(date -u +'%Y-%m-%dT%H:%M:%SZ')" >> $GITHUB_OUTPUT
|
||||
echo "VERSION=${VERSION}" >> $GITHUB_OUTPUT
|
||||
- name: Setup QEMU
|
||||
uses: docker/setup-qemu-action@e81a89b1732b9c48d79cd809d8d81d79c4647a18 # v2.1.0
|
||||
uses: docker/setup-qemu-action@29109295f81e9208d7d86ff1c6c12d2833863392 # v3.6.0
|
||||
- name: Setup Docker Buildx
|
||||
id: buildx
|
||||
uses: docker/setup-buildx-action@4b4e9c3e2d4531116a6f8ba8e71fc6e2cb6e6c8c # v2.5.0
|
||||
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
|
||||
- name: Login to GitHub Container Registry
|
||||
uses: docker/login-action@f4ef78c080cd8ba55a85445d5b36e214a81df20a # v2.1.0
|
||||
uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
||||
with:
|
||||
registry: ghcr.io
|
||||
username: fluxcdbot
|
||||
password: ${{ secrets.GHCR_TOKEN }}
|
||||
- name: Login to Docker Hub
|
||||
uses: docker/login-action@f4ef78c080cd8ba55a85445d5b36e214a81df20a # v2.1.0
|
||||
uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
||||
with:
|
||||
username: fluxcdbot
|
||||
password: ${{ secrets.DOCKER_FLUXCD_PASSWORD }}
|
||||
- name: Generate images meta
|
||||
id: meta
|
||||
uses: docker/metadata-action@c4ee3adeed93b1fa6a762f209fb01608c1a22f1e # v4.4.0
|
||||
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
||||
with:
|
||||
images: |
|
||||
fluxcd/${{ env.CONTROLLER }}
|
||||
|
@ -61,7 +67,8 @@ jobs:
|
|||
tags: |
|
||||
type=raw,value=${{ steps.prep.outputs.VERSION }}
|
||||
- name: Publish images
|
||||
uses: docker/build-push-action@3b5e8027fcad23fda98b2e3ac259d8d67585f671 # v4.0.0
|
||||
id: build-push
|
||||
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
|
||||
with:
|
||||
sbom: true
|
||||
provenance: true
|
||||
|
@ -72,32 +79,82 @@ jobs:
|
|||
platforms: linux/amd64,linux/arm/v7,linux/arm64
|
||||
tags: ${{ steps.meta.outputs.tags }}
|
||||
labels: ${{ steps.meta.outputs.labels }}
|
||||
- name: Check images
|
||||
run: |
|
||||
docker buildx imagetools inspect docker.io/fluxcd/${{ env.CONTROLLER }}:${{ steps.prep.outputs.VERSION }}
|
||||
docker buildx imagetools inspect ghcr.io/fluxcd/${{ env.CONTROLLER }}:${{ steps.prep.outputs.VERSION }}
|
||||
docker pull docker.io/fluxcd/${{ env.CONTROLLER }}:${{ steps.prep.outputs.VERSION }}
|
||||
docker pull ghcr.io/fluxcd/${{ env.CONTROLLER }}:${{ steps.prep.outputs.VERSION }}
|
||||
- uses: sigstore/cosign-installer@204a51a57a74d190b284a0ce69b44bc37201f343 # v3.0.3
|
||||
- uses: sigstore/cosign-installer@3454372f43399081ed03b604cb2d021dabca52bb # v3.8.2
|
||||
- name: Sign images
|
||||
env:
|
||||
COSIGN_EXPERIMENTAL: 1
|
||||
run: |
|
||||
cosign sign --yes fluxcd/${{ env.CONTROLLER }}:${{ steps.prep.outputs.VERSION }}
|
||||
cosign sign --yes ghcr.io/fluxcd/${{ env.CONTROLLER }}:${{ steps.prep.outputs.VERSION }}
|
||||
cosign sign --yes fluxcd/${{ env.CONTROLLER }}@${{ steps.build-push.outputs.digest }}
|
||||
cosign sign --yes ghcr.io/fluxcd/${{ env.CONTROLLER }}@${{ steps.build-push.outputs.digest }}
|
||||
- name: Generate release artifacts
|
||||
if: startsWith(github.ref, 'refs/tags/v')
|
||||
run: |
|
||||
mkdir -p config/release
|
||||
kustomize build ./config/crd > ./config/release/${{ env.CONTROLLER }}.crds.yaml
|
||||
kustomize build ./config/manager > ./config/release/${{ env.CONTROLLER }}.deployment.yaml
|
||||
echo '[CHANGELOG](https://github.com/fluxcd/${{ env.CONTROLLER }}/blob/main/CHANGELOG.md)' > ./config/release/notes.md
|
||||
- uses: anchore/sbom-action/download-syft@4d571ad1038a9cc29d676154ef265ab8f9027042 # v0.14.2
|
||||
- uses: anchore/sbom-action/download-syft@e11c554f704a0b820cbf8c51673f6945e0731532 # v0.20.0
|
||||
- name: Create release and SBOM
|
||||
id: run-goreleaser
|
||||
if: startsWith(github.ref, 'refs/tags/v')
|
||||
uses: goreleaser/goreleaser-action@f82d6c1c344bcacabba2c841718984797f664a6b # v4.2.0
|
||||
uses: goreleaser/goreleaser-action@9c156ee8a17a598857849441385a2041ef570552 # v6.3.0
|
||||
with:
|
||||
version: latest
|
||||
args: release --release-notes=config/release/notes.md --rm-dist --skip-validate
|
||||
args: release --clean --skip=validate
|
||||
env:
|
||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||
- name: Generate SLSA metadata
|
||||
id: slsa
|
||||
env:
|
||||
ARTIFACTS: "${{ steps.run-goreleaser.outputs.artifacts }}"
|
||||
run: |
|
||||
hashes=$(echo $ARTIFACTS | jq --raw-output '.[] | {name, "digest": (.extra.Digest // .extra.Checksum)} | select(.digest) | {digest} + {name} | join(" ") | sub("^sha256:";"")' | base64 -w0)
|
||||
echo "hashes=$hashes" >> $GITHUB_OUTPUT
|
||||
|
||||
image_url=fluxcd/${{ env.CONTROLLER }}:${{ steps.prep.outputs.version }}
|
||||
echo "image_url=$image_url" >> $GITHUB_OUTPUT
|
||||
|
||||
image_digest=${{ steps.build-push.outputs.digest }}
|
||||
echo "image_digest=$image_digest" >> $GITHUB_OUTPUT
|
||||
|
||||
release-provenance:
|
||||
needs: [release]
|
||||
permissions:
|
||||
actions: read # for detecting the Github Actions environment.
|
||||
id-token: write # for creating OIDC tokens for signing.
|
||||
contents: write # for uploading attestations to GitHub releases.
|
||||
if: startsWith(github.ref, 'refs/tags/v')
|
||||
uses: slsa-framework/slsa-github-generator/.github/workflows/generator_generic_slsa3.yml@v2.1.0
|
||||
with:
|
||||
provenance-name: "provenance.intoto.jsonl"
|
||||
base64-subjects: "${{ needs.release.outputs.hashes }}"
|
||||
upload-assets: true
|
||||
|
||||
dockerhub-provenance:
|
||||
needs: [release]
|
||||
permissions:
|
||||
actions: read # for detecting the Github Actions environment.
|
||||
id-token: write # for creating OIDC tokens for signing.
|
||||
packages: write # for uploading attestations.
|
||||
if: startsWith(github.ref, 'refs/tags/v')
|
||||
uses: slsa-framework/slsa-github-generator/.github/workflows/generator_container_slsa3.yml@v2.1.0
|
||||
with:
|
||||
image: ${{ needs.release.outputs.image_url }}
|
||||
digest: ${{ needs.release.outputs.image_digest }}
|
||||
registry-username: fluxcdbot
|
||||
secrets:
|
||||
registry-password: ${{ secrets.DOCKER_FLUXCD_PASSWORD }}
|
||||
|
||||
ghcr-provenance:
|
||||
needs: [release]
|
||||
permissions:
|
||||
actions: read # for detecting the Github Actions environment.
|
||||
id-token: write # for creating OIDC tokens for signing.
|
||||
packages: write # for uploading attestations.
|
||||
if: startsWith(github.ref, 'refs/tags/v')
|
||||
uses: slsa-framework/slsa-github-generator/.github/workflows/generator_container_slsa3.yml@v2.1.0
|
||||
with:
|
||||
image: ghcr.io/${{ needs.release.outputs.image_url }}
|
||||
digest: ${{ needs.release.outputs.image_digest }}
|
||||
registry-username: fluxcdbot
|
||||
secrets:
|
||||
registry-password: ${{ secrets.GHCR_TOKEN }}
|
||||
|
|
|
@ -18,9 +18,9 @@ jobs:
|
|||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
|
||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
- name: Run FOSSA scan and upload build data
|
||||
uses: fossa-contrib/fossa-action@6728dc6fe9a068c648d080c33829ffbe56565023 # v2.0.0
|
||||
uses: fossa-contrib/fossa-action@3d2ef181b1820d6dcd1972f86a767d18167fa19b # v3.0.1
|
||||
with:
|
||||
# FOSSA Push-Only API Token
|
||||
fossa-api-key: 5ee8bf422db1471e0bcf2bcb289185de
|
||||
|
@ -31,19 +31,22 @@ jobs:
|
|||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@8e5e7e5ab8b370d6c329ec480221332ada57f0ab # v3.5.2
|
||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
- name: Setup Go
|
||||
uses: actions/setup-go@4d34df0c2316fe8122ab82dc22947d607c0c91f9 # v4.0.0
|
||||
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5.5.0
|
||||
with:
|
||||
go-version: 1.20.x
|
||||
go-version: 1.24.x
|
||||
cache-dependency-path: |
|
||||
**/go.sum
|
||||
**/go.mod
|
||||
- name: Initialize CodeQL
|
||||
uses: github/codeql-action/init@29b1f65c5e92e24fe6b6647da1eaabe529cec70f # v2.3.3
|
||||
uses: github/codeql-action/init@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
|
||||
with:
|
||||
languages: go
|
||||
# xref: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
|
||||
# xref: https://codeql.github.com/codeql-query-help/go/
|
||||
queries: security-and-quality
|
||||
- name: Autobuild
|
||||
uses: github/codeql-action/autobuild@29b1f65c5e92e24fe6b6647da1eaabe529cec70f # v2.3.3
|
||||
uses: github/codeql-action/autobuild@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
|
||||
- name: Perform CodeQL Analysis
|
||||
uses: github/codeql-action/analyze@29b1f65c5e92e24fe6b6647da1eaabe529cec70f # v2.3.3
|
||||
uses: github/codeql-action/analyze@ff0a06e83cb2de871e5a09832bc6a81e7276941f # v3.28.18
|
||||
|
|
|
@ -0,0 +1,28 @@
|
|||
name: sync-labels
|
||||
on:
|
||||
workflow_dispatch:
|
||||
push:
|
||||
branches:
|
||||
- main
|
||||
paths:
|
||||
- .github/labels.yaml
|
||||
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
jobs:
|
||||
labels:
|
||||
name: Run sync
|
||||
runs-on: ubuntu-latest
|
||||
permissions:
|
||||
issues: write
|
||||
steps:
|
||||
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
- uses: EndBug/label-sync@52074158190acb45f3077f9099fea818aa43f97a # v2.3.3
|
||||
with:
|
||||
# Configuration file
|
||||
config-file: |
|
||||
https://raw.githubusercontent.com/fluxcd/community/main/.github/standard-labels.yaml
|
||||
.github/labels.yaml
|
||||
# Strictly declarative
|
||||
delete-other-labels: true
|
|
@ -4,9 +4,26 @@ builds:
|
|||
- skip: true
|
||||
|
||||
release:
|
||||
prerelease: "true"
|
||||
extra_files:
|
||||
- glob: config/release/*.yaml
|
||||
prerelease: "auto"
|
||||
header: |
|
||||
## Changelog
|
||||
|
||||
[{{.Tag}} changelog](https://github.com/fluxcd/{{.ProjectName}}/blob/{{.Tag}}/CHANGELOG.md)
|
||||
footer: |
|
||||
## Container images
|
||||
|
||||
- `docker.io/fluxcd/{{.ProjectName}}:{{.Tag}}`
|
||||
- `ghcr.io/fluxcd/{{.ProjectName}}:{{.Tag}}`
|
||||
|
||||
Supported architectures: `linux/amd64`, `linux/arm64` and `linux/arm/v7`.
|
||||
|
||||
The container images are built on GitHub hosted runners and are signed with cosign and GitHub OIDC.
|
||||
To verify the images and their provenance (SLSA level 3), please see the [security documentation](https://fluxcd.io/flux/security/).
|
||||
|
||||
changelog:
|
||||
disable: true
|
||||
|
||||
checksum:
|
||||
extra_files:
|
||||
|
|
489
CHANGELOG.md
489
CHANGELOG.md
|
@ -2,6 +2,495 @@
|
|||
|
||||
All notable changes to this project are documented in this file.
|
||||
|
||||
## 1.6.0
|
||||
|
||||
**Release date:** 2025-05-28
|
||||
|
||||
This minor release comes with various bug fixes and improvements.
|
||||
|
||||
Kustomization API now supports object-level workload identity by setting
|
||||
`.spec.decryption.serviceAccountName` to the name of a service account
|
||||
in the same namespace that has been configured with appropriate cloud
|
||||
permissions. For this feature to work, the controller feature gate
|
||||
`ObjectLevelWorkloadIdentity` must be enabled. See a complete guide
|
||||
[here](https://fluxcd.io/flux/integrations/).
|
||||
|
||||
Kustomization API now supports the value `WaitForTermination` for the
|
||||
`.spec.deletionPolicy` field. This instructs the controller to wait for the
|
||||
deletion of all resources managed by the Kustomization before allowing the
|
||||
Kustomization itself to be deleted. See docs
|
||||
[here](https://fluxcd.io/flux/components/kustomize/kustomizations/#deletion-policy).
|
||||
|
||||
In addition, the Kubernetes dependencies have been updated to v1.33 and
|
||||
various other controller dependencies have been updated to their latest version.
|
||||
The controller is now built with Go 1.24.
|
||||
|
||||
Fixes:
|
||||
- Fix performance regression due to using client without cache
|
||||
[#1436](https://github.com/fluxcd/kustomize-controller/pull/1436)
|
||||
- Fix secret value showing up in logs
|
||||
[#1372](https://github.com/fluxcd/kustomize-controller/pull/1372)
|
||||
|
||||
Improvements:
|
||||
- [RFC-0010] Introduce KMS provider decryption with service account
|
||||
[#1426](https://github.com/fluxcd/kustomize-controller/pull/1426)
|
||||
[#1449](https://github.com/fluxcd/kustomize-controller/pull/1449)
|
||||
[#1456](https://github.com/fluxcd/kustomize-controller/pull/1456)
|
||||
- Add `WaitForTermination` option to DeletionPolicy
|
||||
[#1444](https://github.com/fluxcd/kustomize-controller/pull/1444)
|
||||
- Skip emitting events for suspended Kustomizations
|
||||
[#1396](https://github.com/fluxcd/kustomize-controller/pull/1396)
|
||||
- Various dependency updates
|
||||
[#1458](https://github.com/fluxcd/kustomize-controller/pull/1458)
|
||||
[#1448](https://github.com/fluxcd/kustomize-controller/pull/1448)
|
||||
[#1433](https://github.com/fluxcd/kustomize-controller/pull/1433)
|
||||
[#1435](https://github.com/fluxcd/kustomize-controller/pull/1435)
|
||||
[#1429](https://github.com/fluxcd/kustomize-controller/pull/1429)
|
||||
[#1414](https://github.com/fluxcd/kustomize-controller/pull/1414)
|
||||
[#1410](https://github.com/fluxcd/kustomize-controller/pull/1410)
|
||||
[#1401](https://github.com/fluxcd/kustomize-controller/pull/1401)
|
||||
|
||||
## 1.5.1
|
||||
|
||||
**Release date:** 2025-02-25
|
||||
|
||||
This patch release fixes a bug introduced in v1.5.0
|
||||
that was causing spurious logging for deprecated API versions
|
||||
and sometimes failures on health checks.
|
||||
|
||||
In addition, all error logs resulting from SOPS decryption
|
||||
failures have been sanitised.
|
||||
|
||||
Fixes:
|
||||
- Fix secret value showing up in logs
|
||||
[#1372](https://github.com/fluxcd/kustomize-controller/pull/1372)
|
||||
- Use lazy restmapper vendored from controller-runtime v0.19
|
||||
[#1377](https://github.com/fluxcd/kustomize-controller/pull/1377)
|
||||
|
||||
## 1.5.0
|
||||
|
||||
**Release date:** 2025-02-18
|
||||
|
||||
This minor release comes with various bug fixes and improvements.
|
||||
|
||||
The controller has been updated to Kustomize **v5.6**, please see the
|
||||
`kubernetes-sigs/kustomize` [changelog](https://github.com/kubernetes-sigs/kustomize/releases)
|
||||
for more details.
|
||||
|
||||
The Kustomization API now supports custom health checks for Custom
|
||||
Resources through Common Expression Language (CEL) expressions.
|
||||
See [docs](https://fluxcd.io/flux/components/kustomize/kustomizations/#health-check-expressions).
|
||||
|
||||
The controller now sends an origin revision from OCI artifact
|
||||
annotations to notification-controller on events, which is
|
||||
useful for updating commit statuses on the notification
|
||||
providers that support this feature.
|
||||
See [docs](https://fluxcd.io/flux/cheatsheets/oci-artifacts/#git-commit-status-updates).
|
||||
|
||||
It is now also possible to control whether or not kustomize-controller
|
||||
will orphan resources when a Kustomization is deleted.
|
||||
See [docs](https://fluxcd.io/flux/components/kustomize/kustomizations/#deletion-policy).
|
||||
|
||||
In addition, the Kubernetes dependencies have been updated to v1.32.1 and
|
||||
various other controller dependencies have been updated to their latest
|
||||
version.
|
||||
|
||||
Fixes:
|
||||
- Clarify precedence in Kustomization substituteFrom
|
||||
[#1301](https://github.com/fluxcd/kustomize-controller/pull/1301)
|
||||
- Remove deprecated object metrics from controllers
|
||||
[#1305](https://github.com/fluxcd/kustomize-controller/pull/1305)
|
||||
|
||||
Improvements:
|
||||
- Enable decryption of secrets generated by Kustomize components
|
||||
[#1283](https://github.com/fluxcd/kustomize-controller/pull/1283)
|
||||
- Added decryption of Kustomize patches and refactor SOPS tests
|
||||
[#1286](https://github.com/fluxcd/kustomize-controller/pull/1286)
|
||||
- Allow control of finalization garbage collection
|
||||
[#1314](https://github.com/fluxcd/kustomize-controller/pull/1314)
|
||||
- Add OCI revision to events
|
||||
[#1338](https://github.com/fluxcd/kustomize-controller/pull/1338)
|
||||
- [RFC-0009] Add CEL custom healthchecks
|
||||
[#1344](https://github.com/fluxcd/kustomize-controller/pull/1344)
|
||||
- Add GroupChangeLog feature gate to fix es indexing cardinality
|
||||
[#1361](https://github.com/fluxcd/kustomize-controller/pull/1361)
|
||||
- Various dependency updates
|
||||
[#1302](https://github.com/fluxcd/kustomize-controller/pull/1302)
|
||||
[#1304](https://github.com/fluxcd/kustomize-controller/pull/1304)
|
||||
[#1310](https://github.com/fluxcd/kustomize-controller/pull/1310)
|
||||
[#1313](https://github.com/fluxcd/kustomize-controller/pull/1313)
|
||||
[#1318](https://github.com/fluxcd/kustomize-controller/pull/1318)
|
||||
[#1320](https://github.com/fluxcd/kustomize-controller/pull/1320)
|
||||
[#1330](https://github.com/fluxcd/kustomize-controller/pull/1330)
|
||||
[#1348](https://github.com/fluxcd/kustomize-controller/pull/1348)
|
||||
[#1352](https://github.com/fluxcd/kustomize-controller/pull/1352)
|
||||
[#1354](https://github.com/fluxcd/kustomize-controller/pull/1354)
|
||||
[#1359](https://github.com/fluxcd/kustomize-controller/pull/1359)
|
||||
[#1362](https://github.com/fluxcd/kustomize-controller/pull/1362)
|
||||
[#1364](https://github.com/fluxcd/kustomize-controller/pull/1364)
|
||||
[#1358](https://github.com/fluxcd/kustomize-controller/pull/1358)
|
||||
|
||||
## 1.4.0
|
||||
|
||||
**Release date:** 2024-09-27
|
||||
|
||||
This minor release comes with various bug fixes and improvements.
|
||||
|
||||
kustomize-controller in [sharded
|
||||
deployment](https://fluxcd.io/flux/installation/configuration/sharding/)
|
||||
configuration now supports cross-shard dependency check. This allows a
|
||||
Kustomization to depend on other Kustomizations managed by different controller
|
||||
shards.
|
||||
|
||||
In addition, the Kubernetes dependencies have been updated to v1.31.1 and
|
||||
various other controller dependencies have been updated to their latest version.
|
||||
The controller is now built with Go 1.23.
|
||||
|
||||
Fixes:
|
||||
- Fix incorrect use of format strings with the conditions package.
|
||||
[#1198](https://github.com/fluxcd/kustomize-controller/pull/1198)
|
||||
|
||||
Improvements:
|
||||
- Update Bucket API to v1
|
||||
[#1253](https://github.com/fluxcd/kustomize-controller/pull/1253)
|
||||
- Allow cross-shard dependency check
|
||||
[#1248](https://github.com/fluxcd/kustomize-controller/pull/1248)
|
||||
- docs: Clarify .spec.decryption.secretRef usage
|
||||
[#1242](https://github.com/fluxcd/kustomize-controller/pull/1242)
|
||||
- Build with Go 1.23
|
||||
[#1230](https://github.com/fluxcd/kustomize-controller/pull/1230)
|
||||
- Various dependency updates
|
||||
[#1165](https://github.com/fluxcd/kustomize-controller/pull/1165)
|
||||
[#1181](https://github.com/fluxcd/kustomize-controller/pull/1181)
|
||||
[#1212](https://github.com/fluxcd/kustomize-controller/pull/1212)
|
||||
[#1228](https://github.com/fluxcd/kustomize-controller/pull/1228)
|
||||
[#1229](https://github.com/fluxcd/kustomize-controller/pull/1229)
|
||||
[#1233](https://github.com/fluxcd/kustomize-controller/pull/1233)
|
||||
[#1239](https://github.com/fluxcd/kustomize-controller/pull/1239)
|
||||
[#1240](https://github.com/fluxcd/kustomize-controller/pull/1240)
|
||||
[#1243](https://github.com/fluxcd/kustomize-controller/pull/1243)
|
||||
[#1249](https://github.com/fluxcd/kustomize-controller/pull/1249)
|
||||
[#1250](https://github.com/fluxcd/kustomize-controller/pull/1250)
|
||||
[#1251](https://github.com/fluxcd/kustomize-controller/pull/1251)
|
||||
|
||||
## 1.3.0
|
||||
|
||||
**Release date:** 2024-05-06
|
||||
|
||||
This minor release comes with new features, improvements and bug fixes.
|
||||
|
||||
The controller has been updated to Kustomize **v5.4**, please see the
|
||||
`kubernetes-sigs/kustomize` [changelog](https://github.com/kubernetes-sigs/kustomize/releases)
|
||||
for more details.
|
||||
|
||||
The Flux `Kustomization` API gains two optional fields `.spec.namePrefix` and `.spec.nameSuffix`
|
||||
that can be used to specify a prefix and suffix to be added to the names
|
||||
of all managed resources.
|
||||
|
||||
The controller now supports the `--feature-gates=StrictPostBuildSubstitutions=true`
|
||||
flag, when enabled the post-build substitutions will fail if a
|
||||
variable without a default value is declared in files but is
|
||||
missing from the input vars.
|
||||
|
||||
When using variable substitution with values that are numbers or booleans,
|
||||
it is now possible to covert the values to strings, for more details see the
|
||||
[post-build documentation](https://github.com/fluxcd/kustomize-controller/blob/release/v1.3.x/docs/spec/v1/kustomizations.md#post-build-substitution-of-numbers-and-booleans).
|
||||
|
||||
In addition, the controller dependencies have been updated to Kubernetes v1.30
|
||||
and controller-runtime v0.18. Various other dependencies have also been updated to
|
||||
their latest version to patch upstream CVEs.
|
||||
|
||||
Lastly, the controller is now built with Go 1.22.
|
||||
|
||||
Improvements:
|
||||
- Implement name prefix/suffix transformers
|
||||
[#1134](https://github.com/fluxcd/kustomize-controller/pull/1134)
|
||||
- Add `StrictPostBuildSubstitutions` feature flag
|
||||
[#1130](https://github.com/fluxcd/kustomize-controller/pull/1130)
|
||||
- Document how to use numbers and booleans in post build substitutions
|
||||
[#1129](https://github.com/fluxcd/kustomize-controller/pull/1129)
|
||||
- Remove deprecated aad pod identity from API docs
|
||||
[#1152](https://github.com/fluxcd/kustomize-controller/pull/1152)
|
||||
- api: Refer condition type constants from `fluxcd/pkg/apis`
|
||||
[#1144](https://github.com/fluxcd/kustomize-controller/pull/1144)
|
||||
- Update dependencies to Kustomize v5.4.0
|
||||
[#1128](https://github.com/fluxcd/kustomize-controller/pull/1128)
|
||||
- Various dependency updates
|
||||
[#1155](https://github.com/fluxcd/kustomize-controller/pull/1155)
|
||||
[#1121](https://github.com/fluxcd/kustomize-controller/pull/1121)
|
||||
[#1139](https://github.com/fluxcd/kustomize-controller/pull/1139)
|
||||
[#1122](https://github.com/fluxcd/kustomize-controller/pull/1122)
|
||||
|
||||
Fixes:
|
||||
- Fix requeue warning introduced by controller-runtime
|
||||
[#1090](https://github.com/fluxcd/kustomize-controller/pull/1090)
|
||||
- Remove effectless statement
|
||||
[#1091](https://github.com/fluxcd/kustomize-controller/pull/1091)
|
||||
- Remove `genclient:Namespaced` tag
|
||||
[#1092](https://github.com/fluxcd/kustomize-controller/pull/1092)
|
||||
|
||||
## 1.2.2
|
||||
|
||||
**Release date:** 2024-02-01
|
||||
|
||||
This patch release comes with various bug fixes and improvements.
|
||||
|
||||
Reconciling empty directories and directories without Kubernetes manifests no
|
||||
longer results in an error. This regressing bug was introduced with the
|
||||
controller upgrade to Kustomize v5.3 and has been fixed in this patch release.
|
||||
|
||||
The regression due to which the namespaced objects without a namespace specified
|
||||
resulted in `not found` error instead of `namespace not specified` has also been
|
||||
fixed. And the regression due to which Roles and ClusterRoles were reconciled
|
||||
over and over due to the normalization of Roles and ClusterRoles has also been
|
||||
fixed.
|
||||
|
||||
In addition, the Kubernetes dependencies have been updated to v1.28.6. Various
|
||||
other dependencies have also been updated to their latest version to patch
|
||||
upstream CVEs.
|
||||
|
||||
Lastly, the controller is now built with Go 1.21.
|
||||
|
||||
Improvements:
|
||||
- Update Go to 1.21
|
||||
[#1053](https://github.com/fluxcd/kustomize-controller/pull/1053)
|
||||
- Various dependency updates
|
||||
[#1076](https://github.com/fluxcd/kustomize-controller/pull/1076)
|
||||
[#1074](https://github.com/fluxcd/kustomize-controller/pull/1074)
|
||||
[#1070](https://github.com/fluxcd/kustomize-controller/pull/1070)
|
||||
[#1068](https://github.com/fluxcd/kustomize-controller/pull/1068)
|
||||
[#1065](https://github.com/fluxcd/kustomize-controller/pull/1065)
|
||||
[#1060](https://github.com/fluxcd/kustomize-controller/pull/1060)
|
||||
[#1059](https://github.com/fluxcd/kustomize-controller/pull/1059)
|
||||
[#1051](https://github.com/fluxcd/kustomize-controller/pull/1051)
|
||||
[#1049](https://github.com/fluxcd/kustomize-controller/pull/1049)
|
||||
[#1046](https://github.com/fluxcd/kustomize-controller/pull/1046)
|
||||
[#1044](https://github.com/fluxcd/kustomize-controller/pull/1044)
|
||||
[#1040](https://github.com/fluxcd/kustomize-controller/pull/1040)
|
||||
[#1038](https://github.com/fluxcd/kustomize-controller/pull/1038)
|
||||
|
||||
## 1.2.1
|
||||
|
||||
**Release date:** 2023-12-14
|
||||
|
||||
This patch release comes with improvements in logging to provide faster feedback
|
||||
on any HTTP errors encountered while fetching source artifacts.
|
||||
|
||||
In addition, the status condition messages are now trimmed to respect the size
|
||||
limit defined by the API.
|
||||
|
||||
Improvements:
|
||||
- Update runtime to v0.43.3
|
||||
[#1031](https://github.com/fluxcd/kustomize-controller/pull/1031)
|
||||
- Log HTTP errors to provide faster feedback
|
||||
[#1028](https://github.com/fluxcd/kustomize-controller/pull/1028)
|
||||
|
||||
## 1.2.0
|
||||
|
||||
**Release date:** 2023-12-11
|
||||
|
||||
This minor release comes with performance improvements, bug fixes and several new features.
|
||||
|
||||
The controller has been updated from Kustomize v5.0 to **v5.3**, please the see
|
||||
`kubernetes-sigs/kustomize` [changelog](https://github.com/kubernetes-sigs/kustomize/releases)
|
||||
for a more details.
|
||||
|
||||
Starting with this version, the controller will automatically perform a cleanup of
|
||||
the Pods belonging to stale Kubernetes Jobs after a force apply.
|
||||
|
||||
A new controller flag `--override-manager` has been added to extend the Field Managers disallow list.
|
||||
Using this flag, cluster administrators can configure the controller to undo changes
|
||||
made with Lens and other UI tools that directly modify Kubernetes objects on clusters.
|
||||
|
||||
In addition, the controller dependencies have been updated, including an update to Kubernetes v1.28.
|
||||
The container base image has been updated to Alpine 3.19.
|
||||
|
||||
Improvements:
|
||||
- Update source-controller to v1.2.2
|
||||
[#1024](https://github.com/fluxcd/kustomize-controller/pull/1024)
|
||||
- build: update Alpine to 3.19
|
||||
[#1023](https://github.com/fluxcd/kustomize-controller/pull/1023)
|
||||
- Update Kustomize to v5.3.0
|
||||
[#1021](https://github.com/fluxcd/kustomize-controller/pull/1021)
|
||||
- Support additional Field Managers in the disallow list
|
||||
[#1017](https://github.com/fluxcd/kustomize-controller/pull/1017)
|
||||
- Add test for Namespace custom resource
|
||||
[#1016](https://github.com/fluxcd/kustomize-controller/pull/1016)
|
||||
- Update controller to Kubernetes v1.28.4
|
||||
[#1014](https://github.com/fluxcd/kustomize-controller/pull/1014)
|
||||
- Disable status poller cache by default
|
||||
[#1012](https://github.com/fluxcd/kustomize-controller/pull/1012)
|
||||
- Tweak permissions on various created files
|
||||
[#1005](https://github.com/fluxcd/kustomize-controller/pull/1005)
|
||||
- Cleanup pods when recreating Kubernetes Jobs
|
||||
[#997](https://github.com/fluxcd/kustomize-controller/pull/997)
|
||||
- Update SOPS to v3.8.1
|
||||
[#995](https://github.com/fluxcd/kustomize-controller/pull/995)
|
||||
|
||||
## 1.1.1
|
||||
|
||||
**Release date:** 2023-10-11
|
||||
|
||||
This patch release contains an improvement to retry the reconciliation of a
|
||||
`Kustomization` as soon as the source artifact is available in storage.
|
||||
Which is particularly useful when the source-controller has just been upgraded.
|
||||
|
||||
In addition, the controller can now detect immutable field errors returned by the
|
||||
Google Cloud k8s-config-connector admission controller and recreate the GCP custom
|
||||
resources annotated with `kustomize.toolkit.fluxcd.io/force: Enabled`.
|
||||
|
||||
Improvements:
|
||||
- Update `fluxcd/pkg` dependencies
|
||||
[#983](https://github.com/fluxcd/kustomize-controller/pull/983)
|
||||
- Bump `github.com/cyphar/filepath-securejoi`n from 0.2.3 to 0.2.4
|
||||
[#962](https://github.com/fluxcd/kustomize-controller/pull/962)
|
||||
|
||||
Fixes:
|
||||
- fix: Retry when artifacts are available in storage
|
||||
[#980](https://github.com/fluxcd/kustomize-controller/pull/980)
|
||||
- fix: Consistent artifact fetching retry timing
|
||||
[#978](https://github.com/fluxcd/kustomize-controller/pull/978)
|
||||
|
||||
## 1.1.0
|
||||
|
||||
**Release date:** 2023-08-23
|
||||
|
||||
This minor release comes with performance improvements, bug fixes and several new features.
|
||||
|
||||
The apply behaviour has been extended with two policies `IfNotPresent` and `Ignore`.
|
||||
To change the apply behaviour for specific Kubernetes resources, you can annotate them with:
|
||||
|
||||
| Annotation | Default | Values | Role |
|
||||
|-------------------------------------|------------|----------------------------------------------------------------|-----------------|
|
||||
| `kustomize.toolkit.fluxcd.io/ssa` | `Override` | - `Override`<br/>- `Merge`<br/>- `IfNotPresent`<br/>- `Ignore` | Apply policy |
|
||||
| `kustomize.toolkit.fluxcd.io/force` | `Disabled` | - `Enabled`<br/>- `Disabled` | Recreate policy |
|
||||
| `kustomize.toolkit.fluxcd.io/prune` | `Enabled` | - `Enabled`<br/>- `Disabled` | Delete policy |
|
||||
|
||||
The `IfNotPresent` policy instructs the controller to only apply the Kubernetes resources if they are not present on the cluster.
|
||||
This policy can be used for Kubernetes `Secrets` and `ValidatingWebhookConfigurations` managed by cert-manager,
|
||||
where Flux creates the resources with fields that are later on mutated by other controllers.
|
||||
|
||||
This version improves the health checking with fail-fast behaviour
|
||||
by detecting stalled Kubernetes rollouts.
|
||||
|
||||
In addition, the controller now stops exporting an object's
|
||||
metrics as soon as the object has been deleted.
|
||||
|
||||
Lastly, this release introduces two controller flags:
|
||||
|
||||
- The `--concurrent-ssa` flag sets the number of concurrent server-side apply operations
|
||||
performed by the controller. Defaults to 4 concurrent operations per reconciliation.
|
||||
- The `--interval-jitter-percentage` flag makes the
|
||||
controller distribute the load more evenly when multiple objects are set up
|
||||
with the same interval. The default of this flag is set to `5`, which means
|
||||
that the interval will be jittered by a +/- 5% random value (e.g. if the
|
||||
interval is 10 minutes, the actual reconciliation interval will be between 9.5
|
||||
and 10.5 minutes).
|
||||
|
||||
Improvements:
|
||||
- Add `--concurrent-ssa` flag
|
||||
[#948](https://github.com/fluxcd/kustomize-controller/pull/948)
|
||||
- Add `IfNotPresent` and `Ignore` SSA policies
|
||||
[#943](https://github.com/fluxcd/kustomize-controller/pull/943)
|
||||
- controller: jitter requeue interval
|
||||
[#940](https://github.com/fluxcd/kustomize-controller/pull/940)
|
||||
- Enable fail-fast behavior for health checks
|
||||
[#933](https://github.com/fluxcd/kustomize-controller/pull/933)
|
||||
- Bump `fluxcd/pkg/ssa` to improve immutable error detection
|
||||
[#932](https://github.com/fluxcd/kustomize-controller/pull/932)
|
||||
- Update dependencies
|
||||
[#939](https://github.com/fluxcd/kustomize-controller/pull/939)
|
||||
- Update Source API to v1.1.0
|
||||
[#952](https://github.com/fluxcd/kustomize-controller/pull/952)
|
||||
|
||||
Fixes:
|
||||
- Handle delete before adding finalizer
|
||||
[#930](https://github.com/fluxcd/kustomize-controller/pull/930)
|
||||
- Delete stale metrics on object delete
|
||||
[#944](https://github.com/fluxcd/kustomize-controller/pull/944)
|
||||
|
||||
## 1.0.1
|
||||
|
||||
**Release date:** 2023-07-10
|
||||
|
||||
This is a patch release that fixes spurious events emitted for skipped resources.
|
||||
|
||||
Fixes:
|
||||
- Exclude skipped resources from apply events
|
||||
[#920](https://github.com/fluxcd/kustomize-controller/pull/920)
|
||||
|
||||
## 1.0.0
|
||||
|
||||
**Release date:** 2023-07-04
|
||||
|
||||
This is the first stable release of the controller. From now on, this controller
|
||||
follows the [Flux 2 release cadence and support pledge](https://fluxcd.io/flux/releases/).
|
||||
|
||||
Starting with this version, the build, release and provenance portions of the
|
||||
Flux project supply chain [provisionally meet SLSA Build Level 3](https://fluxcd.io/flux/security/slsa-assessment/).
|
||||
|
||||
This release includes several bug fixes. In addition, dependencies have been updated
|
||||
to their latest version, including an update of Kubernetes to v1.27.3.
|
||||
|
||||
For a comprehensive list of changes since `v0.35.x`, please refer to the
|
||||
changelog for [v1.0.0-rc.1](#100-rc1), [v1.0.0-rc.2](#100-rc2),
|
||||
[v1.0.0-rc.3](#100-rc3) and [`v1.0.0-rc.4](#100-rc4).
|
||||
|
||||
Improvements:
|
||||
- Update dependencies
|
||||
[#908](https://github.com/fluxcd/kustomize-controller/pull/908)
|
||||
- Align `go.mod` version with Kubernetes (Go 1.20)
|
||||
[#900](https://github.com/fluxcd/kustomize-controller/pull/900)
|
||||
|
||||
Fixes:
|
||||
- Use kustomization namespace for empty dependency source namespace
|
||||
[#897](https://github.com/fluxcd/kustomize-controller/pull/897)
|
||||
- docs: Clarify that targetNamespace namespace can be part of resources
|
||||
[#896](https://github.com/fluxcd/kustomize-controller/pull/896)
|
||||
|
||||
## 1.0.0-rc.4
|
||||
|
||||
**Release date:** 2023-05-29
|
||||
|
||||
This release candidate comes with support for Kustomize v5.0.3.
|
||||
|
||||
⚠️ Note that Kustomize v5 contains breaking changes, please consult their
|
||||
[changelog](https://github.com/kubernetes-sigs/kustomize/releases/tag/kustomize%2Fv5.0.0)
|
||||
for more details.
|
||||
|
||||
In addition, the controller dependencies have been updated to
|
||||
Kubernetes v1.27.2 and controller-runtime v0.15.0.
|
||||
|
||||
Improvements:
|
||||
- Update Kubernetes to v1.27 and Kustomize to v5
|
||||
[#850](https://github.com/fluxcd/kustomize-controller/pull/850)
|
||||
- Update controller-runtime to v0.15.0
|
||||
[#869](https://github.com/fluxcd/kustomize-controller/pull/869)
|
||||
- Update CA certificates
|
||||
[#872](https://github.com/fluxcd/kustomize-controller/pull/872)
|
||||
- Update source-controller to v1.0.0-rc.4
|
||||
[#873](https://github.com/fluxcd/kustomize-controller/pull/873)
|
||||
|
||||
## 1.0.0-rc.3
|
||||
|
||||
**Release date:** 2023-05-12
|
||||
|
||||
This release candidate comes with improved error reporting for when
|
||||
the controller fails to fetch an artifact due to a checksum mismatch.
|
||||
|
||||
In addition, the controller dependencies have been updated to patch
|
||||
CVE-2023-1732 and the base image has been updated to Alpine 3.18.
|
||||
|
||||
Improvements:
|
||||
- Update Alpine to 3.18
|
||||
[#855](https://github.com/fluxcd/kustomize-controller/pull/855)
|
||||
- Update dependencies
|
||||
[#862](https://github.com/fluxcd/kustomize-controller/pull/862)
|
||||
- build(deps): bump github.com/cloudflare/circl from 1.1.0 to 1.3.3
|
||||
[#860](https://github.com/fluxcd/kustomize-controller/pull/860)
|
||||
- docs: Clarify the Kustomize components relative paths requirement
|
||||
[#861](https://github.com/fluxcd/kustomize-controller/pull/861)
|
||||
|
||||
## 1.0.0-rc.2
|
||||
|
||||
**Release date:** 2023-05-09
|
||||
|
|
|
@ -13,19 +13,10 @@ There are a number of dependencies required to be able to run the controller and
|
|||
- [Install Docker](https://docs.docker.com/engine/install/)
|
||||
- (Optional) [Install Kubebuilder](https://book.kubebuilder.io/quick-start.html#installation)
|
||||
|
||||
In addition to the above, the following dependencies are also used by some of the `make` targets:
|
||||
|
||||
- `controller-gen` (v0.7.0)
|
||||
- `gen-crd-api-reference-docs` (v0.3.0)
|
||||
- `setup-envtest` (latest)
|
||||
- `sops` (v3.7.2)
|
||||
|
||||
If any of the above dependencies are not present on your system, the first invocation of a `make` target that requires them will install them.
|
||||
|
||||
## How to run the test suite
|
||||
|
||||
Prerequisites:
|
||||
* Go >= 1.18
|
||||
* Go >= 1.24
|
||||
|
||||
You can run the test suite by simply doing
|
||||
|
||||
|
|
15
Dockerfile
15
Dockerfile
|
@ -1,9 +1,9 @@
|
|||
ARG GO_VERSION=1.20
|
||||
ARG XX_VERSION=1.2.1
|
||||
ARG GO_VERSION=1.24
|
||||
ARG XX_VERSION=1.6.1
|
||||
|
||||
FROM --platform=$BUILDPLATFORM tonistiigi/xx:${XX_VERSION} AS xx
|
||||
|
||||
FROM --platform=$BUILDPLATFORM golang:${GO_VERSION}-alpine as builder
|
||||
FROM --platform=$BUILDPLATFORM golang:${GO_VERSION}-alpine AS builder
|
||||
|
||||
# Copy the build utilities.
|
||||
COPY --from=xx / /
|
||||
|
@ -30,11 +30,12 @@ COPY internal/ internal/
|
|||
ENV CGO_ENABLED=0
|
||||
RUN xx-go build -trimpath -a -o kustomize-controller main.go
|
||||
|
||||
FROM alpine:3.17
|
||||
FROM alpine:3.21
|
||||
|
||||
# Uses GnuPG from edge to patch CVE-2022-3515.
|
||||
RUN apk add --no-cache ca-certificates tini git openssh-client && \
|
||||
apk add --no-cache gnupg --repository=https://dl-cdn.alpinelinux.org/alpine/edge/main
|
||||
ARG TARGETPLATFORM
|
||||
|
||||
RUN apk --no-cache add ca-certificates tini git openssh-client gnupg \
|
||||
&& update-ca-certificates
|
||||
|
||||
COPY --from=builder /workspace/kustomize-controller /usr/local/bin/
|
||||
|
||||
|
|
11
Makefile
11
Makefile
|
@ -5,7 +5,7 @@ CRD_OPTIONS ?= crd:crdVersions=v1
|
|||
SOURCE_VER ?= $(shell go list -m all | grep github.com/fluxcd/source-controller/api | awk '{print $$2}')
|
||||
|
||||
# Use the same version of SOPS already referenced on go.mod
|
||||
SOPS_VER := $(shell go list -m all | grep go.mozilla.org/sops | awk '{print $$2}')
|
||||
SOPS_VER := $(shell go list -m all | grep github.com/getsops/sops | awk '{print $$2}')
|
||||
|
||||
# Repository root based on Git metadata
|
||||
REPOSITORY_ROOT := $(shell git rev-parse --show-toplevel)
|
||||
|
@ -44,7 +44,7 @@ OCIREPO_CRD ?= config/crd/bases/ocirepositories.yaml
|
|||
SOURCE_CRD_VER=$(BUILD_DIR)/.src-crd-$(SOURCE_VER)
|
||||
|
||||
# API (doc) generation utilities
|
||||
CONTROLLER_GEN_VERSION ?= v0.11.1
|
||||
CONTROLLER_GEN_VERSION ?= v0.16.1
|
||||
GEN_API_REF_DOCS_VERSION ?= e327d0730470cbd61b06300f81c5fcf91c23c113
|
||||
|
||||
all: manager
|
||||
|
@ -58,7 +58,7 @@ install-envtest: setup-envtest
|
|||
|
||||
SOPS = $(GOBIN)/sops
|
||||
$(SOPS): ## Download latest sops binary if none is found.
|
||||
$(call go-install-tool,$(SOPS),go.mozilla.org/sops/v3/cmd/sops@$(SOPS_VER))
|
||||
$(call go-install-tool,$(SOPS),github.com/getsops/sops/v3/cmd/sops@$(SOPS_VER))
|
||||
|
||||
# Run controller tests
|
||||
KUBEBUILDER_ASSETS?="$(shell $(ENVTEST) --arch=$(ENVTEST_ARCH) use -i $(ENVTEST_KUBERNETES_VERSION) --bin-dir=$(ENVTEST_ASSETS_DIR) -p path)"
|
||||
|
@ -78,6 +78,7 @@ run: generate fmt vet manifests
|
|||
$(SOURCE_CRD_VER):
|
||||
rm -f $(BUILD_DIR)/.src-crd*
|
||||
$(MAKE) cleanup-crd-deps
|
||||
if ! test -d "$(BUILD_DIR)"; then mkdir -p $(BUILD_DIR); fi
|
||||
touch $(SOURCE_CRD_VER)
|
||||
|
||||
$(GITREPO_CRD):
|
||||
|
@ -134,8 +135,8 @@ api-docs: gen-crd-api-reference-docs
|
|||
|
||||
# Run go mod tidy
|
||||
tidy:
|
||||
cd api; rm -f go.sum; go mod tidy -compat=1.20
|
||||
rm -f go.sum; go mod tidy -compat=1.20
|
||||
cd api; rm -f go.sum; go mod tidy -compat=1.24
|
||||
rm -f go.sum; go mod tidy -compat=1.24
|
||||
|
||||
# Run go fmt against code
|
||||
fmt:
|
||||
|
|
|
@ -41,7 +41,7 @@ the controller performs actions to reconcile the cluster current state with the
|
|||
|
||||
* [Get started with Flux](https://fluxcd.io/flux/get-started/)
|
||||
* [Setup Notifications](https://fluxcd.io/flux/guides/notifications/)
|
||||
* [Manage Kubernetes secrets with Flux and Mozilla SOPS](https://fluxcd.io/flux/guides/mozilla-sops/)
|
||||
* [Manage Kubernetes secrets with Flux and SOPS](https://fluxcd.io/flux/guides/mozilla-sops/)
|
||||
* [How to build, publish and consume OCI Artifacts with Flux](https://fluxcd.io/flux/cheatsheets/oci-artifacts/)
|
||||
* [Flux and Kustomize FAQ](https://fluxcd.io/flux/faq/#kustomize-questions)
|
||||
|
||||
|
|
37
api/go.mod
37
api/go.mod
|
@ -1,33 +1,36 @@
|
|||
module github.com/fluxcd/kustomize-controller/api
|
||||
|
||||
go 1.18
|
||||
go 1.24.0
|
||||
|
||||
require (
|
||||
github.com/fluxcd/pkg/apis/kustomize v1.0.0
|
||||
github.com/fluxcd/pkg/apis/meta v1.0.0
|
||||
k8s.io/apiextensions-apiserver v0.26.3
|
||||
k8s.io/apimachinery v0.26.3
|
||||
sigs.k8s.io/controller-runtime v0.14.6
|
||||
github.com/fluxcd/pkg/apis/kustomize v1.10.0
|
||||
github.com/fluxcd/pkg/apis/meta v1.12.0
|
||||
k8s.io/apiextensions-apiserver v0.33.0
|
||||
k8s.io/apimachinery v0.33.0
|
||||
sigs.k8s.io/controller-runtime v0.21.0
|
||||
)
|
||||
|
||||
// Fix CVE-2022-28948
|
||||
replace gopkg.in/yaml.v3 => gopkg.in/yaml.v3 v3.0.1
|
||||
|
||||
require (
|
||||
github.com/go-logr/logr v1.2.3 // indirect
|
||||
github.com/fxamacker/cbor/v2 v2.8.0 // indirect
|
||||
github.com/go-logr/logr v1.4.2 // indirect
|
||||
github.com/gogo/protobuf v1.3.2 // indirect
|
||||
github.com/google/gofuzz v1.2.0 // indirect
|
||||
github.com/json-iterator/go v1.1.12 // indirect
|
||||
github.com/kr/pretty v0.3.1 // indirect
|
||||
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
|
||||
github.com/modern-go/reflect2 v1.0.2 // indirect
|
||||
golang.org/x/net v0.7.0 // indirect
|
||||
golang.org/x/text v0.7.0 // indirect
|
||||
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c // indirect
|
||||
github.com/spf13/pflag v1.0.6 // indirect
|
||||
github.com/x448/float16 v0.8.4 // indirect
|
||||
golang.org/x/net v0.40.0 // indirect
|
||||
golang.org/x/text v0.25.0 // indirect
|
||||
golang.org/x/tools v0.33.0 // indirect
|
||||
gopkg.in/inf.v0 v0.9.1 // indirect
|
||||
gopkg.in/yaml.v2 v2.4.0 // indirect
|
||||
k8s.io/klog/v2 v2.80.1 // indirect
|
||||
k8s.io/utils v0.0.0-20221128185143-99ec85e7a448 // indirect
|
||||
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect
|
||||
sigs.k8s.io/structured-merge-diff/v4 v4.2.3 // indirect
|
||||
sigs.k8s.io/yaml v1.3.0 // indirect
|
||||
k8s.io/klog/v2 v2.130.1 // indirect
|
||||
k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e // indirect
|
||||
sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 // indirect
|
||||
sigs.k8s.io/randfill v1.0.0 // indirect
|
||||
sigs.k8s.io/structured-merge-diff/v4 v4.7.0 // indirect
|
||||
sigs.k8s.io/yaml v1.4.0 // indirect
|
||||
)
|
||||
|
|
106
api/go.sum
106
api/go.sum
|
@ -1,41 +1,56 @@
|
|||
github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
|
||||
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||
github.com/fluxcd/pkg/apis/kustomize v1.0.0 h1:5T2b/mRZiGWtP7fvSU8gZOApIc06H6SdLX3MlsE6LRo=
|
||||
github.com/fluxcd/pkg/apis/kustomize v1.0.0/go.mod h1:XaDYlKxrf9D2zZWcZ0BnSIqGtcm8mdNtJGzZWYjCnQo=
|
||||
github.com/fluxcd/pkg/apis/meta v1.0.0 h1:i9IGHd/VNEZELX7mepkiYFbJxs2J5znaB4cN9z2nPm8=
|
||||
github.com/fluxcd/pkg/apis/meta v1.0.0/go.mod h1:04ZdpZYm1x+aL93K4daNHW1UX6E8K7Gyf5za9OhrE+U=
|
||||
github.com/go-logr/logr v1.2.0/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
|
||||
github.com/go-logr/logr v1.2.3 h1:2DntVwHkVopvECVRSlL5PSo9eG+cAkDCuckLubN+rq0=
|
||||
github.com/go-logr/logr v1.2.3/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
|
||||
github.com/fluxcd/pkg/apis/kustomize v1.10.0 h1:47EeSzkQvlQZdH92vHMe2lK2iR8aOSEJq95avw5idts=
|
||||
github.com/fluxcd/pkg/apis/kustomize v1.10.0/go.mod h1:UsqMV4sqNa1Yg0pmTsdkHRJr7bafBOENIJoAN+3ezaQ=
|
||||
github.com/fluxcd/pkg/apis/meta v1.12.0 h1:XW15TKZieC2b7MN8VS85stqZJOx+/b8jATQ/xTUhVYg=
|
||||
github.com/fluxcd/pkg/apis/meta v1.12.0/go.mod h1:+son1Va60x2eiDcTwd7lcctbI6C+K3gM7R+ULmEq1SI=
|
||||
github.com/fxamacker/cbor/v2 v2.8.0 h1:fFtUGXUzXPHTIUdne5+zzMPTfffl3RD5qYnkY40vtxU=
|
||||
github.com/fxamacker/cbor/v2 v2.8.0/go.mod h1:vM4b+DJCtHn+zz7h3FFp/hDAI9WNWCsZj23V5ytsSxQ=
|
||||
github.com/go-logr/logr v1.4.2 h1:6pFjapn8bFcIbiKo3XT4j/BhANplGihG6tvd+8rYgrY=
|
||||
github.com/go-logr/logr v1.4.2/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
|
||||
github.com/go-task/slim-sprig/v3 v3.0.0 h1:sUs3vkvUymDpBKi3qH1YSqBQk9+9D/8M2mN1vB6EwHI=
|
||||
github.com/go-task/slim-sprig/v3 v3.0.0/go.mod h1:W848ghGpv3Qj3dhTPRyJypKRiqCdHZiAzKg9hl15HA8=
|
||||
github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
|
||||
github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
|
||||
github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38=
|
||||
github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
|
||||
github.com/google/go-cmp v0.7.0 h1:wk8382ETsv4JYUZwIsn6YpYiWiBsYLSJiTsyBybVuN8=
|
||||
github.com/google/go-cmp v0.7.0/go.mod h1:pXiqmnSA92OHEEa9HXL2W4E7lf9JzCmGVUdgjX3N/iU=
|
||||
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
||||
github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
|
||||
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
||||
github.com/google/pprof v0.0.0-20241029153458-d1b30febd7db h1:097atOisP2aRj7vFgYQBbFN4U4JNXUNYpxael3UzMyo=
|
||||
github.com/google/pprof v0.0.0-20241029153458-d1b30febd7db/go.mod h1:vavhavw2zAxS5dIdcRluK6cSGGPlZynqzFM8NdvU144=
|
||||
github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM=
|
||||
github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo=
|
||||
github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
|
||||
github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
|
||||
github.com/kr/pretty v0.2.1 h1:Fmg33tUaq4/8ym9TJN1x7sLJnHVwhP33CNkpYV/7rwI=
|
||||
github.com/kr/pretty v0.2.1/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
|
||||
github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
|
||||
github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
|
||||
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
|
||||
github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk=
|
||||
github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
|
||||
github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
|
||||
github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
||||
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd h1:TRLaZ9cD/w8PVh93nsPXa1VrQ6jlwL5oN8l14QlcNfg=
|
||||
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
||||
github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9Gz0M=
|
||||
github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
|
||||
github.com/onsi/ginkgo/v2 v2.6.0 h1:9t9b9vRUbFq3C4qKFCGkVuq/fIHji802N1nrtkh1mNc=
|
||||
github.com/onsi/gomega v1.24.1 h1:KORJXNNTzJXzu4ScJWssJfJMnJ+2QJqhoQSRwNlze9E=
|
||||
github.com/onsi/ginkgo/v2 v2.22.0 h1:Yed107/8DjTr0lKCNt7Dn8yQ6ybuDRQoMGrNFKzMfHg=
|
||||
github.com/onsi/ginkgo/v2 v2.22.0/go.mod h1:7Du3c42kxCUegi0IImZ1wUQzMBVecgIHjR1C+NkhLQo=
|
||||
github.com/onsi/gomega v1.36.1 h1:bJDPBO7ibjxcbHMgSCoo4Yj18UWbKDlLwX1x9sybDcw=
|
||||
github.com/onsi/gomega v1.36.1/go.mod h1:PvZbdDc8J6XJEpDK4HCuRBm8a6Fzp9/DmhC9C7yFlog=
|
||||
github.com/pkg/diff v0.0.0-20210226163009-20ebb0f2a09e/go.mod h1:pJLUxLENpZxwdsKMEsNbx1VGcRFpLqf3715MtcvvzbA=
|
||||
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||
github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
|
||||
github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs=
|
||||
github.com/rogpeppe/go-internal v1.13.1 h1:KvO1DLK/DRN07sQ1LQKScxyZJuNnedQ5/wKSR38lUII=
|
||||
github.com/rogpeppe/go-internal v1.13.1/go.mod h1:uMEvuHeurkdAXX61udpOXGD/AzZDWNMNyH2VO9fmH0o=
|
||||
github.com/spf13/pflag v1.0.6 h1:jFzHGLGAlb3ruxLB8MhbI6A8+AQX/2eW4qeyNZXNp2o=
|
||||
github.com/spf13/pflag v1.0.6/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
|
||||
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
|
||||
github.com/stretchr/testify v1.8.0 h1:pSgiaMZlXftHpm5L7V1+rVB+AZJydKsMxsQBIJw4PKk=
|
||||
github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=
|
||||
github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
|
||||
github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=
|
||||
github.com/x448/float16 v0.8.4/go.mod h1:14CWIYCyZA/cWjXOioeEpHeN/83MdbZDRQHoFcYsOfg=
|
||||
github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
||||
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
||||
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||
|
@ -47,23 +62,26 @@ golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn
|
|||
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||
golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
|
||||
golang.org/x/net v0.7.0 h1:rJrUqqhjsgNp7KqAIc25s9pZnjU7TUcSY7HcVZjdn1g=
|
||||
golang.org/x/net v0.7.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
|
||||
golang.org/x/net v0.40.0 h1:79Xs7wF06Gbdcg4kdCCIQArK11Z1hr5POQ6+fIYHNuY=
|
||||
golang.org/x/net v0.40.0/go.mod h1:y0hY0exeL2Pku80/zKK7tpntoX23cqL3Oa6njdgRtds=
|
||||
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||
golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||
golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||
golang.org/x/sys v0.5.0 h1:MUK/U/4lj1t1oPg0HfuXDN/Z1wv31ZJ/YcPiGccS4DU=
|
||||
golang.org/x/sys v0.33.0 h1:q3i8TbbEz+JRD9ywIRlyRAQbM0qF7hu24q3teo2hbuw=
|
||||
golang.org/x/sys v0.33.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k=
|
||||
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
||||
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||
golang.org/x/text v0.7.0 h1:4BRB4x83lYWy72KwLD/qYDuTu7q9PjSagHvijDw7cLo=
|
||||
golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
|
||||
golang.org/x/text v0.25.0 h1:qVyWApTSYLk/drJRO5mDlNYskwQznZmkpV2c8q9zls4=
|
||||
golang.org/x/text v0.25.0/go.mod h1:WEdwpYrmk1qmdHvhkSTNPm3app7v4rsT8F2UD6+VHIA=
|
||||
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
||||
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
||||
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
||||
golang.org/x/tools v0.33.0 h1:4qz2S3zmRxbGIhDIAgjxvFutSvH5EfnsYrRBj0UI0bc=
|
||||
golang.org/x/tools v0.33.0/go.mod h1:CIJMaWEY88juyUfo7UbgPqbC8rU2OqfAV1h2Qp0oMYI=
|
||||
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||
|
@ -73,24 +91,26 @@ gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntN
|
|||
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
|
||||
gopkg.in/inf.v0 v0.9.1 h1:73M5CoZyi3ZLMOyDlQh031Cx6N9NDJ2Vvfl76EDAgDc=
|
||||
gopkg.in/inf.v0 v0.9.1/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw=
|
||||
gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
|
||||
gopkg.in/yaml.v2 v2.4.0 h1:D8xgwECY7CYvx+Y2n4sBz93Jn9JRvxdiyyo8CTfuKaY=
|
||||
gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
|
||||
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
|
||||
k8s.io/api v0.26.3 h1:emf74GIQMTik01Aum9dPP0gAypL8JTLl/lHa4V9RFSU=
|
||||
k8s.io/apiextensions-apiserver v0.26.3 h1:5PGMm3oEzdB1W/FTMgGIDmm100vn7IaUP5er36dB+YE=
|
||||
k8s.io/apiextensions-apiserver v0.26.3/go.mod h1:jdA5MdjNWGP+njw1EKMZc64xAT5fIhN6VJrElV3sfpQ=
|
||||
k8s.io/apimachinery v0.26.3 h1:dQx6PNETJ7nODU3XPtrwkfuubs6w7sX0M8n61zHIV/k=
|
||||
k8s.io/apimachinery v0.26.3/go.mod h1:ats7nN1LExKHvJ9TmwootT00Yz05MuYqPXEXaVeOy5I=
|
||||
k8s.io/klog/v2 v2.80.1 h1:atnLQ121W371wYYFawwYx1aEY2eUfs4l3J72wtgAwV4=
|
||||
k8s.io/klog/v2 v2.80.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
|
||||
k8s.io/utils v0.0.0-20221128185143-99ec85e7a448 h1:KTgPnR10d5zhztWptI952TNtt/4u5h3IzDXkdIMuo2Y=
|
||||
k8s.io/utils v0.0.0-20221128185143-99ec85e7a448/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
|
||||
sigs.k8s.io/controller-runtime v0.14.6 h1:oxstGVvXGNnMvY7TAESYk+lzr6S3V5VFxQ6d92KcwQA=
|
||||
sigs.k8s.io/controller-runtime v0.14.6/go.mod h1:WqIdsAY6JBsjfc/CqO0CORmNtoCtE4S6qbPc9s68h+0=
|
||||
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo=
|
||||
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0=
|
||||
sigs.k8s.io/structured-merge-diff/v4 v4.2.3 h1:PRbqxJClWWYMNV1dhaG4NsibJbArud9kFxnAMREiWFE=
|
||||
sigs.k8s.io/structured-merge-diff/v4 v4.2.3/go.mod h1:qjx8mGObPmV2aSZepjQjbmb2ihdVs8cGKBraizNC69E=
|
||||
sigs.k8s.io/yaml v1.3.0 h1:a2VclLzOGrwOHDiV8EfBGhvjHvP46CtW5j6POvhYGGo=
|
||||
sigs.k8s.io/yaml v1.3.0/go.mod h1:GeOyir5tyXNByN85N/dRIT9es5UQNerPYEKK56eTBm8=
|
||||
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||
k8s.io/api v0.33.0 h1:yTgZVn1XEe6opVpP1FylmNrIFWuDqe2H0V8CT5gxfIU=
|
||||
k8s.io/api v0.33.0/go.mod h1:CTO61ECK/KU7haa3qq8sarQ0biLq2ju405IZAd9zsiM=
|
||||
k8s.io/apiextensions-apiserver v0.33.0 h1:d2qpYL7Mngbsc1taA4IjJPRJ9ilnsXIrndH+r9IimOs=
|
||||
k8s.io/apiextensions-apiserver v0.33.0/go.mod h1:VeJ8u9dEEN+tbETo+lFkwaaZPg6uFKLGj5vyNEwwSzc=
|
||||
k8s.io/apimachinery v0.33.0 h1:1a6kHrJxb2hs4t8EE5wuR/WxKDwGN1FKH3JvDtA0CIQ=
|
||||
k8s.io/apimachinery v0.33.0/go.mod h1:BHW0YOu7n22fFv/JkYOEfkUYNRN0fj0BlvMFWA7b+SM=
|
||||
k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
|
||||
k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
|
||||
k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e h1:KqK5c/ghOm8xkHYhlodbp6i6+r+ChV2vuAuVRdFbLro=
|
||||
k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
|
||||
sigs.k8s.io/controller-runtime v0.21.0 h1:CYfjpEuicjUecRk+KAeyYh+ouUBn4llGyDYytIGcJS8=
|
||||
sigs.k8s.io/controller-runtime v0.21.0/go.mod h1:OSg14+F65eWqIu4DceX7k/+QRAbTTvxeQSNSOQpukWM=
|
||||
sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 h1:gBQPwqORJ8d8/YNZWEjoZs7npUVDpVXUUOFfW6CgAqE=
|
||||
sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8/go.mod h1:mdzfpAEoE6DHQEN0uh9ZbOCuHbLK5wOm7dK4ctXE9Tg=
|
||||
sigs.k8s.io/randfill v0.0.0-20250304075658-069ef1bbf016/go.mod h1:XeLlZ/jmk4i1HRopwe7/aU3H5n1zNUcX6TM94b3QxOY=
|
||||
sigs.k8s.io/randfill v1.0.0 h1:JfjMILfT8A6RbawdsK2JXGBR5AQVfd+9TbzrlneTyrU=
|
||||
sigs.k8s.io/randfill v1.0.0/go.mod h1:XeLlZ/jmk4i1HRopwe7/aU3H5n1zNUcX6TM94b3QxOY=
|
||||
sigs.k8s.io/structured-merge-diff/v4 v4.7.0 h1:qPeWmscJcXP0snki5IYF79Z8xrl8ETFxgMd7wez1XkI=
|
||||
sigs.k8s.io/structured-merge-diff/v4 v4.7.0/go.mod h1:dDy58f92j70zLsuZVuUX5Wp9vtxXpaZnkPGWeqDfCps=
|
||||
sigs.k8s.io/yaml v1.4.0 h1:Mk1wCc2gy/F0THH0TAp1QYyJNzRm2KCLy3o5ASXVI5E=
|
||||
sigs.k8s.io/yaml v1.4.0/go.mod h1:Ejl7/uTz7PSA4eKMyQCUTnhZYNmLIl+5c2lQPGR2BPY=
|
||||
|
|
|
@ -1,51 +0,0 @@
|
|||
/*
|
||||
Copyright 2023 The Flux authors
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package v1
|
||||
|
||||
const (
|
||||
// HealthyCondition represents the last recorded
|
||||
// health assessment result.
|
||||
HealthyCondition string = "Healthy"
|
||||
|
||||
// PruneFailedReason represents the fact that the
|
||||
// pruning of the Kustomization failed.
|
||||
PruneFailedReason string = "PruneFailed"
|
||||
|
||||
// ArtifactFailedReason represents the fact that the
|
||||
// source artifact download failed.
|
||||
ArtifactFailedReason string = "ArtifactFailed"
|
||||
|
||||
// BuildFailedReason represents the fact that the
|
||||
// kustomize build failed.
|
||||
BuildFailedReason string = "BuildFailed"
|
||||
|
||||
// HealthCheckFailedReason represents the fact that
|
||||
// one of the health checks failed.
|
||||
HealthCheckFailedReason string = "HealthCheckFailed"
|
||||
|
||||
// DependencyNotReadyReason represents the fact that
|
||||
// one of the dependencies is not ready.
|
||||
DependencyNotReadyReason string = "DependencyNotReady"
|
||||
|
||||
// ReconciliationSucceededReason represents the fact that
|
||||
// the reconciliation succeeded.
|
||||
ReconciliationSucceededReason string = "ReconciliationSucceeded"
|
||||
|
||||
// ReconciliationFailedReason represents the fact that
|
||||
// the reconciliation failed.
|
||||
ReconciliationFailedReason string = "ReconciliationFailed"
|
||||
)
|
|
@ -30,7 +30,14 @@ const (
|
|||
MaxConditionMessageLength = 20000
|
||||
EnabledValue = "enabled"
|
||||
DisabledValue = "disabled"
|
||||
MergeValue = "merge"
|
||||
MergeValue = "Merge"
|
||||
IfNotPresentValue = "IfNotPresent"
|
||||
IgnoreValue = "Ignore"
|
||||
|
||||
DeletionPolicyMirrorPrune = "MirrorPrune"
|
||||
DeletionPolicyDelete = "Delete"
|
||||
DeletionPolicyWaitForTermination = "WaitForTermination"
|
||||
DeletionPolicyOrphan = "Orphan"
|
||||
)
|
||||
|
||||
// KustomizationSpec defines the configuration to calculate the desired state
|
||||
|
@ -53,6 +60,8 @@ type KustomizationSpec struct {
|
|||
Decryption *Decryption `json:"decryption,omitempty"`
|
||||
|
||||
// The interval at which to reconcile the Kustomization.
|
||||
// This interval is approximate and may be subject to jitter to ensure
|
||||
// efficient use of resources.
|
||||
// +kubebuilder:validation:Type=string
|
||||
// +kubebuilder:validation:Pattern="^([0-9]+(\\.[0-9]+)?(ms|s|m|h))+$"
|
||||
// +required
|
||||
|
@ -91,10 +100,32 @@ type KustomizationSpec struct {
|
|||
// +required
|
||||
Prune bool `json:"prune"`
|
||||
|
||||
// DeletionPolicy can be used to control garbage collection when this
|
||||
// Kustomization is deleted. Valid values are ('MirrorPrune', 'Delete',
|
||||
// 'WaitForTermination', 'Orphan'). 'MirrorPrune' mirrors the Prune field
|
||||
// (orphan if false, delete if true). Defaults to 'MirrorPrune'.
|
||||
// +kubebuilder:validation:Enum=MirrorPrune;Delete;WaitForTermination;Orphan
|
||||
// +optional
|
||||
DeletionPolicy string `json:"deletionPolicy,omitempty"`
|
||||
|
||||
// A list of resources to be included in the health assessment.
|
||||
// +optional
|
||||
HealthChecks []meta.NamespacedObjectKindReference `json:"healthChecks,omitempty"`
|
||||
|
||||
// NamePrefix will prefix the names of all managed resources.
|
||||
// +kubebuilder:validation:MinLength=1
|
||||
// +kubebuilder:validation:MaxLength=200
|
||||
// +kubebuilder:validation:Optional
|
||||
// +optional
|
||||
NamePrefix string `json:"namePrefix,omitempty" yaml:"namePrefix,omitempty"`
|
||||
|
||||
// NameSuffix will suffix the names of all managed resources.
|
||||
// +kubebuilder:validation:MinLength=1
|
||||
// +kubebuilder:validation:MaxLength=200
|
||||
// +kubebuilder:validation:Optional
|
||||
// +optional
|
||||
NameSuffix string `json:"nameSuffix,omitempty" yaml:"nameSuffix,omitempty"`
|
||||
|
||||
// Strategic merge and JSON patches, defined as inline YAML objects,
|
||||
// capable of targeting objects based on kind, label and annotation selectors.
|
||||
// +optional
|
||||
|
@ -149,6 +180,12 @@ type KustomizationSpec struct {
|
|||
// Components specifies relative paths to specifications of other Components.
|
||||
// +optional
|
||||
Components []string `json:"components,omitempty"`
|
||||
|
||||
// HealthCheckExprs is a list of healthcheck expressions for evaluating the
|
||||
// health of custom resources using Common Expression Language (CEL).
|
||||
// The expressions are evaluated only when Wait or HealthChecks are specified.
|
||||
// +optional
|
||||
HealthCheckExprs []kustomize.CustomHealthCheck `json:"healthCheckExprs,omitempty"`
|
||||
}
|
||||
|
||||
// CommonMetadata defines the common labels and annotations.
|
||||
|
@ -169,7 +206,18 @@ type Decryption struct {
|
|||
// +required
|
||||
Provider string `json:"provider"`
|
||||
|
||||
// ServiceAccountName is the name of the service account used to
|
||||
// authenticate with KMS services from cloud providers. If a
|
||||
// static credential for a given cloud provider is defined
|
||||
// inside the Secret referenced by SecretRef, that static
|
||||
// credential takes priority.
|
||||
// +optional
|
||||
ServiceAccountName string `json:"serviceAccountName,omitempty"`
|
||||
|
||||
// The secret name containing the private OpenPGP keys used for decryption.
|
||||
// A static credential for a cloud provider defined inside the Secret
|
||||
// takes priority to secret-less authentication with the ServiceAccountName
|
||||
// field.
|
||||
// +optional
|
||||
SecretRef *meta.LocalObjectReference `json:"secretRef,omitempty"`
|
||||
}
|
||||
|
@ -233,6 +281,14 @@ type KustomizationStatus struct {
|
|||
// +optional
|
||||
LastAppliedRevision string `json:"lastAppliedRevision,omitempty"`
|
||||
|
||||
// The last successfully applied origin revision.
|
||||
// Equals the origin revision of the applied Artifact from the referenced Source.
|
||||
// Usually present on the Metadata of the applied Artifact and depends on the
|
||||
// Source type, e.g. for OCI it's the value associated with the key
|
||||
// "org.opencontainers.image.revision".
|
||||
// +optional
|
||||
LastAppliedOriginRevision string `json:"lastAppliedOriginRevision,omitempty"`
|
||||
|
||||
// LastAttemptedRevision is the revision of the last reconciliation attempt.
|
||||
// +optional
|
||||
LastAttemptedRevision string `json:"lastAttemptedRevision,omitempty"`
|
||||
|
@ -269,6 +325,14 @@ func (in Kustomization) GetRequeueAfter() time.Duration {
|
|||
return in.Spec.Interval.Duration
|
||||
}
|
||||
|
||||
// GetDeletionPolicy returns the deletion policy and default value if not specified.
|
||||
func (in Kustomization) GetDeletionPolicy() string {
|
||||
if in.Spec.DeletionPolicy == "" {
|
||||
return DeletionPolicyMirrorPrune
|
||||
}
|
||||
return in.Spec.DeletionPolicy
|
||||
}
|
||||
|
||||
// GetDependsOn returns the list of dependencies across-namespaces.
|
||||
func (in Kustomization) GetDependsOn() []meta.NamespacedObjectReference {
|
||||
return in.Spec.DependsOn
|
||||
|
@ -285,7 +349,6 @@ func (in *Kustomization) SetConditions(conditions []metav1.Condition) {
|
|||
}
|
||||
|
||||
// +genclient
|
||||
// +genclient:Namespaced
|
||||
// +kubebuilder:storageversion
|
||||
// +kubebuilder:object:root=true
|
||||
// +kubebuilder:resource:shortName=ks
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
//go:build !ignore_autogenerated
|
||||
// +build !ignore_autogenerated
|
||||
|
||||
/*
|
||||
Copyright 2023 The Flux authors
|
||||
|
@ -213,6 +212,11 @@ func (in *KustomizationSpec) DeepCopyInto(out *KustomizationSpec) {
|
|||
*out = make([]string, len(*in))
|
||||
copy(*out, *in)
|
||||
}
|
||||
if in.HealthCheckExprs != nil {
|
||||
in, out := &in.HealthCheckExprs, &out.HealthCheckExprs
|
||||
*out = make([]kustomize.CustomHealthCheck, len(*in))
|
||||
copy(*out, *in)
|
||||
}
|
||||
}
|
||||
|
||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new KustomizationSpec.
|
||||
|
|
|
@ -271,7 +271,6 @@ const (
|
|||
)
|
||||
|
||||
// +genclient
|
||||
// +genclient:Namespaced
|
||||
// +kubebuilder:object:root=true
|
||||
// +kubebuilder:resource:shortName=ks
|
||||
// +kubebuilder:subresource:status
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
//go:build !ignore_autogenerated
|
||||
// +build !ignore_autogenerated
|
||||
|
||||
/*
|
||||
Copyright 2023 The Flux authors
|
||||
|
|
|
@ -304,7 +304,6 @@ func (in *Kustomization) GetStatusConditions() *[]metav1.Condition {
|
|||
}
|
||||
|
||||
// +genclient
|
||||
// +genclient:Namespaced
|
||||
// +kubebuilder:object:root=true
|
||||
// +kubebuilder:resource:shortName=ks
|
||||
// +kubebuilder:subresource:status
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
//go:build !ignore_autogenerated
|
||||
// +build !ignore_autogenerated
|
||||
|
||||
/*
|
||||
Copyright 2023 The Flux authors
|
||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -2,8 +2,8 @@ apiVersion: kustomize.config.k8s.io/v1beta1
|
|||
kind: Kustomization
|
||||
namespace: kustomize-system
|
||||
resources:
|
||||
- https://github.com/fluxcd/source-controller/releases/download/v1.0.0-rc.2/source-controller.crds.yaml
|
||||
- https://github.com/fluxcd/source-controller/releases/download/v1.0.0-rc.2/source-controller.deployment.yaml
|
||||
- https://github.com/fluxcd/source-controller/releases/download/v1.6.0/source-controller.crds.yaml
|
||||
- https://github.com/fluxcd/source-controller/releases/download/v1.6.0/source-controller.deployment.yaml
|
||||
- ../crd
|
||||
- ../rbac
|
||||
- ../manager
|
||||
|
|
|
@ -5,4 +5,4 @@ resources:
|
|||
images:
|
||||
- name: fluxcd/kustomize-controller
|
||||
newName: fluxcd/kustomize-controller
|
||||
newTag: v1.0.0-rc.2
|
||||
newTag: v1.6.0
|
||||
|
|
|
@ -2,7 +2,6 @@
|
|||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
name: manager-role
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
@ -22,6 +21,12 @@ rules:
|
|||
verbs:
|
||||
- create
|
||||
- patch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- serviceaccounts/token
|
||||
verbs:
|
||||
- create
|
||||
- apiGroups:
|
||||
- kustomize.toolkit.fluxcd.io
|
||||
resources:
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
apiVersion: source.toolkit.fluxcd.io/v1beta2
|
||||
apiVersion: source.toolkit.fluxcd.io/v1
|
||||
kind: OCIRepository
|
||||
metadata:
|
||||
name: oci
|
||||
|
|
|
@ -125,7 +125,9 @@ Kubernetes meta/v1.Duration
|
|||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<p>The interval at which to reconcile the Kustomization.</p>
|
||||
<p>The interval at which to reconcile the Kustomization.
|
||||
This interval is approximate and may be subject to jitter to ensure
|
||||
efficient use of resources.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
|
@ -206,6 +208,21 @@ bool
|
|||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>deletionPolicy</code><br>
|
||||
<em>
|
||||
string
|
||||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<em>(Optional)</em>
|
||||
<p>DeletionPolicy can be used to control garbage collection when this
|
||||
Kustomization is deleted. Valid values are (‘MirrorPrune’, ‘Delete’,
|
||||
‘WaitForTermination’, ‘Orphan’). ‘MirrorPrune’ mirrors the Prune field
|
||||
(orphan if false, delete if true). Defaults to ‘MirrorPrune’.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>healthChecks</code><br>
|
||||
<em>
|
||||
<a href="https://godoc.org/github.com/fluxcd/pkg/apis/meta#NamespacedObjectKindReference">
|
||||
|
@ -220,6 +237,30 @@ bool
|
|||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>namePrefix</code><br>
|
||||
<em>
|
||||
string
|
||||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<em>(Optional)</em>
|
||||
<p>NamePrefix will prefix the names of all managed resources.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>nameSuffix</code><br>
|
||||
<em>
|
||||
string
|
||||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<em>(Optional)</em>
|
||||
<p>NameSuffix will suffix the names of all managed resources.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>patches</code><br>
|
||||
<em>
|
||||
<a href="https://godoc.org/github.com/fluxcd/pkg/apis/kustomize#Patch">
|
||||
|
@ -354,6 +395,22 @@ resources. When enabled, the HealthChecks are ignored. Defaults to false.</p>
|
|||
<p>Components specifies relative paths to specifications of other Components.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>healthCheckExprs</code><br>
|
||||
<em>
|
||||
<a href="https://godoc.org/github.com/fluxcd/pkg/apis/kustomize#CustomHealthCheck">
|
||||
[]github.com/fluxcd/pkg/apis/kustomize.CustomHealthCheck
|
||||
</a>
|
||||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<em>(Optional)</em>
|
||||
<p>HealthCheckExprs is a list of healthcheck expressions for evaluating the
|
||||
health of custom resources using Common Expression Language (CEL).
|
||||
The expressions are evaluated only when Wait or HealthChecks are specified.</p>
|
||||
</td>
|
||||
</tr>
|
||||
</table>
|
||||
</td>
|
||||
</tr>
|
||||
|
@ -517,6 +574,22 @@ string
|
|||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>serviceAccountName</code><br>
|
||||
<em>
|
||||
string
|
||||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<em>(Optional)</em>
|
||||
<p>ServiceAccountName is the name of the service account used to
|
||||
authenticate with KMS services from cloud providers. If a
|
||||
static credential for a given cloud provider is defined
|
||||
inside the Secret referenced by SecretRef, that static
|
||||
credential takes priority.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>secretRef</code><br>
|
||||
<em>
|
||||
<a href="https://godoc.org/github.com/fluxcd/pkg/apis/meta#LocalObjectReference">
|
||||
|
@ -526,7 +599,10 @@ github.com/fluxcd/pkg/apis/meta.LocalObjectReference
|
|||
</td>
|
||||
<td>
|
||||
<em>(Optional)</em>
|
||||
<p>The secret name containing the private OpenPGP keys used for decryption.</p>
|
||||
<p>The secret name containing the private OpenPGP keys used for decryption.
|
||||
A static credential for a cloud provider defined inside the Secret
|
||||
takes priority to secret-less authentication with the ServiceAccountName
|
||||
field.</p>
|
||||
</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
|
@ -607,7 +683,9 @@ Kubernetes meta/v1.Duration
|
|||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<p>The interval at which to reconcile the Kustomization.</p>
|
||||
<p>The interval at which to reconcile the Kustomization.
|
||||
This interval is approximate and may be subject to jitter to ensure
|
||||
efficient use of resources.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
|
@ -688,6 +766,21 @@ bool
|
|||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>deletionPolicy</code><br>
|
||||
<em>
|
||||
string
|
||||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<em>(Optional)</em>
|
||||
<p>DeletionPolicy can be used to control garbage collection when this
|
||||
Kustomization is deleted. Valid values are (‘MirrorPrune’, ‘Delete’,
|
||||
‘WaitForTermination’, ‘Orphan’). ‘MirrorPrune’ mirrors the Prune field
|
||||
(orphan if false, delete if true). Defaults to ‘MirrorPrune’.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>healthChecks</code><br>
|
||||
<em>
|
||||
<a href="https://godoc.org/github.com/fluxcd/pkg/apis/meta#NamespacedObjectKindReference">
|
||||
|
@ -702,6 +795,30 @@ bool
|
|||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>namePrefix</code><br>
|
||||
<em>
|
||||
string
|
||||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<em>(Optional)</em>
|
||||
<p>NamePrefix will prefix the names of all managed resources.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>nameSuffix</code><br>
|
||||
<em>
|
||||
string
|
||||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<em>(Optional)</em>
|
||||
<p>NameSuffix will suffix the names of all managed resources.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>patches</code><br>
|
||||
<em>
|
||||
<a href="https://godoc.org/github.com/fluxcd/pkg/apis/kustomize#Patch">
|
||||
|
@ -836,6 +953,22 @@ resources. When enabled, the HealthChecks are ignored. Defaults to false.</p>
|
|||
<p>Components specifies relative paths to specifications of other Components.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>healthCheckExprs</code><br>
|
||||
<em>
|
||||
<a href="https://godoc.org/github.com/fluxcd/pkg/apis/kustomize#CustomHealthCheck">
|
||||
[]github.com/fluxcd/pkg/apis/kustomize.CustomHealthCheck
|
||||
</a>
|
||||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<em>(Optional)</em>
|
||||
<p>HealthCheckExprs is a list of healthcheck expressions for evaluating the
|
||||
health of custom resources using Common Expression Language (CEL).
|
||||
The expressions are evaluated only when Wait or HealthChecks are specified.</p>
|
||||
</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
</div>
|
||||
|
@ -912,6 +1045,22 @@ Equals the Revision of the applied Artifact from the referenced Source.</p>
|
|||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>lastAppliedOriginRevision</code><br>
|
||||
<em>
|
||||
string
|
||||
</em>
|
||||
</td>
|
||||
<td>
|
||||
<em>(Optional)</em>
|
||||
<p>The last successfully applied origin revision.
|
||||
Equals the origin revision of the applied Artifact from the referenced Source.
|
||||
Usually present on the Metadata of the applied Artifact and depends on the
|
||||
Source type, e.g. for OCI it’s the value associated with the key
|
||||
“org.opencontainers.image.revision”.</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>lastAttemptedRevision</code><br>
|
||||
<em>
|
||||
string
|
||||
|
|
|
@ -5,12 +5,12 @@ of Kubernetes objects generated with Kustomize.
|
|||
|
||||
## Specification
|
||||
|
||||
- [Kustomization CRD](kustomization.md)
|
||||
+ [Example](kustomization.md#example)
|
||||
+ [Writing a Kustomization spec](kustomization.md#writing-a-kustomization-spec)
|
||||
+ [Working with Kustomizations](kustomization.md#working-with-kustomizations)
|
||||
* [Recommended settings](kustomization.md#recommended-settings)
|
||||
+ [Kustomization Status](kustomization.md#kustomization-status)
|
||||
- [Kustomization CRD](kustomizations.md)
|
||||
+ [Example](kustomizations.md#example)
|
||||
+ [Writing a Kustomization spec](kustomizations.md#writing-a-kustomization-spec)
|
||||
+ [Working with Kustomizations](kustomizations.md#working-with-kustomizations)
|
||||
* [Recommended settings](kustomizations.md#recommended-settings)
|
||||
+ [Kustomization Status](kustomizations.md#kustomization-status)
|
||||
|
||||
## Implementation
|
||||
|
||||
|
|
|
@ -115,8 +115,8 @@ Artifact containing the YAML manifests. It has two required fields:
|
|||
|
||||
- `kind`: The Kind of the referred Source object. Supported Source types:
|
||||
+ [GitRepository](https://github.com/fluxcd/source-controller/blob/main/docs/spec/v1/gitrepositories.md)
|
||||
+ [OCIRepository](https://github.com/fluxcd/source-controller/blob/main/docs/spec/v1beta2/ocirepositories.md)
|
||||
+ [Bucket](https://github.com/fluxcd/source-controller/blob/main/docs/spec/v1beta2/buckets.md)
|
||||
+ [OCIRepository](https://github.com/fluxcd/source-controller/blob/main/docs/spec/v1/ocirepositories.md)
|
||||
+ [Bucket](https://github.com/fluxcd/source-controller/blob/main/docs/spec/v1/buckets.md)
|
||||
- `name`: The Name of the referred Source object.
|
||||
|
||||
#### Cross-namespace references
|
||||
|
@ -169,6 +169,47 @@ kustomize.toolkit.fluxcd.io/prune: disabled
|
|||
For details on how the controller tracks Kubernetes objects and determines what
|
||||
to garbage collect, see [`.status.inventory`](#inventory).
|
||||
|
||||
### Deletion policy
|
||||
|
||||
`.spec.deletionPolicy` is an optional field that allows control over
|
||||
garbage collection when a Kustomization object is deleted. The default behavior
|
||||
is to mirror the configuration of [`.spec.prune`](#prune).
|
||||
|
||||
Valid values:
|
||||
|
||||
- `MirrorPrune` (default) - The managed resources will be deleted if `prune` is
|
||||
`true` and orphaned if `false`.
|
||||
- `Delete` - Ensure the managed resources are deleted before the Kustomization
|
||||
is deleted.
|
||||
- `WaitForTermination` - Ensure the managed resources are deleted and wait for
|
||||
termination before the Kustomization is deleted.
|
||||
- `Orphan` - Leave the managed resources when the Kustomization is deleted.
|
||||
|
||||
The `WaitForTermination` deletion policy blocks and waits for the managed
|
||||
resources to be removed from etcd by the Kubernetes garbage collector.
|
||||
The wait time is determined by the `.spec.timeout` field. If a timeout occurs,
|
||||
the controller will stop waiting for the deletion of the resources,
|
||||
log an error and will allow the Kustomization to be deleted.
|
||||
|
||||
For special cases when the managed resources are removed by other means (e.g.
|
||||
the deletion of the namespace specified with
|
||||
[`.spec.targetNamespace`](#target-namespace)), you can set the deletion policy
|
||||
to `Orphan`:
|
||||
|
||||
```yaml
|
||||
---
|
||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
||||
kind: Kustomization
|
||||
metadata:
|
||||
name: app
|
||||
namespace: default
|
||||
spec:
|
||||
# ...omitted for brevity
|
||||
targetNamespace: app-namespace
|
||||
prune: true
|
||||
deletionPolicy: Orphan
|
||||
```
|
||||
|
||||
### Interval
|
||||
|
||||
`.spec.interval` is a required field that specifies the interval at which the
|
||||
|
@ -186,6 +227,11 @@ If the `.metadata.generation` of a resource changes (due to e.g. a change to
|
|||
the spec) or the Source revision changes (which generates a Kubernetes event),
|
||||
this is handled instantly outside the interval window.
|
||||
|
||||
**Note:** The controller can be configured to apply a jitter to the interval in
|
||||
order to distribute the load more evenly when multiple Kustomization objects are
|
||||
set up with the same interval. For more information, please refer to the
|
||||
[kustomize-controller configuration options](https://fluxcd.io/flux/components/kustomize/options/).
|
||||
|
||||
### Retry interval
|
||||
|
||||
`.spec.retryInterval` is an optional field to specify the interval at which to
|
||||
|
@ -211,7 +257,8 @@ overrides the [Kustomize `namespace`](https://kubectl.docs.kubernetes.io/referen
|
|||
|
||||
While `.spec.targetNamespace` is optional, if this field is non-empty then the
|
||||
Kubernetes namespace being pointed to must exist prior to the Kustomization
|
||||
being applied, kustomize-controller will not create the namespace.
|
||||
being applied or be defined by a manifest included in the Kustomization.
|
||||
kustomize-controller will not create the namespace automatically.
|
||||
|
||||
### Suspend
|
||||
|
||||
|
@ -286,11 +333,11 @@ spec:
|
|||
kind: GitRepository
|
||||
name: webapp
|
||||
healthChecks:
|
||||
- apiVersion: helm.toolkit.fluxcd.io/v2beta1
|
||||
- apiVersion: helm.toolkit.fluxcd.io/v2
|
||||
kind: HelmRelease
|
||||
name: frontend
|
||||
namespace: dev
|
||||
- apiVersion: helm.toolkit.fluxcd.io/v2beta1
|
||||
- apiVersion: helm.toolkit.fluxcd.io/v2
|
||||
kind: HelmRelease
|
||||
name: backend
|
||||
namespace: dev
|
||||
|
@ -300,6 +347,69 @@ spec:
|
|||
If all the HelmRelease objects are successfully installed or upgraded, then
|
||||
the Kustomization will be marked as ready.
|
||||
|
||||
### Health check expressions
|
||||
|
||||
`.spec.healthCheckExprs` can be used to define custom logic for performing
|
||||
health checks on custom resources. This is done through Common Expression
|
||||
Language (CEL) expressions. This field accepts a list of objects with the
|
||||
following fields:
|
||||
|
||||
- `apiVersion`: The API version of the custom resource. Required.
|
||||
- `kind`: The kind of the custom resource. Required.
|
||||
- `current`: A required CEL expression that returns `true` if the resource is ready.
|
||||
- `inProgress`: An optional CEL expression that returns `true` if the resource
|
||||
is still being reconciled.
|
||||
- `failed`: An optional CEL expression that returns `true` if the resource
|
||||
failed to reconcile.
|
||||
|
||||
The controller will evaluate the expressions in the following order:
|
||||
|
||||
1. `inProgress` if specified
|
||||
2. `failed` if specified
|
||||
3. `current`
|
||||
|
||||
The first expression that evaluates to `true` will determine the health
|
||||
status of the custom resource.
|
||||
|
||||
For example, to define a set of health check expressions for the `SealedSecret`
|
||||
custom resource:
|
||||
|
||||
```yaml
|
||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
||||
kind: Kustomization
|
||||
metadata:
|
||||
name: sealed-secrets
|
||||
namespace: flux-system
|
||||
spec:
|
||||
interval: 5m
|
||||
path: ./path/to/sealed/secrets
|
||||
prune: true
|
||||
sourceRef:
|
||||
kind: GitRepository
|
||||
name: flux-system
|
||||
timeout: 1m
|
||||
wait: true # Tells the controller to wait for all resources to be ready by performing health checks.
|
||||
healthCheckExprs:
|
||||
- apiVersion: bitnami.com/v1alpha1
|
||||
kind: SealedSecret
|
||||
failed: status.conditions.filter(e, e.type == 'Synced').all(e, e.status == 'False')
|
||||
current: status.conditions.filter(e, e.type == 'Synced').all(e, e.status == 'True')
|
||||
```
|
||||
|
||||
A common error is writing expressions that reference fields that do not
|
||||
exist in the custom resource. This will cause the controller to wait
|
||||
for the resource to be ready until the timeout is reached. To avoid this,
|
||||
make sure your CEL expressions are correct. The
|
||||
[CEL Playground](https://playcel.undistro.io/) is a useful resource for
|
||||
this task. The input passed to each expression is the custom resource
|
||||
object itself. You can check for field existence with the
|
||||
[`has(...)` CEL macro](https://github.com/google/cel-spec/blob/master/doc/langdef.md#macros),
|
||||
just be aware that `has(status)` errors if `status` does not (yet) exist
|
||||
on the top level of the resource you are using.
|
||||
|
||||
It's worth checking if [the library](/flux/cheatsheets/cel-healthchecks/)
|
||||
has expressions for the custom resources you are using.
|
||||
|
||||
### Wait
|
||||
|
||||
`.spec.wait` is an optional boolean field to perform health checks for __all__
|
||||
|
@ -395,6 +505,22 @@ should be applied to all the Kustomization's resources. It has two optional fiel
|
|||
on an object. Any existing annotation will be overridden if it matches with a key
|
||||
in this map.
|
||||
|
||||
### Name Prefix and Suffix
|
||||
|
||||
`.spec.namePrefix` and `.spec.nameSuffix` are optional fields used to specify a prefix and suffix
|
||||
to be added to the names of all the resources in the Kustomization.
|
||||
|
||||
```yaml
|
||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
||||
kind: Kustomization
|
||||
metadata:
|
||||
name: app
|
||||
spec:
|
||||
# ...omitted for brevity
|
||||
namePrefix: "prefix-"
|
||||
nameSuffix: "-suffix"
|
||||
```
|
||||
|
||||
### Patches
|
||||
|
||||
`.spec.patches` is an optional list used to specify [Kustomize `patches`](https://kubectl.docs.kubernetes.io/references/kustomize/kustomization/patches/)
|
||||
|
@ -493,11 +619,11 @@ metadata:
|
|||
spec:
|
||||
# ...omitted for brevity
|
||||
components:
|
||||
- ingress
|
||||
- tls
|
||||
- ../ingress
|
||||
- ../tls
|
||||
```
|
||||
|
||||
**Note:** The component paths must be local and relative to the source root.
|
||||
**Note:** The components paths must be local and relative to the path specified by `.spec.path`.
|
||||
|
||||
**Warning:** Components are an alpha feature in Kustomize and are therefore
|
||||
considered experimental in Flux. No guarantees are provided as the feature may
|
||||
|
@ -524,7 +650,7 @@ absence as if the object had been present but empty, defining no
|
|||
variables.
|
||||
|
||||
This offers basic templating for your manifests including support
|
||||
for [bash string replacement functions](https://github.com/drone/envsubst) e.g.:
|
||||
for [bash string replacement functions](https://github.com/fluxcd/pkg/blob/main/envsubst/README.md) e.g.:
|
||||
|
||||
- `${var:=default}`
|
||||
- `${var:position}`
|
||||
|
@ -558,8 +684,7 @@ kind: Kustomization
|
|||
metadata:
|
||||
name: apps
|
||||
spec:
|
||||
interval: 5m
|
||||
path: "./apps/"
|
||||
# ...omitted for brevity
|
||||
postBuild:
|
||||
substitute:
|
||||
cluster_env: "prod"
|
||||
|
@ -588,8 +713,11 @@ stringData:
|
|||
token: ${token}
|
||||
```
|
||||
|
||||
The var values which are specified in-line with `substitute`
|
||||
**Note:** The var values which are specified in-line with `substitute`
|
||||
take precedence over the ones derived from `substituteFrom`.
|
||||
When var values for the same variable keys are derived from multiple
|
||||
`ConfigMaps` or `Secrets` referenced in the `substituteFrom` list, then the
|
||||
first take precedence over the later values.
|
||||
|
||||
**Note:** If you want to avoid var substitutions in scripts embedded in
|
||||
ConfigMaps or container commands, you must use the format `$var` instead of
|
||||
|
@ -599,6 +727,11 @@ will print out `${var}`.
|
|||
All the undefined variables in the format `${var}` will be substituted with an
|
||||
empty string unless a default value is provided e.g. `${var:=default}`.
|
||||
|
||||
**Note:** It is recommended to set the `--feature-gates=StrictPostBuildSubstitutions=true`
|
||||
controller flag, so that the post-build substitutions will fail if a
|
||||
variable without a default value is declared in files but is
|
||||
missing from the input vars.
|
||||
|
||||
You can disable the variable substitution for certain resources by either
|
||||
labelling or annotating them with:
|
||||
|
||||
|
@ -618,21 +751,23 @@ kind: Kustomization
|
|||
metadata:
|
||||
name: apps
|
||||
spec:
|
||||
...
|
||||
# ...omitted for brevity
|
||||
postBuild:
|
||||
substitute:
|
||||
var_substitution_enabled: "true"
|
||||
```
|
||||
|
||||
**Note:** When using numbers or booleans as values for variables, they must be
|
||||
enclosed in double quotes vars to be treated as strings, for more information see
|
||||
[substitution of numbers and booleans](#post-build-substitution-of-numbers-and-booleans).
|
||||
|
||||
You can replicate the controller post-build substitutions locally using
|
||||
[kustomize](https://github.com/kubernetes-sigs/kustomize)
|
||||
and Drone's [envsubst](https://github.com/drone/envsubst):
|
||||
and the Flux CLI:
|
||||
|
||||
```console
|
||||
$ go install github.com/drone/envsubst/cmd/envsubst
|
||||
|
||||
$ export cluster_region=eu-central-1
|
||||
$ kustomize build ./apps/ | $GOPATH/bin/envsubst
|
||||
$ kustomize build ./apps/ | flux envsubst --strict
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
|
@ -696,30 +831,47 @@ For more information, see [remote clusters/Cluster-API](#remote-clusterscluster-
|
|||
|
||||
### Decryption
|
||||
|
||||
`.spec.decryption` is an optional field to specify the configuration to decrypt
|
||||
Secrets that are a part of the Kustomization.
|
||||
Storing Secrets in Git repositories in plain text or base64 is unsafe,
|
||||
regardless of the visibility or access restrictions of the repository.
|
||||
|
||||
Since Secrets are either plain text or `base64` encoded, it's unsafe to store
|
||||
them in plain text in a public or private Git repository. In order to store
|
||||
them safely, you can use [Mozilla SOPS](https://github.com/mozilla/sops) and
|
||||
encrypt your Kubernetes Secret data with [age](https://age-encryption.org/v1/)
|
||||
and/or [OpenPGP](https://www.openpgp.org) keys, or with provider implementations
|
||||
like Azure Key Vault, GCP KMS or Hashicorp Vault.
|
||||
In order to store Secrets safely in Git repositorioes you can use an
|
||||
encryption provider and the optional field `.spec.decryption` to
|
||||
configure decryption for Secrets that are a part of the Kustomization.
|
||||
|
||||
**Note:** You should encrypt only the `data/stringData` section of the Kubernetes
|
||||
Secret, encrypting the `metadata`, `kind` or `apiVersion` fields is not supported.
|
||||
An easy way to do this is by appending `--encrypted-regex '^(data|stringData)$'`
|
||||
to your `sops --encrypt` command.
|
||||
The only supported encryption provider is [SOPS](https://getsops.io/).
|
||||
With SOPS you can encrypt your secrets with [age](https://github.com/FiloSottile/age)
|
||||
or [OpenPGP](https://www.openpgp.org) keys, or with keys from Key Management Services
|
||||
(KMS), like AWS KMS, Azure Key Vault, GCP KMS or Hashicorp Vault.
|
||||
|
||||
It has two required fields:
|
||||
**Note:** You must leave `metadata`, `kind` or `apiVersion` in plain text.
|
||||
An easy way to do this is limiting the encrypted keys with the flag
|
||||
`--encrypted-regex '^(data|stringData)$'` in your `sops encrypt` command.
|
||||
|
||||
- `.secretRef.name`: The name of the secret that contains the keys to be used for
|
||||
decryption.
|
||||
- `.provider`: The secrets decryption provider to be used. The only supported
|
||||
value at the moment is `sops`.
|
||||
The `.spec.decryption` field has the following subfields:
|
||||
|
||||
- `.provider`: The secrets decryption provider to be used. This field is required and
|
||||
the only supported value is `sops`.
|
||||
- `.secretRef.name`: The name of the secret that contains the keys or cloud provider
|
||||
static credentials for KMS services to be used for decryption.
|
||||
- `.serviceAccountName`: The name of the service account used for
|
||||
secret-less authentication with KMS services from cloud providers.
|
||||
|
||||
For a complete guide on how to set up authentication for KMS services from
|
||||
cloud providers, see the integration [docs](/flux/integrations/).
|
||||
|
||||
If a static credential for a given cloud provider is defined inside the secret
|
||||
referenced by `.secretRef`, that static credential takes priority over secret-less
|
||||
authentication for that provider. If no static credentials are defined for a given
|
||||
cloud provider inside the secret, secret-less authentication is attempted for that
|
||||
provider.
|
||||
|
||||
If `.serviceAccountName` is specified for secret-less authentication,
|
||||
it takes priority over [controller global decryption](#controller-global-decryption)
|
||||
for all cloud providers.
|
||||
|
||||
Example:
|
||||
|
||||
```yaml
|
||||
---
|
||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
||||
kind: Kustomization
|
||||
metadata:
|
||||
|
@ -733,13 +885,11 @@ spec:
|
|||
name: repository-with-secrets
|
||||
decryption:
|
||||
provider: sops
|
||||
serviceAccountName: sops-identity
|
||||
secretRef:
|
||||
name: sops-keys
|
||||
name: sops-keys-and-credentials
|
||||
```
|
||||
|
||||
**Note:** For information on Secrets decryption at a controller level, please
|
||||
refer to [controller global decryption](#controller-global-decryption).
|
||||
|
||||
The Secret's `.data` section is expected to contain entries with decryption
|
||||
keys (for age and OpenPGP), or credentials (for any of the supported provider
|
||||
implementations). The controller identifies the type of the entry by the suffix
|
||||
|
@ -750,7 +900,7 @@ of the key (e.g. `.agekey`), or a fixed key (e.g. `sops.vault-token`).
|
|||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: sops-keys
|
||||
name: sops-keys-and-credentials
|
||||
namespace: default
|
||||
data:
|
||||
# Exemplary age private key
|
||||
|
@ -807,9 +957,9 @@ metadata:
|
|||
namespace: default
|
||||
data:
|
||||
sops.aws-kms: |
|
||||
aws_access_key_id: some-access-key-id
|
||||
aws_secret_access_key: some-aws-secret-access-key
|
||||
aws_session_token: some-aws-session-token # this field is optional
|
||||
aws_access_key_id: some-access-key-id
|
||||
aws_secret_access_key: some-aws-secret-access-key
|
||||
aws_session_token: some-aws-session-token # this field is optional
|
||||
```
|
||||
|
||||
#### Azure Key Vault Secret entry
|
||||
|
@ -1038,6 +1188,79 @@ cd apps/my-app
|
|||
kustomize create --autodetect --recursive
|
||||
```
|
||||
|
||||
### Controlling the apply behavior of resources
|
||||
|
||||
To change the apply behaviour for specific Kubernetes resources, you can annotate them with:
|
||||
|
||||
| Annotation | Default | Values | Role |
|
||||
|-------------------------------------|------------|----------------------------------------------------------------|-----------------|
|
||||
| `kustomize.toolkit.fluxcd.io/ssa` | `Override` | - `Override`<br/>- `Merge`<br/>- `IfNotPresent`<br/>- `Ignore` | Apply policy |
|
||||
| `kustomize.toolkit.fluxcd.io/force` | `Disabled` | - `Enabled`<br/>- `Disabled` | Recreate policy |
|
||||
| `kustomize.toolkit.fluxcd.io/prune` | `Enabled` | - `Enabled`<br/>- `Disabled` | Delete policy |
|
||||
|
||||
**Note:** These annotations should be set in the Kubernetes YAML manifests included
|
||||
in the Flux Kustomization source (Git, OCI, Bucket).
|
||||
|
||||
#### `kustomize.toolkit.fluxcd.io/ssa`
|
||||
|
||||
##### Override
|
||||
|
||||
The `Override` policy instructs the controller to reconcile the Kubernetes resources
|
||||
with the desired state (YAML manifests) defined in the Flux source (Git, OCI, Bucket).
|
||||
|
||||
If you use `kubectl` to edit a Kubernetes resource managed by Flux, all changes will be
|
||||
reverted when the controller reconciles a Flux Kustomization containing that resource.
|
||||
In order to preserve fields added with `kubectl`, you have to specify
|
||||
a field manager named `flux-client-side-apply` e.g.:
|
||||
|
||||
```sh
|
||||
kubectl apply --field-manager=flux-client-side-apply
|
||||
```
|
||||
|
||||
##### Merge
|
||||
|
||||
The `Merge` policy instructs the controller to preserve the fields added by other tools to the
|
||||
Kubernetes resources managed by Flux.
|
||||
|
||||
The fields defined in the manifests applied by the controller will always be overridden,
|
||||
the `Merge` policy works only for adding new fields that don’t overlap with the desired
|
||||
state.
|
||||
|
||||
For lists fields which are atomic (e.g. `.spec.tolerations` in PodSpec), Kubernetes
|
||||
doesn't allow different managers for such fields, therefore any changes to these
|
||||
fields will be reverted. For more context, please see the Kubernetes enhancement document:
|
||||
[555-server-side-apply](https://github.com/kubernetes/enhancements/blob/master/keps/sig-api-machinery/555-server-side-apply/README.md#lists).
|
||||
|
||||
##### IfNotPresent
|
||||
|
||||
The `IfNotPresent` policy instructs the controller to only apply the Kubernetes resources
|
||||
if they are not present on the cluster.
|
||||
|
||||
This policy can be used for Kubernetes Secrets and ValidatingWebhookConfigurations managed by cert-manager,
|
||||
where Flux creates the resources with fields that are later on mutated by other controllers.
|
||||
|
||||
##### Ignore
|
||||
|
||||
The `Ignore` policy instructs the controller to skip applying Kubernetes resources
|
||||
even if they are included in a Flux source (Git, OCI, Bucket).
|
||||
|
||||
#### `kustomize.toolkit.fluxcd.io/force`
|
||||
|
||||
When set to `Enabled`, this policy instructs the controller to recreate the Kubernetes resources
|
||||
with changes to immutable fields.
|
||||
|
||||
This policy can be used for Kubernetes Jobs to rerun them when their container image changes.
|
||||
|
||||
**Note:** Using this policy for StatefulSets may result in potential data loss.
|
||||
|
||||
#### `kustomize.toolkit.fluxcd.io/prune`
|
||||
|
||||
When set to `Disabled`, this policy instructs the controller to skip the deletion of
|
||||
the Kubernetes resources subject to [garbage collection](#prune).
|
||||
|
||||
This policy can be used to protect sensitive resources such as Namespaces, PVCs and PVs
|
||||
from accidental deletion.
|
||||
|
||||
### Role-based access control
|
||||
|
||||
By default, a Kustomization apply runs under the cluster admin account and can
|
||||
|
@ -1205,6 +1428,8 @@ it is possible to specify global decryption settings on the
|
|||
kustomize-controller Pod. When the controller fails to find credentials on the
|
||||
Kustomization object itself, it will fall back to these defaults.
|
||||
|
||||
See also the [workload identity](/flux/installation/configuration/workload-identity/) docs.
|
||||
|
||||
#### AWS KMS
|
||||
|
||||
While making use of the [IAM OIDC provider](https://eksctl.io/usage/iamserviceaccounts/)
|
||||
|
@ -1311,32 +1536,6 @@ patches:
|
|||
azure.workload.identity/use: "true"
|
||||
```
|
||||
|
||||
##### AAD Pod Identity
|
||||
|
||||
While making use of [AAD Pod Identity](https://github.com/Azure/aad-pod-identity),
|
||||
you can bind a Managed Identity to Flux's kustomize-controller. Once the
|
||||
`AzureIdentity` and `AzureIdentityBinding` for this are created, you can patch
|
||||
the controller's Deployment with the `aadpodidbinding` label set to the
|
||||
selector of the binding.
|
||||
|
||||
```yaml
|
||||
---
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: kustomize-controller
|
||||
namespace: flux-system
|
||||
spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
aadpodidbinding: sops-akv-decryptor # match the AzureIdentityBinding selector
|
||||
```
|
||||
|
||||
In addition to this, the [default SOPS Azure Key Vault flow is
|
||||
followed](https://github.com/mozilla/sops#encrypting-using-azure-key-vault),
|
||||
allowing you to specify a variety of other environment variables.
|
||||
|
||||
##### Kubelet Identity
|
||||
|
||||
If the kubelet managed identity has `Decrypt` permissions on Azure Key Vault,
|
||||
|
@ -1475,6 +1674,38 @@ secretGenerator:
|
|||
- .dockerconfigjson=ghcr.dockerconfigjson.encrypted
|
||||
```
|
||||
|
||||
### Post build substitution of numbers and booleans
|
||||
|
||||
When using [variable substitution](#post-build-variable-substitution) with values
|
||||
that are numbers or booleans, the reconciliation may fail if the substitution
|
||||
is for a field that must be of type string. To convert the number or boolean
|
||||
to a string, you can wrap the variable with a double quotes var:
|
||||
|
||||
```yaml
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: app
|
||||
annotations:
|
||||
id: ${quote}${id}${quote}
|
||||
enabled: ${quote}${enabled}${quote}
|
||||
```
|
||||
|
||||
Then in the Flux Kustomization, define the variables as:
|
||||
|
||||
```yaml
|
||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
||||
kind: Kustomization
|
||||
metadata:
|
||||
name: app
|
||||
spec:
|
||||
postBuild:
|
||||
substitute:
|
||||
quote: '"' # double quote var
|
||||
id: "123"
|
||||
enabled: "true"
|
||||
```
|
||||
|
||||
### Triggering a reconcile
|
||||
|
||||
To manually tell the kustomize-controller to reconcile a Kustomization outside
|
||||
|
@ -1496,48 +1727,6 @@ Using `flux`:
|
|||
flux reconcile kustomization <kustomization-name>
|
||||
```
|
||||
|
||||
### Customizing reconciliation
|
||||
|
||||
You can configure the controller to ignore in-cluster resources by labelling or
|
||||
annotating them with:
|
||||
|
||||
```yaml
|
||||
kustomize.toolkit.fluxcd.io/reconcile: disabled
|
||||
```
|
||||
|
||||
**Note:** When the `kustomize.toolkit.fluxcd.io/reconcile` annotation is set to
|
||||
`disabled`, the controller will no longer apply changes from the source, nor
|
||||
will it prune the resource. To resume reconciliation, set the annotation to
|
||||
`enabled` in the source or remove it from the in-cluster object.
|
||||
|
||||
If you use `kubectl` to edit an object managed by Flux, all changes will be
|
||||
reverted when the controller reconciles a Flux Kustomization containing that
|
||||
object. In order to preserve fields added with `kubectl`, you have to specify
|
||||
a field manager named `flux-client-side-apply` e.g.:
|
||||
|
||||
```sh
|
||||
kubectl apply --field-manager=flux-client-side-apply
|
||||
```
|
||||
|
||||
Another option is to annotate or label objects with:
|
||||
|
||||
```yaml
|
||||
kustomize.toolkit.fluxcd.io/ssa: merge
|
||||
```
|
||||
|
||||
**Note:** The fields defined in manifests will always be overridden, the above
|
||||
procedure works only for adding new fields that don’t overlap with the desired
|
||||
state.
|
||||
|
||||
For lists fields which are atomic (e.g. `.spec.tolerations` in PodSpec), Kubernetes
|
||||
doesn't allow different managers for such fields, therefore any changes to these
|
||||
fields will be undone, even if you specify a manager. For more context, please
|
||||
see the Kubernetes enhancement document:
|
||||
[555-server-side-apply](https://github.com/kubernetes/enhancements/blob/master/keps/sig-api-machinery/555-server-side-apply/README.md#lists).
|
||||
|
||||
To learn how to handle patching failures due to immutable field changes, refer
|
||||
to [`.spec.force`](#force).
|
||||
|
||||
### Waiting for `Ready`
|
||||
|
||||
When a change is applied, it is possible to wait for the Kustomization to reach
|
||||
|
@ -1552,6 +1741,18 @@ kubectl wait kustomization/<kustomization-name> --for=condition=ready --timeout=
|
|||
When you find yourself in a situation where you temporarily want to pause the
|
||||
reconciliation of a Kustomization, you can suspend it using [`.spec.suspend`](#suspend).
|
||||
|
||||
To pause the reconciliation of a specific Kubernetes resource managed by a Flux Kustomization,
|
||||
you can annotate or label the resource in-cluster with:
|
||||
|
||||
```yaml
|
||||
kustomize.toolkit.fluxcd.io/reconcile: disabled
|
||||
```
|
||||
|
||||
**Note:** When the `kustomize.toolkit.fluxcd.io/reconcile` annotation is set to
|
||||
`disabled`, the controller will no longer apply changes, nor
|
||||
will it prune the resource. To resume reconciliation, set the annotation to
|
||||
`enabled` in the source or remove it from the in-cluster object.
|
||||
|
||||
#### Suspend a Kustomization
|
||||
|
||||
In your YAML declaration:
|
||||
|
@ -1799,6 +2000,21 @@ Status:
|
|||
`.status.lastAppliedRevision` is the last revision of the Artifact from the
|
||||
referred Source object that was successfully applied to the cluster.
|
||||
|
||||
### Last applied origin revision
|
||||
|
||||
`status.lastAppliedOriginRevision` is the last origin revision of the Artifact
|
||||
from the referred Source object that was successfully applied to the cluster.
|
||||
|
||||
This field is usually retrieved from the Metadata of the Artifact and depends
|
||||
on the Source type. For example, for OCI artifacts this is the value associated
|
||||
with the standard metadata key `org.opencontainers.image.revision`, which is
|
||||
used to track the revision of the source code that was used to build the OCI
|
||||
artifact.
|
||||
|
||||
The controller will forward this value when emitting events in the metadata
|
||||
key `originRevision`. The notification-controller will look for this key in
|
||||
the event metadata when sending *commit status update* events to Git providers.
|
||||
|
||||
### Last attempted revision
|
||||
|
||||
`.status.lastAttemptedRevision` is the last revision of the Artifact from the
|
|
@ -5,16 +5,16 @@ of Kubernetes objects generated with Kustomize.
|
|||
|
||||
## Specification
|
||||
|
||||
- [Kustomization CRD](kustomization.md)
|
||||
+ [Source reference](kustomization.md#source-reference)
|
||||
+ [Generate kustomization.yaml](kustomization.md#generate-kustomizationyaml)
|
||||
+ [Reconciliation](kustomization.md#reconciliation)
|
||||
+ [Garbage collection](kustomization.md#garbage-collection)
|
||||
+ [Health assessment](kustomization.md#health-assessment)
|
||||
+ [Kustomization dependencies](kustomization.md#kustomization-dependencies)
|
||||
+ [Role-based access control](kustomization.md#role-based-access-control)
|
||||
+ [Secrets decryption](kustomization.md#secrets-decryption)
|
||||
+ [Status](kustomization.md#status)
|
||||
- [Kustomization CRD](kustomizations.md)
|
||||
+ [Source reference](kustomizations.md#source-reference)
|
||||
+ [Generate kustomization.yaml](kustomizations.md#generate-kustomizationyaml)
|
||||
+ [Reconciliation](kustomizations.md#reconciliation)
|
||||
+ [Garbage collection](kustomizations.md#garbage-collection)
|
||||
+ [Health assessment](kustomizations.md#health-assessment)
|
||||
+ [Kustomization dependencies](kustomizations.md#kustomization-dependencies)
|
||||
+ [Role-based access control](kustomizations.md#role-based-access-control)
|
||||
+ [Secrets decryption](kustomizations.md#secrets-decryption)
|
||||
+ [Status](kustomizations.md#status)
|
||||
|
||||
## Implementation
|
||||
|
||||
|
|
|
@ -1,23 +1,23 @@
|
|||
# kustomize.toolkit.fluxcd.io/v1alpha1
|
||||
# kustomize.toolkit.fluxcd.io/v1beta1
|
||||
|
||||
This is the v1beta1 API specification for defining continuous delivery pipelines
|
||||
of Kubernetes objects generated with Kustomize.
|
||||
|
||||
## Specification
|
||||
|
||||
- [Kustomization CRD](kustomization.md)
|
||||
+ [Source reference](kustomization.md#source-reference)
|
||||
+ [Generate kustomization.yaml](kustomization.md#generate-kustomizationyaml)
|
||||
+ [Reconciliation](kustomization.md#reconciliation)
|
||||
+ [Garbage collection](kustomization.md#garbage-collection)
|
||||
+ [Health assessment](kustomization.md#health-assessment)
|
||||
+ [Kustomization dependencies](kustomization.md#kustomization-dependencies)
|
||||
+ [Role-based access control](kustomization.md#role-based-access-control)
|
||||
+ [Override kustomize config](kustomization.md#override-kustomize-config)
|
||||
+ [Variable substitution](kustomization.md#variable-substitution)
|
||||
+ [Targeting remote clusters](kustomization.md#remote-clusters--cluster-api)
|
||||
+ [Secrets decryption](kustomization.md#secrets-decryption)
|
||||
+ [Status](kustomization.md#status)
|
||||
- [Kustomization CRD](kustomizations.md)
|
||||
+ [Source reference](kustomizations.md#source-reference)
|
||||
+ [Generate kustomization.yaml](kustomizations.md#generate-kustomizationyaml)
|
||||
+ [Reconciliation](kustomizations.md#reconciliation)
|
||||
+ [Garbage collection](kustomizations.md#garbage-collection)
|
||||
+ [Health assessment](kustomizations.md#health-assessment)
|
||||
+ [Kustomization dependencies](kustomizations.md#kustomization-dependencies)
|
||||
+ [Role-based access control](kustomizations.md#role-based-access-control)
|
||||
+ [Override kustomize config](kustomizations.md#override-kustomize-config)
|
||||
+ [Variable substitution](kustomizations.md#variable-substitution)
|
||||
+ [Targeting remote clusters](kustomizations.md#remote-clusters--cluster-api)
|
||||
+ [Secrets decryption](kustomizations.md#secrets-decryption)
|
||||
+ [Status](kustomizations.md#status)
|
||||
|
||||
## Implementation
|
||||
|
||||
|
|
|
@ -5,21 +5,21 @@ of Kubernetes objects generated with Kustomize.
|
|||
|
||||
## Specification
|
||||
|
||||
- [Kustomization CRD](kustomization.md)
|
||||
+ [Example](kustomization.md#example)
|
||||
+ [Recommended settings](kustomization.md#recommended-settings)
|
||||
+ [Source reference](kustomization.md#source-reference)
|
||||
+ [Generate kustomization.yaml](kustomization.md#generate-kustomizationyaml)
|
||||
+ [Reconciliation](kustomization.md#reconciliation)
|
||||
+ [Garbage collection](kustomization.md#garbage-collection)
|
||||
+ [Health assessment](kustomization.md#health-assessment)
|
||||
+ [Kustomization dependencies](kustomization.md#kustomization-dependencies)
|
||||
+ [Role-based access control](kustomization.md#role-based-access-control)
|
||||
+ [Override kustomize config](kustomization.md#override-kustomize-config)
|
||||
+ [Variable substitution](kustomization.md#variable-substitution)
|
||||
+ [Targeting remote clusters](kustomization.md#remote-clusters--cluster-api)
|
||||
+ [Secrets decryption](kustomization.md#secrets-decryption)
|
||||
+ [Status](kustomization.md#status)
|
||||
- [Kustomization CRD](kustomizations.md)
|
||||
+ [Example](kustomizations.md#example)
|
||||
+ [Recommended settings](kustomizations.md#recommended-settings)
|
||||
+ [Source reference](kustomizations.md#source-reference)
|
||||
+ [Generate kustomization.yaml](kustomizations.md#generate-kustomizationyaml)
|
||||
+ [Reconciliation](kustomizations.md#reconciliation)
|
||||
+ [Garbage collection](kustomizations.md#garbage-collection)
|
||||
+ [Health assessment](kustomizations.md#health-assessment)
|
||||
+ [Kustomization dependencies](kustomizations.md#kustomization-dependencies)
|
||||
+ [Role-based access control](kustomizations.md#role-based-access-control)
|
||||
+ [Override kustomize config](kustomizations.md#override-kustomize-config)
|
||||
+ [Variable substitution](kustomizations.md#variable-substitution)
|
||||
+ [Targeting remote clusters](kustomizations.md#remote-clusters--cluster-api)
|
||||
+ [Secrets decryption](kustomizations.md#secrets-decryption)
|
||||
+ [Status](kustomizations.md#status)
|
||||
|
||||
## Implementation
|
||||
|
||||
|
|
375
go.mod
375
go.mod
|
@ -1,6 +1,6 @@
|
|||
module github.com/fluxcd/kustomize-controller
|
||||
|
||||
go 1.18
|
||||
go 1.24.0
|
||||
|
||||
replace github.com/fluxcd/kustomize-controller/api => ./api
|
||||
|
||||
|
@ -9,220 +9,253 @@ replace github.com/fluxcd/kustomize-controller/api => ./api
|
|||
replace github.com/opencontainers/go-digest => github.com/opencontainers/go-digest v1.0.1-0.20220411205349-bde1400a84be
|
||||
|
||||
require (
|
||||
cloud.google.com/go/kms v1.10.2
|
||||
filippo.io/age v1.1.1
|
||||
github.com/AdaLogics/go-fuzz-headers v0.0.0-20230106234847-43070de90fa1
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azcore v1.5.0-beta.1
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.0-beta.4
|
||||
github.com/Azure/azure-sdk-for-go/sdk/keyvault/azkeys v0.9.0
|
||||
github.com/aws/aws-sdk-go v1.44.259
|
||||
github.com/aws/aws-sdk-go-v2 v1.18.0
|
||||
github.com/aws/aws-sdk-go-v2/config v1.18.24
|
||||
github.com/aws/aws-sdk-go-v2/credentials v1.13.23
|
||||
github.com/aws/aws-sdk-go-v2/service/kms v1.21.1
|
||||
github.com/aws/aws-sdk-go-v2/service/sts v1.19.0
|
||||
github.com/cyphar/filepath-securejoin v0.2.3
|
||||
cloud.google.com/go/kms v1.21.2
|
||||
filippo.io/age v1.2.1
|
||||
github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azcore v1.18.0
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.9.0
|
||||
github.com/aws/aws-sdk-go-v2 v1.36.3
|
||||
github.com/aws/aws-sdk-go-v2/credentials v1.17.67
|
||||
github.com/cyphar/filepath-securejoin v0.4.1
|
||||
github.com/dimchansky/utfbom v1.1.1
|
||||
github.com/fluxcd/kustomize-controller/api v1.0.0-rc.2
|
||||
github.com/fluxcd/pkg/apis/acl v0.1.0
|
||||
github.com/fluxcd/pkg/apis/event v0.4.1
|
||||
github.com/fluxcd/pkg/apis/kustomize v1.0.0
|
||||
github.com/fluxcd/pkg/apis/meta v1.0.0
|
||||
github.com/fluxcd/pkg/http/fetch v0.4.0
|
||||
github.com/fluxcd/pkg/kustomize v1.1.1
|
||||
github.com/fluxcd/pkg/runtime v0.35.0
|
||||
github.com/fluxcd/pkg/ssa v0.27.0
|
||||
github.com/fluxcd/pkg/tar v0.2.0
|
||||
github.com/fluxcd/pkg/testserver v0.4.0
|
||||
github.com/fluxcd/source-controller/api v1.0.0-rc.2
|
||||
github.com/hashicorp/vault/api v1.9.1
|
||||
github.com/onsi/gomega v1.27.6
|
||||
github.com/fluxcd/cli-utils v0.36.0-flux.13
|
||||
github.com/fluxcd/kustomize-controller/api v1.6.0
|
||||
github.com/fluxcd/pkg/apis/acl v0.7.0
|
||||
github.com/fluxcd/pkg/apis/event v0.17.0
|
||||
github.com/fluxcd/pkg/apis/kustomize v1.10.0
|
||||
github.com/fluxcd/pkg/apis/meta v1.12.0
|
||||
github.com/fluxcd/pkg/auth v0.16.0
|
||||
github.com/fluxcd/pkg/cache v0.9.0
|
||||
github.com/fluxcd/pkg/http/fetch v0.16.0
|
||||
github.com/fluxcd/pkg/kustomize v1.18.0
|
||||
github.com/fluxcd/pkg/runtime v0.60.0
|
||||
github.com/fluxcd/pkg/ssa v0.49.0
|
||||
github.com/fluxcd/pkg/tar v0.12.0
|
||||
github.com/fluxcd/pkg/testserver v0.11.0
|
||||
github.com/fluxcd/source-controller/api v1.6.0
|
||||
github.com/getsops/sops/v3 v3.10.2
|
||||
github.com/hashicorp/vault/api v1.16.0
|
||||
github.com/onsi/gomega v1.37.0
|
||||
github.com/opencontainers/go-digest v1.0.0
|
||||
github.com/ory/dockertest/v3 v3.10.0
|
||||
github.com/spf13/pflag v1.0.5
|
||||
go.mozilla.org/sops/v3 v3.7.3
|
||||
golang.org/x/net v0.10.0
|
||||
google.golang.org/api v0.121.0
|
||||
google.golang.org/genproto v0.0.0-20230410155749-daa745c078e1
|
||||
google.golang.org/grpc v1.55.0
|
||||
google.golang.org/protobuf v1.30.0
|
||||
k8s.io/api v0.26.3
|
||||
k8s.io/apimachinery v0.26.3
|
||||
k8s.io/client-go v0.26.3
|
||||
sigs.k8s.io/cli-utils v0.34.0
|
||||
sigs.k8s.io/controller-runtime v0.14.6
|
||||
sigs.k8s.io/kustomize/api v0.12.1
|
||||
sigs.k8s.io/yaml v1.3.0
|
||||
github.com/ory/dockertest/v3 v3.12.0
|
||||
github.com/spf13/pflag v1.0.6
|
||||
golang.org/x/net v0.40.0
|
||||
golang.org/x/oauth2 v0.30.0
|
||||
k8s.io/api v0.33.0
|
||||
k8s.io/apimachinery v0.33.0
|
||||
k8s.io/client-go v0.33.0
|
||||
k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e
|
||||
sigs.k8s.io/controller-runtime v0.21.0
|
||||
sigs.k8s.io/kustomize/api v0.19.0
|
||||
sigs.k8s.io/yaml v1.5.0
|
||||
)
|
||||
|
||||
// Pin kustomize to v4.5.7
|
||||
// Pin kustomize to v5.7.0
|
||||
replace (
|
||||
sigs.k8s.io/kustomize/api => sigs.k8s.io/kustomize/api v0.12.1
|
||||
sigs.k8s.io/kustomize/kyaml => sigs.k8s.io/kustomize/kyaml v0.13.9
|
||||
sigs.k8s.io/kustomize/api => sigs.k8s.io/kustomize/api v0.20.0
|
||||
sigs.k8s.io/kustomize/kyaml => sigs.k8s.io/kustomize/kyaml v0.20.0
|
||||
)
|
||||
|
||||
// Fix CVE-2022-28948
|
||||
replace gopkg.in/yaml.v3 => gopkg.in/yaml.v3 v3.0.1
|
||||
|
||||
require (
|
||||
cloud.google.com/go/compute v1.19.0 // indirect
|
||||
cloud.google.com/go/compute/metadata v0.2.3 // indirect
|
||||
cloud.google.com/go/iam v0.13.0 // indirect
|
||||
github.com/Azure/azure-sdk-for-go v63.3.0+incompatible // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/internal v1.2.0 // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/keyvault/internal v0.7.0 // indirect
|
||||
github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1 // indirect
|
||||
github.com/Azure/go-autorest v14.2.0+incompatible // indirect
|
||||
github.com/Azure/go-autorest/autorest v0.11.27 // indirect
|
||||
github.com/Azure/go-autorest/autorest/adal v0.9.20 // indirect
|
||||
github.com/Azure/go-autorest/autorest/azure/auth v0.5.11 // indirect
|
||||
github.com/Azure/go-autorest/autorest/azure/cli v0.4.5 // indirect
|
||||
github.com/Azure/go-autorest/autorest/date v0.3.0 // indirect
|
||||
github.com/Azure/go-autorest/autorest/to v0.4.0 // indirect
|
||||
github.com/Azure/go-autorest/autorest/validation v0.3.1 // indirect
|
||||
github.com/Azure/go-autorest/logger v0.2.1 // indirect
|
||||
github.com/Azure/go-autorest/tracing v0.6.0 // indirect
|
||||
github.com/AzureAD/microsoft-authentication-library-for-go v0.9.0 // indirect
|
||||
cel.dev/expr v0.22.1 // indirect
|
||||
cloud.google.com/go v0.120.1 // indirect
|
||||
cloud.google.com/go/auth v0.16.1 // indirect
|
||||
cloud.google.com/go/auth/oauth2adapt v0.2.8 // indirect
|
||||
cloud.google.com/go/compute/metadata v0.6.0 // indirect
|
||||
cloud.google.com/go/iam v1.5.2 // indirect
|
||||
cloud.google.com/go/longrunning v0.6.7 // indirect
|
||||
cloud.google.com/go/monitoring v1.24.2 // indirect
|
||||
cloud.google.com/go/storage v1.51.0 // indirect
|
||||
dario.cat/mergo v1.0.1 // indirect
|
||||
filippo.io/edwards25519 v1.1.0 // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.1 // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azkeys v1.3.1 // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.1.1 // indirect
|
||||
github.com/Azure/go-ansiterm v0.0.0-20250102033503-faa5f7b0171c // indirect
|
||||
github.com/AzureAD/microsoft-authentication-library-for-go v1.4.2 // indirect
|
||||
github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.27.0 // indirect
|
||||
github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric v0.51.0 // indirect
|
||||
github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/resourcemapping v0.51.0 // indirect
|
||||
github.com/MakeNowJust/heredoc v1.0.0 // indirect
|
||||
github.com/Microsoft/go-winio v0.6.0 // indirect
|
||||
github.com/Microsoft/go-winio v0.6.2 // indirect
|
||||
github.com/Nvveen/Gotty v0.0.0-20120604004816-cd527374f1e5 // indirect
|
||||
github.com/ProtonMail/go-crypto v0.0.0-20221026131551-cf6655e29de4 // indirect
|
||||
github.com/acomagu/bufpipe v1.0.3 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.13.3 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/internal/configsources v1.1.33 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.4.27 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/internal/ini v1.3.34 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.9.27 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/sso v1.12.10 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.14.10 // indirect
|
||||
github.com/aws/smithy-go v1.13.5 // indirect
|
||||
github.com/ProtonMail/go-crypto v1.2.0 // indirect
|
||||
github.com/antlr4-go/antlr/v4 v4.13.0 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.10 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/config v1.29.14 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.30 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.17.72 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.34 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.34 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/internal/ini v1.8.3 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.34 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/ecr v1.43.3 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.12.3 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.7.0 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.12.15 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.18.15 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/kms v1.38.3 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/s3 v1.79.2 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/sso v1.25.3 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.30.1 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/sts v1.33.19 // indirect
|
||||
github.com/aws/smithy-go v1.22.3 // indirect
|
||||
github.com/beorn7/perks v1.0.1 // indirect
|
||||
github.com/blang/semver v3.5.1+incompatible // indirect
|
||||
github.com/cenkalti/backoff/v3 v3.2.2 // indirect
|
||||
github.com/cenkalti/backoff/v4 v4.1.3 // indirect
|
||||
github.com/cespare/xxhash/v2 v2.2.0 // indirect
|
||||
github.com/chai2010/gettext-go v1.0.2 // indirect
|
||||
github.com/cloudflare/circl v1.1.0 // indirect
|
||||
github.com/containerd/continuity v0.3.0 // indirect
|
||||
github.com/davecgh/go-spew v1.1.1 // indirect
|
||||
github.com/docker/cli v20.10.17+incompatible // indirect
|
||||
github.com/docker/docker v20.10.24+incompatible // indirect
|
||||
github.com/docker/go-connections v0.4.0 // indirect
|
||||
github.com/docker/go-units v0.4.0 // indirect
|
||||
github.com/drone/envsubst v1.0.3 // indirect
|
||||
github.com/emicklei/go-restful/v3 v3.10.0 // indirect
|
||||
github.com/evanphx/json-patch v5.6.0+incompatible // indirect
|
||||
github.com/evanphx/json-patch/v5 v5.6.0 // indirect
|
||||
github.com/blang/semver/v4 v4.0.0 // indirect
|
||||
github.com/carapace-sh/carapace-shlex v1.0.1 // indirect
|
||||
github.com/cenkalti/backoff/v4 v4.3.0 // indirect
|
||||
github.com/cespare/xxhash/v2 v2.3.0 // indirect
|
||||
github.com/chai2010/gettext-go v1.0.3 // indirect
|
||||
github.com/cloudflare/circl v1.6.1 // indirect
|
||||
github.com/cncf/xds/go v0.0.0-20250326154945-ae57f3c0d45f // indirect
|
||||
github.com/containerd/continuity v0.4.5 // indirect
|
||||
github.com/cpuguy83/go-md2man/v2 v2.0.6 // indirect
|
||||
github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc // indirect
|
||||
github.com/docker/cli v28.1.1+incompatible // indirect
|
||||
github.com/docker/docker v28.1.1+incompatible // indirect
|
||||
github.com/docker/docker-credential-helpers v0.8.2 // indirect
|
||||
github.com/docker/go-connections v0.5.0 // indirect
|
||||
github.com/docker/go-units v0.5.0 // indirect
|
||||
github.com/emicklei/go-restful/v3 v3.12.2 // indirect
|
||||
github.com/envoyproxy/go-control-plane/envoy v1.32.4 // indirect
|
||||
github.com/envoyproxy/protoc-gen-validate v1.2.1 // indirect
|
||||
github.com/evanphx/json-patch/v5 v5.9.11 // indirect
|
||||
github.com/exponent-io/jsonpath v0.0.0-20210407135951-1de76d718b3f // indirect
|
||||
github.com/fatih/color v1.13.0 // indirect
|
||||
github.com/fluxcd/go-git/v5 v5.0.0-20221219190809-2e5c9d01cfc4 // indirect
|
||||
github.com/fluxcd/pkg/sourceignore v0.3.3 // indirect
|
||||
github.com/fsnotify/fsnotify v1.6.0 // indirect
|
||||
github.com/go-errors/errors v1.4.2 // indirect
|
||||
github.com/go-git/gcfg v1.5.0 // indirect
|
||||
github.com/go-git/go-billy/v5 v5.3.1 // indirect
|
||||
github.com/go-logr/logr v1.2.3 // indirect
|
||||
github.com/go-logr/zapr v1.2.3 // indirect
|
||||
github.com/go-openapi/jsonpointer v0.19.6 // indirect
|
||||
github.com/go-openapi/jsonreference v0.20.1 // indirect
|
||||
github.com/go-openapi/swag v0.22.3 // indirect
|
||||
github.com/fatih/color v1.18.0 // indirect
|
||||
github.com/felixge/httpsnoop v1.0.4 // indirect
|
||||
github.com/fluxcd/pkg/envsubst v1.4.0 // indirect
|
||||
github.com/fluxcd/pkg/sourceignore v0.12.0 // indirect
|
||||
github.com/fsnotify/fsnotify v1.9.0 // indirect
|
||||
github.com/fxamacker/cbor/v2 v2.8.0 // indirect
|
||||
github.com/getsops/gopgagent v0.0.0-20241224165529-7044f28e491e // indirect
|
||||
github.com/go-errors/errors v1.5.1 // indirect
|
||||
github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 // indirect
|
||||
github.com/go-git/go-billy/v5 v5.6.2 // indirect
|
||||
github.com/go-git/go-git/v5 v5.16.0 // indirect
|
||||
github.com/go-jose/go-jose/v4 v4.1.0 // indirect
|
||||
github.com/go-logr/logr v1.4.2 // indirect
|
||||
github.com/go-logr/stdr v1.2.2 // indirect
|
||||
github.com/go-logr/zapr v1.3.0 // indirect
|
||||
github.com/go-openapi/jsonpointer v0.21.1 // indirect
|
||||
github.com/go-openapi/jsonreference v0.21.0 // indirect
|
||||
github.com/go-openapi/swag v0.23.1 // indirect
|
||||
github.com/go-viper/mapstructure/v2 v2.2.1 // indirect
|
||||
github.com/gogo/protobuf v1.3.2 // indirect
|
||||
github.com/golang-jwt/jwt/v4 v4.5.0 // indirect
|
||||
github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect
|
||||
github.com/golang/protobuf v1.5.3 // indirect
|
||||
github.com/google/btree v1.1.2 // indirect
|
||||
github.com/google/gnostic v0.6.9 // indirect
|
||||
github.com/google/go-cmp v0.5.9 // indirect
|
||||
github.com/google/gofuzz v1.2.0 // indirect
|
||||
github.com/google/s2a-go v0.1.3 // indirect
|
||||
github.com/golang-jwt/jwt/v5 v5.2.2 // indirect
|
||||
github.com/google/btree v1.1.3 // indirect
|
||||
github.com/google/cel-go v0.23.2 // indirect
|
||||
github.com/google/gnostic-models v0.6.9 // indirect
|
||||
github.com/google/go-cmp v0.7.0 // indirect
|
||||
github.com/google/go-containerregistry v0.20.3 // indirect
|
||||
github.com/google/s2a-go v0.1.9 // indirect
|
||||
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect
|
||||
github.com/google/uuid v1.3.0 // indirect
|
||||
github.com/googleapis/enterprise-certificate-proxy v0.2.3 // indirect
|
||||
github.com/googleapis/gax-go/v2 v2.8.0 // indirect
|
||||
github.com/google/uuid v1.6.0 // indirect
|
||||
github.com/googleapis/enterprise-certificate-proxy v0.3.6 // indirect
|
||||
github.com/googleapis/gax-go/v2 v2.14.1 // indirect
|
||||
github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674 // indirect
|
||||
github.com/goware/prefixer v0.0.0-20160118172347-395022866408 // indirect
|
||||
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 // indirect
|
||||
github.com/hashicorp/errwrap v1.1.0 // indirect
|
||||
github.com/hashicorp/go-cleanhttp v0.5.2 // indirect
|
||||
github.com/hashicorp/go-multierror v1.1.1 // indirect
|
||||
github.com/hashicorp/go-retryablehttp v0.7.2 // indirect
|
||||
github.com/hashicorp/go-retryablehttp v0.7.7 // indirect
|
||||
github.com/hashicorp/go-rootcerts v1.0.2 // indirect
|
||||
github.com/hashicorp/go-secure-stdlib/parseutil v0.1.6 // indirect
|
||||
github.com/hashicorp/go-secure-stdlib/parseutil v0.2.0 // indirect
|
||||
github.com/hashicorp/go-secure-stdlib/strutil v0.1.2 // indirect
|
||||
github.com/hashicorp/go-sockaddr v1.0.2 // indirect
|
||||
github.com/hashicorp/go-sockaddr v1.0.7 // indirect
|
||||
github.com/hashicorp/hcl v1.0.0 // indirect
|
||||
github.com/howeyc/gopass v0.0.0-20210920133722-c8aef6fb66ef // indirect
|
||||
github.com/imdario/mergo v0.3.13 // indirect
|
||||
github.com/inconshreveable/mousetrap v1.0.1 // indirect
|
||||
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
||||
github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 // indirect
|
||||
github.com/jmespath/go-jmespath v0.4.0 // indirect
|
||||
github.com/josharian/intern v1.0.0 // indirect
|
||||
github.com/json-iterator/go v1.1.12 // indirect
|
||||
github.com/klauspost/cpuid/v2 v2.2.10 // indirect
|
||||
github.com/kylelemons/godebug v1.1.0 // indirect
|
||||
github.com/lib/pq v1.10.5 // indirect
|
||||
github.com/lib/pq v1.10.9 // indirect
|
||||
github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de // indirect
|
||||
github.com/mailru/easyjson v0.7.7 // indirect
|
||||
github.com/mattn/go-colorable v0.1.12 // indirect
|
||||
github.com/mattn/go-isatty v0.0.14 // indirect
|
||||
github.com/matttproud/golang_protobuf_extensions v1.0.4 // indirect
|
||||
github.com/mailru/easyjson v0.9.0 // indirect
|
||||
github.com/mattn/go-colorable v0.1.14 // indirect
|
||||
github.com/mattn/go-isatty v0.0.20 // indirect
|
||||
github.com/mitchellh/go-homedir v1.1.0 // indirect
|
||||
github.com/mitchellh/go-wordwrap v1.0.1 // indirect
|
||||
github.com/mitchellh/mapstructure v1.5.0 // indirect
|
||||
github.com/moby/spdystream v0.2.0 // indirect
|
||||
github.com/moby/term v0.0.0-20221105221325-4eb28fa6025c // indirect
|
||||
github.com/moby/docker-image-spec v1.3.1 // indirect
|
||||
github.com/moby/spdystream v0.5.0 // indirect
|
||||
github.com/moby/sys/user v0.4.0 // indirect
|
||||
github.com/moby/term v0.5.2 // indirect
|
||||
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
|
||||
github.com/modern-go/reflect2 v1.0.2 // indirect
|
||||
github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 // indirect
|
||||
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
|
||||
github.com/opencontainers/go-digest/blake3 v0.0.0-20220411205349-bde1400a84be // indirect
|
||||
github.com/opencontainers/image-spec v1.0.2 // indirect
|
||||
github.com/opencontainers/runc v1.1.5 // indirect
|
||||
github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f // indirect
|
||||
github.com/opencontainers/go-digest/blake3 v0.0.0-20250116041648-1e56c6daea3b // indirect
|
||||
github.com/opencontainers/image-spec v1.1.1 // indirect
|
||||
github.com/opencontainers/runc v1.2.6 // indirect
|
||||
github.com/peterbourgon/diskv v2.0.1+incompatible // indirect
|
||||
github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 // indirect
|
||||
github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c // indirect
|
||||
github.com/pkg/errors v0.9.1 // indirect
|
||||
github.com/prometheus/client_golang v1.14.0 // indirect
|
||||
github.com/prometheus/client_model v0.3.0 // indirect
|
||||
github.com/prometheus/common v0.37.0 // indirect
|
||||
github.com/prometheus/procfs v0.8.0 // indirect
|
||||
github.com/russross/blackfriday v1.6.0 // indirect
|
||||
github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10 // indirect
|
||||
github.com/prometheus/client_golang v1.22.0 // indirect
|
||||
github.com/prometheus/client_model v0.6.2 // indirect
|
||||
github.com/prometheus/common v0.63.0 // indirect
|
||||
github.com/prometheus/procfs v0.16.1 // indirect
|
||||
github.com/russross/blackfriday/v2 v2.1.0 // indirect
|
||||
github.com/ryanuber/go-glob v1.0.0 // indirect
|
||||
github.com/sirupsen/logrus v1.9.0 // indirect
|
||||
github.com/spf13/cobra v1.6.1 // indirect
|
||||
github.com/xeipuuv/gojsonpointer v0.0.0-20180127040702-4e3ac2762d5f // indirect
|
||||
github.com/sirupsen/logrus v1.9.3 // indirect
|
||||
github.com/spf13/cobra v1.9.1 // indirect
|
||||
github.com/spiffe/go-spiffe/v2 v2.5.0 // indirect
|
||||
github.com/stoewer/go-strcase v1.3.0 // indirect
|
||||
github.com/urfave/cli v1.22.16 // indirect
|
||||
github.com/x448/float16 v0.8.4 // indirect
|
||||
github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb // indirect
|
||||
github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 // indirect
|
||||
github.com/xeipuuv/gojsonschema v1.2.0 // indirect
|
||||
github.com/xlab/treeprint v1.1.0 // indirect
|
||||
github.com/zeebo/blake3 v0.1.1 // indirect
|
||||
go.mozilla.org/gopgagent v0.0.0-20170926210634-4d7ea76ff71a // indirect
|
||||
go.opencensus.io v0.24.0 // indirect
|
||||
go.starlark.net v0.0.0-20221028183056-acb66ad56dd2 // indirect
|
||||
go.uber.org/atomic v1.10.0 // indirect
|
||||
go.uber.org/multierr v1.8.0 // indirect
|
||||
go.uber.org/zap v1.24.0 // indirect
|
||||
golang.org/x/crypto v0.7.0 // indirect
|
||||
golang.org/x/mod v0.9.0 // indirect
|
||||
golang.org/x/oauth2 v0.7.0 // indirect
|
||||
golang.org/x/sys v0.8.0 // indirect
|
||||
golang.org/x/term v0.8.0 // indirect
|
||||
golang.org/x/text v0.9.0 // indirect
|
||||
golang.org/x/time v0.3.0 // indirect
|
||||
golang.org/x/tools v0.7.0 // indirect
|
||||
gomodules.xyz/jsonpatch/v2 v2.2.0 // indirect
|
||||
google.golang.org/appengine v1.6.7 // indirect
|
||||
github.com/xlab/treeprint v1.2.0 // indirect
|
||||
github.com/zeebo/blake3 v0.2.4 // indirect
|
||||
github.com/zeebo/errs v1.4.0 // indirect
|
||||
go.opentelemetry.io/auto/sdk v1.1.0 // indirect
|
||||
go.opentelemetry.io/contrib/detectors/gcp v1.35.0 // indirect
|
||||
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.60.0 // indirect
|
||||
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.60.0 // indirect
|
||||
go.opentelemetry.io/otel v1.35.0 // indirect
|
||||
go.opentelemetry.io/otel/metric v1.35.0 // indirect
|
||||
go.opentelemetry.io/otel/sdk v1.35.0 // indirect
|
||||
go.opentelemetry.io/otel/sdk/metric v1.35.0 // indirect
|
||||
go.opentelemetry.io/otel/trace v1.35.0 // indirect
|
||||
go.uber.org/multierr v1.11.0 // indirect
|
||||
go.uber.org/zap v1.27.0 // indirect
|
||||
go.yaml.in/yaml/v2 v2.4.2 // indirect
|
||||
go.yaml.in/yaml/v3 v3.0.3 // indirect
|
||||
golang.org/x/crypto v0.38.0 // indirect
|
||||
golang.org/x/exp v0.0.0-20240909161429-701f63a606c0 // indirect
|
||||
golang.org/x/sync v0.14.0 // indirect
|
||||
golang.org/x/sys v0.33.0 // indirect
|
||||
golang.org/x/term v0.32.0 // indirect
|
||||
golang.org/x/text v0.25.0 // indirect
|
||||
golang.org/x/time v0.11.0 // indirect
|
||||
gomodules.xyz/jsonpatch/v2 v2.5.0 // indirect
|
||||
google.golang.org/api v0.230.0 // indirect
|
||||
google.golang.org/genproto v0.0.0-20250425173222-7b384671a197 // indirect
|
||||
google.golang.org/genproto/googleapis/api v0.0.0-20250425173222-7b384671a197 // indirect
|
||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20250425173222-7b384671a197 // indirect
|
||||
google.golang.org/grpc v1.72.0 // indirect
|
||||
google.golang.org/protobuf v1.36.6 // indirect
|
||||
gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
|
||||
gopkg.in/inf.v0 v0.9.1 // indirect
|
||||
gopkg.in/ini.v1 v1.66.4 // indirect
|
||||
gopkg.in/square/go-jose.v2 v2.6.0 // indirect
|
||||
gopkg.in/urfave/cli.v1 v1.20.0 // indirect
|
||||
gopkg.in/ini.v1 v1.67.0 // indirect
|
||||
gopkg.in/warnings.v0 v0.1.2 // indirect
|
||||
gopkg.in/yaml.v2 v2.4.0 // indirect
|
||||
gopkg.in/yaml.v3 v3.0.1 // indirect
|
||||
k8s.io/apiextensions-apiserver v0.26.3 // indirect
|
||||
k8s.io/cli-runtime v0.25.4 // indirect
|
||||
k8s.io/component-base v0.26.3 // indirect
|
||||
k8s.io/klog/v2 v2.90.1 // indirect
|
||||
k8s.io/kube-openapi v0.0.0-20230109183929-3758b55a6596 // indirect
|
||||
k8s.io/kubectl v0.25.4 // indirect
|
||||
k8s.io/utils v0.0.0-20221128185143-99ec85e7a448 // indirect
|
||||
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect
|
||||
sigs.k8s.io/kustomize/kyaml v0.13.9 // indirect
|
||||
sigs.k8s.io/structured-merge-diff/v4 v4.2.3 // indirect
|
||||
k8s.io/apiextensions-apiserver v0.33.0 // indirect
|
||||
k8s.io/cli-runtime v0.33.0 // indirect
|
||||
k8s.io/component-base v0.33.0 // indirect
|
||||
k8s.io/klog/v2 v2.130.1 // indirect
|
||||
k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff // indirect
|
||||
k8s.io/kubectl v0.33.0 // indirect
|
||||
sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 // indirect
|
||||
sigs.k8s.io/kustomize/kyaml v0.20.0 // indirect
|
||||
sigs.k8s.io/randfill v1.0.0 // indirect
|
||||
sigs.k8s.io/structured-merge-diff/v4 v4.7.0 // indirect
|
||||
)
|
||||
|
|
|
@ -0,0 +1,29 @@
|
|||
/*
|
||||
Copyright 2025 The Flux authors
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package intcache
|
||||
|
||||
const (
|
||||
OperationDecryptWithAWS = "decrypt_with_aws"
|
||||
OperationDecryptWithAzure = "decrypt_with_azure"
|
||||
OperationDecryptWithGCP = "decrypt_with_gcp"
|
||||
)
|
||||
|
||||
var AllOperations = []string{
|
||||
OperationDecryptWithAWS,
|
||||
OperationDecryptWithAzure,
|
||||
OperationDecryptWithGCP,
|
||||
}
|
|
@ -0,0 +1,19 @@
|
|||
/*
|
||||
Copyright 2025 The Flux authors
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controller
|
||||
|
||||
const OCIArtifactOriginRevisionAnnotation = "org.opencontainers.image.revision"
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
@ -115,7 +115,7 @@ stringData:
|
|||
return resultK.Status.LastAppliedRevision == revision
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
g.Expect(readyCondition.Reason).To(Equal(kustomizev1.ReconciliationSucceededReason))
|
||||
g.Expect(readyCondition.Reason).To(Equal(meta.ReconciliationSucceededReason))
|
||||
})
|
||||
|
||||
t.Run("fails to reconcile from cross-namespace source", func(t *testing.T) {
|
|
@ -0,0 +1,216 @@
|
|||
/*
|
||||
Copyright 2025 The Flux authors
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
. "github.com/onsi/gomega"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/types"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
|
||||
"github.com/fluxcd/pkg/apis/kustomize"
|
||||
"github.com/fluxcd/pkg/apis/meta"
|
||||
"github.com/fluxcd/pkg/auth"
|
||||
"github.com/fluxcd/pkg/runtime/conditions"
|
||||
"github.com/fluxcd/pkg/testserver"
|
||||
sourcev1 "github.com/fluxcd/source-controller/api/v1"
|
||||
|
||||
kustomizev1 "github.com/fluxcd/kustomize-controller/api/v1"
|
||||
"github.com/fluxcd/kustomize-controller/internal/decryptor"
|
||||
)
|
||||
|
||||
func TestKustomizationReconciler_ConfigurationError(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
id := "invalid-config-" + randStringRunes(5)
|
||||
revision := "v1.0.0"
|
||||
resultK := &kustomizev1.Kustomization{}
|
||||
timeout := 60 * time.Second
|
||||
|
||||
err := createNamespace(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create test namespace")
|
||||
|
||||
manifests := func(name string) []testserver.File {
|
||||
return []testserver.File{
|
||||
{
|
||||
Name: "config.yaml",
|
||||
Body: fmt.Sprintf(`---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: %[1]s
|
||||
data: {}
|
||||
`, name),
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
artifact, err := testServer.ArtifactFromFiles(manifests(id))
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: fmt.Sprintf("invalid-config-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifact, revision)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
t.Run("invalid cel expression", func(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
|
||||
kustomizationKey := types.NamespacedName{
|
||||
Name: fmt.Sprintf("invalid-config-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
kustomization := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: kustomizationKey.Name,
|
||||
Namespace: kustomizationKey.Namespace,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
TargetNamespace: id,
|
||||
Interval: metav1.Duration{Duration: 2 * time.Minute},
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
Prune: true,
|
||||
Timeout: &metav1.Duration{Duration: time.Second},
|
||||
Wait: true,
|
||||
HealthCheckExprs: []kustomize.CustomHealthCheck{{
|
||||
APIVersion: "v1",
|
||||
Kind: "ConfigMap",
|
||||
HealthCheckExpressions: kustomize.HealthCheckExpressions{
|
||||
InProgress: "foo.",
|
||||
Current: "true",
|
||||
},
|
||||
}},
|
||||
},
|
||||
}
|
||||
|
||||
err = k8sClient.Create(context.Background(), kustomization)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
return conditions.IsFalse(resultK, meta.ReadyCondition)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
g.Expect(resultK.Status.ObservedGeneration).To(Equal(resultK.GetGeneration()))
|
||||
|
||||
g.Expect(conditions.IsTrue(resultK, meta.StalledCondition)).To(BeTrue())
|
||||
for _, cond := range []string{meta.ReadyCondition, meta.StalledCondition} {
|
||||
g.Expect(conditions.GetReason(resultK, cond)).To(Equal(meta.InvalidCELExpressionReason))
|
||||
g.Expect(conditions.GetMessage(resultK, cond)).To(ContainSubstring(
|
||||
"failed to create custom status evaluator for healthchecks[0]: failed to parse the expression InProgress: failed to parse the CEL expression 'foo.': ERROR: <input>:1:5: Syntax error: no viable alternative at input '.'"))
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("object level workload identity feature gate disabled", func(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
|
||||
kustomizationKey := types.NamespacedName{
|
||||
Name: fmt.Sprintf("invalid-config-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
kustomization := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: kustomizationKey.Name,
|
||||
Namespace: kustomizationKey.Namespace,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
TargetNamespace: id,
|
||||
Interval: metav1.Duration{Duration: 2 * time.Minute},
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
Prune: true,
|
||||
Decryption: &kustomizev1.Decryption{
|
||||
Provider: decryptor.DecryptionProviderSOPS,
|
||||
ServiceAccountName: "foo",
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
err = k8sClient.Create(context.Background(), kustomization)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
return conditions.IsFalse(resultK, meta.ReadyCondition)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
// In this case the controller does not update the observed generation
|
||||
// because if the feature gate is enabled then the generation of the
|
||||
// object can be properly observed.
|
||||
g.Expect(resultK.Status.ObservedGeneration).To(Equal(int64(-1)))
|
||||
|
||||
g.Expect(conditions.IsTrue(resultK, meta.StalledCondition)).To(BeTrue())
|
||||
for _, cond := range []string{meta.ReadyCondition, meta.StalledCondition} {
|
||||
g.Expect(conditions.GetReason(resultK, cond)).To(Equal(meta.FeatureGateDisabledReason))
|
||||
g.Expect(conditions.GetMessage(resultK, cond)).To(ContainSubstring(
|
||||
"to use spec.decryption.serviceAccountName for decryption authentication please enable the ObjectLevelWorkloadIdentity feature gate in the controller"))
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("object level workload identity feature gate enabled", func(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
|
||||
t.Setenv(auth.EnvVarEnableObjectLevelWorkloadIdentity, "true")
|
||||
|
||||
kustomizationKey := types.NamespacedName{
|
||||
Name: fmt.Sprintf("invalid-config-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
kustomization := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: kustomizationKey.Name,
|
||||
Namespace: kustomizationKey.Namespace,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
TargetNamespace: id,
|
||||
Interval: metav1.Duration{Duration: 2 * time.Minute},
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
Prune: true,
|
||||
Decryption: &kustomizev1.Decryption{
|
||||
Provider: decryptor.DecryptionProviderSOPS,
|
||||
ServiceAccountName: "foo",
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
err = k8sClient.Create(context.Background(), kustomization)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
return conditions.IsTrue(resultK, meta.ReadyCondition)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
})
|
||||
}
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,138 @@
|
|||
/*
|
||||
Copyright 2023 The Flux authors
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/fluxcd/pkg/apis/meta"
|
||||
sourcev1 "github.com/fluxcd/source-controller/api/v1"
|
||||
. "github.com/onsi/gomega"
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
"k8s.io/apimachinery/pkg/api/errors"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/types"
|
||||
"k8s.io/client-go/tools/record"
|
||||
ctrl "sigs.k8s.io/controller-runtime"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
|
||||
kustomizev1 "github.com/fluxcd/kustomize-controller/api/v1"
|
||||
)
|
||||
|
||||
func TestKustomizationReconciler_StagedApply(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
|
||||
namespaceName := "kust-" + randStringRunes(5)
|
||||
namespace := &corev1.Namespace{
|
||||
ObjectMeta: metav1.ObjectMeta{Name: namespaceName},
|
||||
}
|
||||
g.Expect(k8sClient.Create(ctx, namespace)).ToNot(HaveOccurred())
|
||||
t.Cleanup(func() {
|
||||
g.Expect(k8sClient.Delete(ctx, namespace)).NotTo(HaveOccurred())
|
||||
})
|
||||
|
||||
err := createKubeConfigSecret(namespaceName)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create kubeconfig secret")
|
||||
|
||||
artifactName := "val-" + randStringRunes(5)
|
||||
artifactChecksum, err := testServer.ArtifactFromDir("testdata/crds", artifactName)
|
||||
g.Expect(err).ToNot(HaveOccurred())
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: fmt.Sprintf("val-%s", randStringRunes(5)),
|
||||
Namespace: namespaceName,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifactName, "main/"+artifactChecksum)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
kustomization := &kustomizev1.Kustomization{}
|
||||
kustomization.Name = "test-kust"
|
||||
kustomization.Namespace = namespaceName
|
||||
kustomization.Spec = kustomizev1.KustomizationSpec{
|
||||
Interval: metav1.Duration{Duration: 10 * time.Minute},
|
||||
Prune: true,
|
||||
Path: "./",
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
KubeConfig: &meta.KubeConfigReference{
|
||||
SecretRef: meta.SecretKeyReference{
|
||||
Name: "kubeconfig",
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
g.Expect(k8sClient.Create(context.Background(), kustomization)).To(Succeed())
|
||||
|
||||
g.Eventually(func() bool {
|
||||
var obj kustomizev1.Kustomization
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), &obj)
|
||||
return isReconcileSuccess(&obj) && obj.Status.LastAttemptedRevision == "main/"+artifactChecksum
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
g.Expect(k8sClient.Delete(context.Background(), kustomization)).To(Succeed())
|
||||
|
||||
g.Eventually(func() bool {
|
||||
var obj kustomizev1.Kustomization
|
||||
err = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), &obj)
|
||||
return errors.IsNotFound(err)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
}
|
||||
|
||||
func TestKustomizationReconciler_deleteBeforeFinalizer(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
|
||||
namespaceName := "kust-" + randStringRunes(5)
|
||||
namespace := &corev1.Namespace{
|
||||
ObjectMeta: metav1.ObjectMeta{Name: namespaceName},
|
||||
}
|
||||
g.Expect(k8sClient.Create(ctx, namespace)).ToNot(HaveOccurred())
|
||||
t.Cleanup(func() {
|
||||
g.Expect(k8sClient.Delete(ctx, namespace)).NotTo(HaveOccurred())
|
||||
})
|
||||
|
||||
kustomization := &kustomizev1.Kustomization{}
|
||||
kustomization.Name = "test-kust"
|
||||
kustomization.Namespace = namespaceName
|
||||
kustomization.Spec = kustomizev1.KustomizationSpec{
|
||||
Interval: metav1.Duration{Duration: interval},
|
||||
Prune: true,
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Kind: "Bucket",
|
||||
Name: "foo",
|
||||
},
|
||||
}
|
||||
// Add a test finalizer to prevent the object from getting deleted.
|
||||
kustomization.SetFinalizers([]string{"test-finalizer"})
|
||||
g.Expect(k8sClient.Create(ctx, kustomization)).NotTo(HaveOccurred())
|
||||
// Add deletion timestamp by deleting the object.
|
||||
g.Expect(k8sClient.Delete(ctx, kustomization)).NotTo(HaveOccurred())
|
||||
|
||||
r := &KustomizationReconciler{
|
||||
Client: k8sClient,
|
||||
EventRecorder: record.NewFakeRecorder(32),
|
||||
}
|
||||
// NOTE: Only a real API server responds with an error in this scenario.
|
||||
_, err := r.Reconcile(ctx, ctrl.Request{NamespacedName: client.ObjectKeyFromObject(kustomization)})
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
}
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
@ -43,18 +43,18 @@ func TestKustomizationReconciler_Decryptor(t *testing.T) {
|
|||
g.Expect(err).NotTo(HaveOccurred(), "failed to create vault client")
|
||||
|
||||
// create a master key on the vault transit engine
|
||||
path, data := "sops/keys/firstkey", map[string]interface{}{"type": "rsa-4096"}
|
||||
path, data := "sops/keys/vault", map[string]interface{}{"type": "rsa-4096"}
|
||||
_, err = cli.Logical().Write(path, data)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to write key")
|
||||
|
||||
// encrypt the testdata vault secret
|
||||
cmd := exec.Command("sops", "--hc-vault-transit", cli.Address()+"/v1/sops/keys/firstkey", "--encrypt", "--encrypted-regex", "^(data|stringData)$", "--in-place", "./testdata/sops/secret.vault.yaml")
|
||||
cmd := exec.Command("sops", "--hc-vault-transit", cli.Address()+"/v1/sops/keys/vault", "--encrypt", "--encrypted-regex", "^(data|stringData)$", "--in-place", "./testdata/sops/algorithms/vault.yaml")
|
||||
err = cmd.Run()
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to encrypt file")
|
||||
|
||||
// defer the testdata vault secret decryption, to leave a clean testdata vault secret
|
||||
defer func() {
|
||||
cmd := exec.Command("sops", "--hc-vault-transit", cli.Address()+"/v1/sops/keys/firstkey", "--decrypt", "--encrypted-regex", "^(data|stringData)$", "--in-place", "./testdata/sops/secret.vault.yaml")
|
||||
cmd := exec.Command("sops", "--hc-vault-transit", cli.Address()+"/v1/sops/keys/firstkey", "--decrypt", "--encrypted-regex", "^(data|stringData)$", "--in-place", "./testdata/sops/algorithms/vault.yaml")
|
||||
err = cmd.Run()
|
||||
}()
|
||||
|
||||
|
@ -70,36 +70,23 @@ func TestKustomizationReconciler_Decryptor(t *testing.T) {
|
|||
artifactChecksum, err := testServer.ArtifactFromDir("testdata/sops", artifactName)
|
||||
g.Expect(err).ToNot(HaveOccurred())
|
||||
|
||||
overlayArtifactName := "sops-" + randStringRunes(5)
|
||||
overlayChecksum, err := testServer.ArtifactFromDir("testdata/test-dotenv", overlayArtifactName)
|
||||
g.Expect(err).ToNot(HaveOccurred())
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: fmt.Sprintf("sops-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
overlayRepositoryName := types.NamespacedName{
|
||||
Name: fmt.Sprintf("sops-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifactName, "main/"+artifactChecksum)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
err = applyGitRepository(overlayRepositoryName, overlayArtifactName, "main/"+overlayChecksum)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
pgpKey, err := os.ReadFile("testdata/sops/pgp.asc")
|
||||
pgpKey, err := os.ReadFile("testdata/sops/keys/pgp.asc")
|
||||
g.Expect(err).ToNot(HaveOccurred())
|
||||
ageKey, err := os.ReadFile("testdata/sops/age.txt")
|
||||
ageKey, err := os.ReadFile("testdata/sops/keys/age.txt")
|
||||
g.Expect(err).ToNot(HaveOccurred())
|
||||
|
||||
sopsSecretKey := types.NamespacedName{
|
||||
Name: "sops-" + randStringRunes(5),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
sopsSecret := &corev1.Secret{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: sopsSecretKey.Name,
|
||||
|
@ -153,60 +140,40 @@ func TestKustomizationReconciler_Decryptor(t *testing.T) {
|
|||
return obj.Status.LastAppliedRevision == "main/"+artifactChecksum
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
overlayKustomizationName := fmt.Sprintf("sops-%s", randStringRunes(5))
|
||||
overlayKs := kustomization.DeepCopy()
|
||||
overlayKs.ResourceVersion = ""
|
||||
overlayKs.Name = overlayKustomizationName
|
||||
overlayKs.Spec.SourceRef.Name = overlayRepositoryName.Name
|
||||
overlayKs.Spec.SourceRef.Namespace = overlayRepositoryName.Namespace
|
||||
overlayKs.Spec.Path = "./testdata/test-dotenv/overlays"
|
||||
|
||||
g.Expect(k8sClient.Create(context.TODO(), overlayKs)).To(Succeed())
|
||||
|
||||
g.Eventually(func() bool {
|
||||
var obj kustomizev1.Kustomization
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(overlayKs), &obj)
|
||||
return obj.Status.LastAppliedRevision == "main/"+overlayChecksum
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
t.Run("decrypts SOPS secrets", func(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
|
||||
var pgpSecret corev1.Secret
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: "sops-pgp", Namespace: id}, &pgpSecret)).To(Succeed())
|
||||
g.Expect(pgpSecret.Data["secret"]).To(Equal([]byte(`my-sops-pgp-secret`)))
|
||||
secretNames := []string{
|
||||
"sops-algo-age",
|
||||
"sops-algo-pgp",
|
||||
"sops-algo-vault",
|
||||
"sops-component",
|
||||
"sops-envs-secret",
|
||||
"sops-files-secret",
|
||||
"sops-inside-secret",
|
||||
"sops-remote-secret",
|
||||
}
|
||||
for _, name := range secretNames {
|
||||
var secret corev1.Secret
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: name, Namespace: id}, &secret)).To(Succeed())
|
||||
g.Expect(string(secret.Data["key"])).To(Equal("value"), fmt.Sprintf("failed on secret %s", name))
|
||||
}
|
||||
|
||||
var ageSecret corev1.Secret
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: "sops-age", Namespace: id}, &ageSecret)).To(Succeed())
|
||||
g.Expect(ageSecret.Data["secret"]).To(Equal([]byte(`my-sops-age-secret`)))
|
||||
configMapNames := []string{
|
||||
"sops-envs-configmap",
|
||||
"sops-files-configmap",
|
||||
"sops-remote-configmap",
|
||||
}
|
||||
for _, name := range configMapNames {
|
||||
var configMap corev1.ConfigMap
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: name, Namespace: id}, &configMap)).To(Succeed())
|
||||
g.Expect(string(configMap.Data["key"])).To(Equal("value"), fmt.Sprintf("failed on configmap %s", name))
|
||||
}
|
||||
|
||||
var daySecret corev1.Secret
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: "sops-day", Namespace: id}, &daySecret)).To(Succeed())
|
||||
g.Expect(string(daySecret.Data["secret"])).To(Equal("day=Tuesday\n"))
|
||||
|
||||
var yearSecret corev1.Secret
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: "sops-year", Namespace: id}, &yearSecret)).To(Succeed())
|
||||
g.Expect(string(yearSecret.Data["year"])).To(Equal("2017"))
|
||||
|
||||
var unencryptedSecret corev1.Secret
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: "unencrypted-sops-year", Namespace: id}, &unencryptedSecret)).To(Succeed())
|
||||
g.Expect(string(unencryptedSecret.Data["year"])).To(Equal("2021"))
|
||||
|
||||
var year1Secret corev1.Secret
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: "sops-year1", Namespace: id}, &year1Secret)).To(Succeed())
|
||||
g.Expect(string(year1Secret.Data["year"])).To(Equal("year1"))
|
||||
|
||||
var year2Secret corev1.Secret
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: "sops-year2", Namespace: id}, &year2Secret)).To(Succeed())
|
||||
g.Expect(string(year2Secret.Data["year"])).To(Equal("year2"))
|
||||
|
||||
var encodedSecret corev1.Secret
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: "sops-month", Namespace: id}, &encodedSecret)).To(Succeed())
|
||||
g.Expect(string(encodedSecret.Data["month.yaml"])).To(Equal("month: May\n"))
|
||||
|
||||
var hcvaultSecret corev1.Secret
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: "sops-hcvault", Namespace: id}, &hcvaultSecret)).To(Succeed())
|
||||
g.Expect(string(hcvaultSecret.Data["secret"])).To(Equal("my-sops-vault-secret\n"))
|
||||
var patchedSecret corev1.Secret
|
||||
g.Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: "sops-patches-secret", Namespace: id}, &patchedSecret)).To(Succeed())
|
||||
g.Expect(string(patchedSecret.Data["key"])).To(Equal("merge1"))
|
||||
g.Expect(string(patchedSecret.Data["merge2"])).To(Equal("merge2"))
|
||||
})
|
||||
|
||||
t.Run("does not emit change events for identical secrets", func(t *testing.T) {
|
|
@ -0,0 +1,171 @@
|
|||
/*
|
||||
Copyright 2024 The Flux authors
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/fluxcd/pkg/apis/meta"
|
||||
"github.com/fluxcd/pkg/testserver"
|
||||
sourcev1 "github.com/fluxcd/source-controller/api/v1"
|
||||
. "github.com/onsi/gomega"
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/types"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
|
||||
kustomizev1 "github.com/fluxcd/kustomize-controller/api/v1"
|
||||
)
|
||||
|
||||
func TestKustomizationReconciler_DeletionPolicyDelete(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
prune bool
|
||||
deletionPolicy string
|
||||
wantDelete bool
|
||||
}{
|
||||
{
|
||||
name: "should delete when deletionPolicy overrides pruning disabled",
|
||||
prune: false,
|
||||
deletionPolicy: kustomizev1.DeletionPolicyDelete,
|
||||
wantDelete: true,
|
||||
},
|
||||
{
|
||||
name: "should delete and wait when deletionPolicy overrides pruning disabled",
|
||||
prune: false,
|
||||
deletionPolicy: kustomizev1.DeletionPolicyWaitForTermination,
|
||||
wantDelete: true,
|
||||
},
|
||||
{
|
||||
name: "should delete when deletionPolicy mirrors prune and pruning enabled",
|
||||
prune: true,
|
||||
deletionPolicy: kustomizev1.DeletionPolicyMirrorPrune,
|
||||
wantDelete: true,
|
||||
},
|
||||
{
|
||||
name: "should orphan when deletionPolicy overrides pruning enabled",
|
||||
prune: true,
|
||||
deletionPolicy: kustomizev1.DeletionPolicyOrphan,
|
||||
wantDelete: false,
|
||||
},
|
||||
{
|
||||
name: "should orphan when deletionPolicy mirrors prune and pruning disabled",
|
||||
prune: false,
|
||||
deletionPolicy: kustomizev1.DeletionPolicyMirrorPrune,
|
||||
wantDelete: false,
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
id := "gc-" + randStringRunes(5)
|
||||
revision := "v1.0.0"
|
||||
|
||||
err := createNamespace(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create test namespace")
|
||||
|
||||
err = createKubeConfigSecret(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create kubeconfig secret")
|
||||
|
||||
manifests := func(name string, data string) []testserver.File {
|
||||
return []testserver.File{
|
||||
{
|
||||
Name: "config.yaml",
|
||||
Body: fmt.Sprintf(`---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: %[1]s
|
||||
data:
|
||||
key: "%[2]s"
|
||||
`, name, data),
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
artifact, err := testServer.ArtifactFromFiles(manifests(id, id))
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: fmt.Sprintf("gc-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifact, revision)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
kustomizationKey := types.NamespacedName{
|
||||
Name: fmt.Sprintf("gc-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
kustomization := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: kustomizationKey.Name,
|
||||
Namespace: kustomizationKey.Namespace,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
Interval: metav1.Duration{Duration: reconciliationInterval},
|
||||
Path: "./",
|
||||
KubeConfig: &meta.KubeConfigReference{
|
||||
SecretRef: meta.SecretKeyReference{
|
||||
Name: "kubeconfig",
|
||||
},
|
||||
},
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
TargetNamespace: id,
|
||||
Prune: tt.prune,
|
||||
DeletionPolicy: tt.deletionPolicy,
|
||||
Timeout: &metav1.Duration{Duration: 5 * time.Second},
|
||||
},
|
||||
}
|
||||
|
||||
g.Expect(k8sClient.Create(context.Background(), kustomization)).To(Succeed())
|
||||
|
||||
resultK := &kustomizev1.Kustomization{}
|
||||
resultConfig := &corev1.ConfigMap{}
|
||||
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
return resultK.Status.LastAppliedRevision == revision
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
g.Expect(k8sClient.Get(context.Background(), types.NamespacedName{Name: id, Namespace: id}, resultConfig)).Should(Succeed())
|
||||
|
||||
g.Expect(k8sClient.Delete(context.Background(), kustomization)).To(Succeed())
|
||||
g.Eventually(func() bool {
|
||||
err = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), kustomization)
|
||||
return apierrors.IsNotFound(err)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
if tt.wantDelete {
|
||||
err = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(resultConfig), resultConfig)
|
||||
g.Expect(apierrors.IsNotFound(err)).To(BeTrue())
|
||||
} else {
|
||||
g.Expect(k8sClient.Get(context.Background(), client.ObjectKeyFromObject(resultConfig), resultConfig)).Should(Succeed())
|
||||
}
|
||||
|
||||
})
|
||||
}
|
||||
}
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
@ -148,7 +148,7 @@ spec:
|
|||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
ready := apimeta.FindStatusCondition(resultK.Status.Conditions, meta.ReadyCondition)
|
||||
return ready.Reason == kustomizev1.ArtifactFailedReason
|
||||
return ready.Reason == meta.ArtifactFailedReason
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
})
|
||||
|
||||
|
@ -160,7 +160,7 @@ spec:
|
|||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
ready := apimeta.FindStatusCondition(resultK.Status.Conditions, meta.ReadyCondition)
|
||||
return ready.Reason == kustomizev1.ReconciliationSucceededReason
|
||||
return ready.Reason == meta.ReconciliationSucceededReason
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
})
|
||||
|
||||
|
@ -180,7 +180,7 @@ spec:
|
|||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
ready := apimeta.FindStatusCondition(resultK.Status.Conditions, meta.ReadyCondition)
|
||||
return ready.Reason == kustomizev1.DependencyNotReadyReason
|
||||
return ready.Reason == meta.DependencyNotReadyReason
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
})
|
||||
}
|
|
@ -0,0 +1,156 @@
|
|||
/*
|
||||
Copyright 2023 The Flux authors
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/fluxcd/pkg/apis/meta"
|
||||
"github.com/fluxcd/pkg/testserver"
|
||||
sourcev1 "github.com/fluxcd/source-controller/api/v1"
|
||||
. "github.com/onsi/gomega"
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/types"
|
||||
ctrl "sigs.k8s.io/controller-runtime"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
|
||||
kustomizev1 "github.com/fluxcd/kustomize-controller/api/v1"
|
||||
)
|
||||
|
||||
func TestKustomizationReconciler_DisallowedManagers(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
id := "disallowed-managers-" + randStringRunes(5)
|
||||
revision := "v1.0.0"
|
||||
|
||||
err := createNamespace(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create test namespace")
|
||||
|
||||
err = createKubeConfigSecret(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create kubeconfig secret")
|
||||
|
||||
manifests := func(name string, data string) []testserver.File {
|
||||
return []testserver.File{
|
||||
{
|
||||
Name: "configmap.yaml",
|
||||
Body: fmt.Sprintf(`---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: %[1]s
|
||||
data:
|
||||
key: %[2]s
|
||||
`, name, data),
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
artifact, err := testServer.ArtifactFromFiles(manifests(id, randStringRunes(5)))
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create artifact from files")
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: fmt.Sprintf("disallowed-managers-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifact, revision)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
kustomizationKey := types.NamespacedName{
|
||||
Name: fmt.Sprintf("disallowed-managers-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
kustomization := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: kustomizationKey.Name,
|
||||
Namespace: kustomizationKey.Namespace,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
Interval: metav1.Duration{Duration: reconciliationInterval},
|
||||
Path: "./",
|
||||
KubeConfig: &meta.KubeConfigReference{
|
||||
SecretRef: meta.SecretKeyReference{
|
||||
Name: "kubeconfig",
|
||||
},
|
||||
},
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
HealthChecks: []meta.NamespacedObjectKindReference{
|
||||
{
|
||||
APIVersion: "v1",
|
||||
Kind: "ConfigMap",
|
||||
Name: id,
|
||||
Namespace: id,
|
||||
},
|
||||
},
|
||||
TargetNamespace: id,
|
||||
Force: false,
|
||||
},
|
||||
}
|
||||
|
||||
g.Expect(k8sClient.Create(context.Background(), kustomization)).To(Succeed())
|
||||
|
||||
resultK := &kustomizev1.Kustomization{}
|
||||
initialConfigMap := &corev1.ConfigMap{}
|
||||
badConfigMap := &corev1.ConfigMap{}
|
||||
fixedConfigMap := &corev1.ConfigMap{}
|
||||
|
||||
t.Run("creates configmap", func(t *testing.T) {
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
return resultK.Status.LastAppliedRevision == revision
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
logStatus(t, resultK)
|
||||
|
||||
kstatusCheck.CheckErr(ctx, resultK)
|
||||
g.Expect(k8sClient.Get(context.Background(), types.NamespacedName{Name: id, Namespace: id}, initialConfigMap)).Should(Succeed())
|
||||
g.Expect(initialConfigMap.Data).Should(HaveKey("key"))
|
||||
})
|
||||
|
||||
t.Run("update configmap with new data", func(t *testing.T) {
|
||||
configMap := corev1.ConfigMap{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: id,
|
||||
Namespace: id,
|
||||
},
|
||||
}
|
||||
err = k8sClient.Patch(context.Background(), &configMap, client.RawPatch(types.MergePatchType, []byte(`{"data":{"bad-key":"overridden field manager"}}`)), &client.PatchOptions{FieldManager: overrideManagerName})
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
err = k8sClient.Patch(context.Background(), &configMap, client.RawPatch(types.MergePatchType, []byte(`{"data":{"key2":"not overridden field manager"}}`)), &client.PatchOptions{FieldManager: "good-name"})
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
err = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(initialConfigMap), badConfigMap)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
g.Expect(badConfigMap.Data).Should(HaveKey("bad-key"))
|
||||
g.Expect(badConfigMap.Data).Should(HaveKey("key2"))
|
||||
})
|
||||
|
||||
t.Run("bad-key should be removed from the configmap", func(t *testing.T) {
|
||||
reconciler.Reconcile(context.Background(), ctrl.Request{
|
||||
NamespacedName: kustomizationKey,
|
||||
})
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(initialConfigMap), fixedConfigMap)
|
||||
return g.Expect(fixedConfigMap.Data).ShouldNot(HaveKey("bad-key")) && g.Expect(fixedConfigMap.Data).Should(HaveKey("key2"))
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
})
|
||||
}
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
@ -144,7 +144,7 @@ stringData:
|
|||
events := getEvents(resultK.GetName(), map[string]string{"kustomize.toolkit.fluxcd.io/revision": revision})
|
||||
g.Expect(len(events) > 0).To(BeTrue())
|
||||
g.Expect(events[0].Type).To(BeIdenticalTo("Warning"))
|
||||
g.Expect(events[0].Message).To(ContainSubstring("invalid, error: secret is immutable"))
|
||||
g.Expect(events[0].Message).To(ContainSubstring("field is immutable"))
|
||||
})
|
||||
})
|
||||
|
||||
|
@ -169,6 +169,6 @@ stringData:
|
|||
|
||||
kstatusCheck.CheckErr(ctx, resultK)
|
||||
|
||||
g.Expect(apimeta.IsStatusConditionTrue(resultK.Status.Conditions, kustomizev1.HealthyCondition)).To(BeTrue())
|
||||
g.Expect(apimeta.IsStatusConditionTrue(resultK.Status.Conditions, meta.HealthyCondition)).To(BeTrue())
|
||||
})
|
||||
}
|
|
@ -17,7 +17,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"archive/tar"
|
||||
|
@ -76,12 +76,12 @@ var (
|
|||
debugMode = os.Getenv("DEBUG_TEST") != ""
|
||||
)
|
||||
|
||||
const vaultVersion = "1.2.2"
|
||||
const vaultVersion = "1.13.2"
|
||||
const defaultBinVersion = "1.24"
|
||||
|
||||
//go:embed testdata/crd/*.yaml
|
||||
//go:embed testdata/sops/pgp.asc
|
||||
//go:embed testdata/sops/age.txt
|
||||
//go:embed testdata/sops/keys/pgp.asc
|
||||
//go:embed testdata/sops/keys/age.txt
|
||||
var testFiles embed.FS
|
||||
|
||||
// FuzzControllers implements a fuzzer that targets the Kustomize controller.
|
||||
|
@ -125,8 +125,9 @@ func Fuzz_Controllers(f *testing.F) {
|
|||
reconciler := &KustomizationReconciler{
|
||||
ControllerName: controllerName,
|
||||
Client: testEnv,
|
||||
Mapper: testEnv.GetRESTMapper(),
|
||||
}
|
||||
if err := (reconciler).SetupWithManager(testEnv, KustomizationReconcilerOptions{MaxConcurrentReconciles: 1}); err != nil {
|
||||
if err := (reconciler).SetupWithManager(ctx, testEnv, KustomizationReconcilerOptions{}); err != nil {
|
||||
panic(fmt.Sprintf("Failed to start GitRepositoryReconciler: %v", err))
|
||||
}
|
||||
}, func() error {
|
||||
|
@ -182,11 +183,11 @@ func Fuzz_Controllers(f *testing.F) {
|
|||
if err != nil {
|
||||
return err
|
||||
}
|
||||
pgpKey, err := testFiles.ReadFile("testdata/sops/pgp.asc")
|
||||
pgpKey, err := testFiles.ReadFile("testdata/sops/keys/pgp.asc")
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
ageKey, err := testFiles.ReadFile("testdata/sops/age.txt")
|
||||
ageKey, err := testFiles.ReadFile("testdata/sops/keys/age.txt")
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
@ -364,7 +365,7 @@ func createFiles(f *fuzz.ConsumeFuzzer, rootDir string) error {
|
|||
continue // some errors here are not permanent, so we can try again with different values
|
||||
}
|
||||
|
||||
err = os.MkdirAll(dirPath, 0o755)
|
||||
err = os.MkdirAll(dirPath, 0o750)
|
||||
if err != nil {
|
||||
if noOfCreatedFiles > 0 {
|
||||
return nil
|
||||
|
@ -433,7 +434,7 @@ func ensureDependencies() error {
|
|||
// as it is being consumed directly from the embed.FS.
|
||||
embedDirs := []string{"testdata/crd"}
|
||||
for _, dir := range embedDirs {
|
||||
err := os.MkdirAll(dir, 0o755)
|
||||
err := os.MkdirAll(dir, 0o750)
|
||||
if err != nil {
|
||||
return fmt.Errorf("mkdir %s: %v", dir, err)
|
||||
}
|
||||
|
@ -452,7 +453,7 @@ func ensureDependencies() error {
|
|||
return fmt.Errorf("reading embedded file %s: %v", fileName, err)
|
||||
}
|
||||
|
||||
os.WriteFile(fileName, data, 0o644)
|
||||
os.WriteFile(fileName, data, 0o600)
|
||||
if err != nil {
|
||||
return fmt.Errorf("writing %s: %v", fileName, err)
|
||||
}
|
||||
|
@ -727,7 +728,7 @@ func createArtifact(artifactServer *testserver.ArtifactServer, fixture, path str
|
|||
return "", err
|
||||
}
|
||||
|
||||
if err := os.Chmod(f.Name(), 0644); err != nil {
|
||||
if err := os.Chmod(f.Name(), 0o600); err != nil {
|
||||
return "", err
|
||||
}
|
||||
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
@ -119,7 +119,7 @@ data:
|
|||
return resultK.Status.LastAppliedRevision == revision
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
g.Expect(readyCondition.Reason).To(Equal(kustomizev1.ReconciliationSucceededReason))
|
||||
g.Expect(readyCondition.Reason).To(Equal(meta.ReconciliationSucceededReason))
|
||||
})
|
||||
|
||||
t.Run("fails to reconcile impersonating the default service account", func(t *testing.T) {
|
||||
|
@ -131,7 +131,7 @@ data:
|
|||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
readyCondition = apimeta.FindStatusCondition(resultK.Status.Conditions, meta.ReadyCondition)
|
||||
return readyCondition.Reason == kustomizev1.ReconciliationFailedReason
|
||||
return readyCondition.Reason == meta.ReconciliationFailedReason
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
g.Expect(readyCondition.Message).To(ContainSubstring("system:serviceaccount:%s:default", id))
|
||||
|
@ -187,7 +187,7 @@ data:
|
|||
return resultK.Status.LastAppliedRevision == revision
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
g.Expect(readyCondition.Reason).To(Equal(kustomizev1.ReconciliationSucceededReason))
|
||||
g.Expect(readyCondition.Reason).To(Equal(meta.ReconciliationSucceededReason))
|
||||
})
|
||||
|
||||
t.Run("can finalize impersonating service account", func(t *testing.T) {
|
||||
|
@ -288,7 +288,7 @@ data:
|
|||
return apimeta.IsStatusConditionFalse(resultK.Status.Conditions, meta.ReadyCondition)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
g.Expect(readyCondition.Reason).To(Equal(kustomizev1.ReconciliationFailedReason))
|
||||
g.Expect(readyCondition.Reason).To(Equal(meta.ReconciliationFailedReason))
|
||||
g.Expect(readyCondition.Message).To(ContainSubstring(`Secret "%s" not found`, secretName))
|
||||
})
|
||||
|
||||
|
@ -314,7 +314,7 @@ data:
|
|||
return resultK.Status.LastAppliedRevision == revision
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
g.Expect(readyCondition.Reason).To(Equal(kustomizev1.ReconciliationSucceededReason))
|
||||
g.Expect(readyCondition.Reason).To(Equal(meta.ReconciliationSucceededReason))
|
||||
})
|
||||
|
||||
}
|
|
@ -14,13 +14,16 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
|
||||
"github.com/fluxcd/pkg/runtime/conditions"
|
||||
ctrl "sigs.k8s.io/controller-runtime"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
"sigs.k8s.io/controller-runtime/pkg/handler"
|
||||
"sigs.k8s.io/controller-runtime/pkg/reconcile"
|
||||
|
||||
"github.com/fluxcd/pkg/runtime/dependency"
|
||||
|
@ -29,37 +32,41 @@ import (
|
|||
kustomizev1 "github.com/fluxcd/kustomize-controller/api/v1"
|
||||
)
|
||||
|
||||
func (r *KustomizationReconciler) requestsForRevisionChangeOf(indexKey string) func(obj client.Object) []reconcile.Request {
|
||||
return func(obj client.Object) []reconcile.Request {
|
||||
func (r *KustomizationReconciler) requestsForRevisionChangeOf(indexKey string) handler.MapFunc {
|
||||
return func(ctx context.Context, obj client.Object) []reconcile.Request {
|
||||
log := ctrl.LoggerFrom(ctx)
|
||||
repo, ok := obj.(interface {
|
||||
GetArtifact() *sourcev1.Artifact
|
||||
})
|
||||
if !ok {
|
||||
panic(fmt.Sprintf("Expected an object conformed with GetArtifact() method, but got a %T", obj))
|
||||
log.Error(fmt.Errorf("expected an object conformed with GetArtifact() method, but got a %T", obj),
|
||||
"failed to get reconcile requests for revision change")
|
||||
return nil
|
||||
}
|
||||
// If we do not have an artifact, we have no requests to make
|
||||
if repo.GetArtifact() == nil {
|
||||
return nil
|
||||
}
|
||||
|
||||
ctx := context.Background()
|
||||
var list kustomizev1.KustomizationList
|
||||
if err := r.List(ctx, &list, client.MatchingFields{
|
||||
indexKey: client.ObjectKeyFromObject(obj).String(),
|
||||
}); err != nil {
|
||||
log.Error(err, "failed to list objects for revision change")
|
||||
return nil
|
||||
}
|
||||
var dd []dependency.Dependent
|
||||
for _, d := range list.Items {
|
||||
// If the revision of the artifact equals to the last attempted revision,
|
||||
// we should not make a request for this Kustomization
|
||||
if repo.GetArtifact().HasRevision(d.Status.LastAttemptedRevision) {
|
||||
for i, d := range list.Items {
|
||||
// If the Kustomization is ready and the revision of the artifact equals
|
||||
// to the last attempted revision, we should not make a request for this Kustomization
|
||||
if conditions.IsReady(&list.Items[i]) && repo.GetArtifact().HasRevision(d.Status.LastAttemptedRevision) {
|
||||
continue
|
||||
}
|
||||
dd = append(dd, d.DeepCopy())
|
||||
}
|
||||
sorted, err := dependency.Sort(dd)
|
||||
if err != nil {
|
||||
log.Error(err, "failed to sort dependencies for revision change")
|
||||
return nil
|
||||
}
|
||||
reqs := make([]reconcile.Request, len(sorted))
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
@ -25,8 +25,8 @@ import (
|
|||
corev1 "k8s.io/api/core/v1"
|
||||
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||
"sigs.k8s.io/cli-utils/pkg/object"
|
||||
|
||||
"github.com/fluxcd/cli-utils/pkg/object"
|
||||
"github.com/fluxcd/pkg/apis/meta"
|
||||
"github.com/fluxcd/pkg/testserver"
|
||||
sourcev1 "github.com/fluxcd/source-controller/api/v1"
|
|
@ -0,0 +1,125 @@
|
|||
/*
|
||||
Copyright 2025 The Flux authors
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
eventv1 "github.com/fluxcd/pkg/apis/event/v1beta1"
|
||||
"github.com/fluxcd/pkg/apis/meta"
|
||||
"github.com/fluxcd/pkg/testserver"
|
||||
sourcev1 "github.com/fluxcd/source-controller/api/v1"
|
||||
. "github.com/onsi/gomega"
|
||||
apimeta "k8s.io/apimachinery/pkg/api/meta"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/types"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
|
||||
kustomizev1 "github.com/fluxcd/kustomize-controller/api/v1"
|
||||
)
|
||||
|
||||
func TestKustomizationReconciler_OriginRevision(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
id := "force-" + randStringRunes(5)
|
||||
revision := "v1.0.0"
|
||||
|
||||
err := createNamespace(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create test namespace")
|
||||
|
||||
err = createKubeConfigSecret(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create kubeconfig secret")
|
||||
|
||||
manifests := func(name string, data string) []testserver.File {
|
||||
return []testserver.File{
|
||||
{
|
||||
Name: "secret.yaml",
|
||||
Body: fmt.Sprintf(`---
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: %[1]s
|
||||
stringData:
|
||||
key: "%[2]s"
|
||||
`, name, data),
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
artifact, err := testServer.ArtifactFromFiles(manifests(id, randStringRunes(5)))
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create artifact from files")
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: randStringRunes(5),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifact, revision,
|
||||
withGitRepoArtifactMetadata(OCIArtifactOriginRevisionAnnotation, "orev"))
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
kustomizationKey := types.NamespacedName{
|
||||
Name: fmt.Sprintf("force-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
kustomization := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: kustomizationKey.Name,
|
||||
Namespace: kustomizationKey.Namespace,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
Interval: metav1.Duration{Duration: reconciliationInterval},
|
||||
Path: "./",
|
||||
KubeConfig: &meta.KubeConfigReference{
|
||||
SecretRef: meta.SecretKeyReference{
|
||||
Name: "kubeconfig",
|
||||
},
|
||||
},
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
TargetNamespace: id,
|
||||
},
|
||||
}
|
||||
|
||||
g.Expect(k8sClient.Create(context.Background(), kustomization)).To(Succeed())
|
||||
|
||||
resultK := &kustomizev1.Kustomization{}
|
||||
readyCondition := &metav1.Condition{}
|
||||
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
readyCondition = apimeta.FindStatusCondition(resultK.Status.Conditions, meta.ReadyCondition)
|
||||
return resultK.Status.LastAppliedRevision == revision
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
g.Expect(readyCondition.Reason).To(Equal(meta.ReconciliationSucceededReason))
|
||||
|
||||
g.Expect(resultK.Status.LastAppliedOriginRevision).To(Equal("orev"))
|
||||
|
||||
events := getEvents(kustomizationKey.Name, nil)
|
||||
g.Expect(events).To(Not(BeEmpty()))
|
||||
|
||||
annotationKey := kustomizev1.GroupVersion.Group + "/" + eventv1.MetaOriginRevisionKey
|
||||
for _, e := range events {
|
||||
g.Expect(e.GetAnnotations()).To(HaveKeyWithValue(annotationKey, "orev"))
|
||||
}
|
||||
}
|
|
@ -0,0 +1,243 @@
|
|||
/*
|
||||
Copyright 2025 The Flux authors
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/fluxcd/pkg/apis/kustomize"
|
||||
"github.com/fluxcd/pkg/apis/meta"
|
||||
"github.com/fluxcd/pkg/testserver"
|
||||
sourcev1 "github.com/fluxcd/source-controller/api/v1"
|
||||
. "github.com/onsi/gomega"
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/types"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
|
||||
kustomizev1 "github.com/fluxcd/kustomize-controller/api/v1"
|
||||
)
|
||||
|
||||
// TestKustomizationReconciler_MultiplePatchDelete tests the handling of multiple
|
||||
// $patch: delete directives in strategic merge patches.
|
||||
// This test ensures that the controller properly handles scenarios where multiple
|
||||
// resources are deleted using a single patch specification.
|
||||
func TestKustomizationReconciler_MultiplePatchDelete(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
id := "multi-patch-delete-" + randStringRunes(5)
|
||||
revision := "v1.0.0"
|
||||
|
||||
err := createNamespace(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create test namespace")
|
||||
|
||||
err = createKubeConfigSecret(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create kubeconfig secret")
|
||||
|
||||
// Create test files with multiple ConfigMaps
|
||||
manifests := func(name string, data string) []testserver.File {
|
||||
return []testserver.File{
|
||||
{
|
||||
Name: "configmaps.yaml",
|
||||
Body: `---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: cm1
|
||||
namespace: ` + name + `
|
||||
data:
|
||||
key: ` + data + `1
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: cm2
|
||||
namespace: ` + name + `
|
||||
data:
|
||||
key: ` + data + `2
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: cm3
|
||||
namespace: ` + name + `
|
||||
data:
|
||||
key: ` + data + `3
|
||||
`,
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
artifact, err := testServer.ArtifactFromFiles(manifests(id, randStringRunes(5)))
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: randStringRunes(5),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifact, revision)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
kustomizationKey := types.NamespacedName{
|
||||
Name: "patch-delete-" + randStringRunes(5),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
t.Run("multiple patch delete in single patch should work", func(t *testing.T) {
|
||||
// This test verifies that multiple $patch: delete directives in a single patch work correctly
|
||||
// Ref: https://github.com/fluxcd/kustomize-controller/issues/1306
|
||||
kustomization := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: kustomizationKey.Name,
|
||||
Namespace: kustomizationKey.Namespace,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
Interval: metav1.Duration{Duration: reconciliationInterval},
|
||||
Path: "./",
|
||||
KubeConfig: &meta.KubeConfigReference{
|
||||
SecretRef: meta.SecretKeyReference{
|
||||
Name: "kubeconfig",
|
||||
},
|
||||
},
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
Prune: true,
|
||||
Patches: []kustomize.Patch{
|
||||
{
|
||||
// Multiple $patch: delete in a single patch
|
||||
Patch: `$patch: delete
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: cm1
|
||||
namespace: ` + id + `
|
||||
---
|
||||
$patch: delete
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: cm2
|
||||
namespace: ` + id + ``,
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
g.Expect(k8sClient.Create(context.Background(), kustomization)).To(Succeed())
|
||||
|
||||
// Wait for reconciliation and check that it succeeds without panic
|
||||
g.Eventually(func() bool {
|
||||
var obj kustomizev1.Kustomization
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), &obj)
|
||||
return obj.Status.LastAppliedRevision == revision
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
// Verify that only cm3 ConfigMap exists (cm1 and cm2 should be deleted)
|
||||
var cm corev1.ConfigMap
|
||||
err := k8sClient.Get(context.Background(), client.ObjectKey{Name: "cm1", Namespace: id}, &cm)
|
||||
g.Expect(err).To(HaveOccurred(), "cm1 should have been deleted")
|
||||
|
||||
err = k8sClient.Get(context.Background(), client.ObjectKey{Name: "cm2", Namespace: id}, &cm)
|
||||
g.Expect(err).To(HaveOccurred(), "cm2 should have been deleted")
|
||||
|
||||
err = k8sClient.Get(context.Background(), client.ObjectKey{Name: "cm3", Namespace: id}, &cm)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "cm3 should still exist")
|
||||
|
||||
// Cleanup
|
||||
g.Expect(k8sClient.Delete(context.Background(), kustomization)).To(Succeed())
|
||||
g.Eventually(func() bool {
|
||||
err := k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), kustomization)
|
||||
return apierrors.IsNotFound(err)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
})
|
||||
|
||||
t.Run("multiple patch delete in separate patches should work", func(t *testing.T) {
|
||||
// This test verifies that separate patches (which was previously a workaround) still work correctly
|
||||
kustomizationSeparate := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: kustomizationKey.Name + "-separate",
|
||||
Namespace: kustomizationKey.Namespace,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
Interval: metav1.Duration{Duration: reconciliationInterval},
|
||||
Path: "./",
|
||||
KubeConfig: &meta.KubeConfigReference{
|
||||
SecretRef: meta.SecretKeyReference{
|
||||
Name: "kubeconfig",
|
||||
},
|
||||
},
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
Prune: true,
|
||||
Patches: []kustomize.Patch{
|
||||
{
|
||||
Patch: `$patch: delete
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: cm1
|
||||
namespace: ` + id + ``,
|
||||
},
|
||||
{
|
||||
Patch: `$patch: delete
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: cm2
|
||||
namespace: ` + id + ``,
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
g.Expect(k8sClient.Create(context.Background(), kustomizationSeparate)).To(Succeed())
|
||||
|
||||
// Wait for successful reconciliation
|
||||
g.Eventually(func() bool {
|
||||
var obj kustomizev1.Kustomization
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomizationSeparate), &obj)
|
||||
return obj.Status.LastAppliedRevision == revision
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
// Verify that only cm3 ConfigMap exists
|
||||
var cm corev1.ConfigMap
|
||||
err := k8sClient.Get(context.Background(), client.ObjectKey{Name: "cm1", Namespace: id}, &cm)
|
||||
g.Expect(err).To(HaveOccurred(), "cm1 should have been deleted")
|
||||
|
||||
err = k8sClient.Get(context.Background(), client.ObjectKey{Name: "cm2", Namespace: id}, &cm)
|
||||
g.Expect(err).To(HaveOccurred(), "cm2 should have been deleted")
|
||||
|
||||
err = k8sClient.Get(context.Background(), client.ObjectKey{Name: "cm3", Namespace: id}, &cm)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "cm3 should still exist")
|
||||
|
||||
// Cleanup
|
||||
g.Expect(k8sClient.Delete(context.Background(), kustomizationSeparate)).To(Succeed())
|
||||
g.Eventually(func() bool {
|
||||
err := k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomizationSeparate), kustomizationSeparate)
|
||||
return apierrors.IsNotFound(err)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
})
|
||||
}
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
@ -146,6 +146,91 @@ data:
|
|||
})
|
||||
}
|
||||
|
||||
func TestKustomizationReconciler_NamePrefixSuffix(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
id := "np-" + randStringRunes(5)
|
||||
revision := "v1.0.0"
|
||||
resultK := &kustomizev1.Kustomization{}
|
||||
|
||||
err := createNamespace(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create test namespace")
|
||||
|
||||
err = createKubeConfigSecret(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create kubeconfig secret")
|
||||
|
||||
manifests := func(name string) []testserver.File {
|
||||
return []testserver.File{
|
||||
{
|
||||
Name: "config.yaml",
|
||||
Body: fmt.Sprintf(`---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: %[1]s
|
||||
annotations:
|
||||
tenant: test
|
||||
data:
|
||||
key: val
|
||||
`, name),
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
artifact, err := testServer.ArtifactFromFiles(manifests(id))
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: fmt.Sprintf("cm-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifact, revision)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
kustomizationKey := types.NamespacedName{
|
||||
Name: fmt.Sprintf("cm-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
kustomization := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: kustomizationKey.Name,
|
||||
Namespace: kustomizationKey.Namespace,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
Interval: metav1.Duration{Duration: 2 * time.Minute},
|
||||
Path: "./",
|
||||
KubeConfig: &meta.KubeConfigReference{
|
||||
SecretRef: meta.SecretKeyReference{
|
||||
Name: "kubeconfig",
|
||||
},
|
||||
},
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
NamePrefix: "prefix-",
|
||||
NameSuffix: "-suffix",
|
||||
TargetNamespace: id,
|
||||
},
|
||||
}
|
||||
|
||||
g.Expect(k8sClient.Create(context.Background(), kustomization)).To(Succeed())
|
||||
|
||||
t.Run("sets name prefix and suffix", func(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
return isReconcileSuccess(resultK)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
kstatusCheck.CheckErr(ctx, resultK)
|
||||
|
||||
name := fmt.Sprintf("prefix-%s-suffix", id)
|
||||
var cm corev1.ConfigMap
|
||||
g.Expect(k8sClient.Get(context.Background(), client.ObjectKey{Name: name, Namespace: id}, &cm)).To(Succeed())
|
||||
})
|
||||
}
|
||||
|
||||
func TestKustomizationReconciler_KustomizeTransformer(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
id := "transformers-" + randStringRunes(5)
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
@ -120,7 +120,7 @@ func TestKustomizationReconciler_Validation(t *testing.T) {
|
|||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), &resultK)
|
||||
for _, c := range resultK.Status.Conditions {
|
||||
if c.Reason == kustomizev1.BuildFailedReason {
|
||||
if c.Reason == meta.BuildFailedReason {
|
||||
return true
|
||||
}
|
||||
}
|
||||
|
@ -133,7 +133,7 @@ func TestKustomizationReconciler_Validation(t *testing.T) {
|
|||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(overlayKs), &resultK)
|
||||
for _, c := range resultK.Status.Conditions {
|
||||
if c.Reason == kustomizev1.BuildFailedReason {
|
||||
if c.Reason == meta.BuildFailedReason {
|
||||
return true
|
||||
}
|
||||
}
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
@ -164,7 +164,7 @@ stringData:
|
|||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(inputK), resultK)
|
||||
for _, c := range resultK.Status.Conditions {
|
||||
if c.Reason == kustomizev1.ReconciliationSucceededReason {
|
||||
if c.Reason == meta.ReconciliationSucceededReason {
|
||||
return true
|
||||
}
|
||||
}
|
||||
|
@ -178,7 +178,7 @@ stringData:
|
|||
t.Run("sets status", func(t *testing.T) {
|
||||
g.Expect(resultK.Status.LastAppliedRevision).To(Equal(revision))
|
||||
g.Expect(apimeta.IsStatusConditionTrue(resultK.Status.Conditions, meta.ReadyCondition)).To(BeTrue())
|
||||
g.Expect(apimeta.IsStatusConditionTrue(resultK.Status.Conditions, kustomizev1.HealthyCondition)).To(BeTrue())
|
||||
g.Expect(apimeta.IsStatusConditionTrue(resultK.Status.Conditions, meta.HealthyCondition)).To(BeTrue())
|
||||
})
|
||||
|
||||
t.Run("replaces vars", func(t *testing.T) {
|
||||
|
@ -315,7 +315,7 @@ metadata:
|
|||
resultK := &kustomizev1.Kustomization{}
|
||||
_ = k8sClient.Get(ctx, client.ObjectKeyFromObject(inputK), resultK)
|
||||
for _, c := range resultK.Status.Conditions {
|
||||
if c.Reason == kustomizev1.ReconciliationSucceededReason {
|
||||
if c.Reason == meta.ReconciliationSucceededReason {
|
||||
return true
|
||||
}
|
||||
}
|
||||
|
@ -349,3 +349,224 @@ metadata:
|
|||
g.Expect(resultSA.Labels["shape"]).To(Equal("square"))
|
||||
})
|
||||
}
|
||||
|
||||
func TestKustomizationReconciler_VarsubNumberBool(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
|
||||
g := NewWithT(t)
|
||||
id := "vars-" + randStringRunes(5)
|
||||
revision := "v1.0.0/" + randStringRunes(7)
|
||||
|
||||
err := createNamespace(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create test namespace")
|
||||
|
||||
err = createKubeConfigSecret(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create kubeconfig secret")
|
||||
|
||||
manifests := func(name string) []testserver.File {
|
||||
return []testserver.File{
|
||||
{
|
||||
Name: "templates.yaml",
|
||||
Body: fmt.Sprintf(`
|
||||
---
|
||||
apiVersion: source.toolkit.fluxcd.io/v1
|
||||
kind: GitRepository
|
||||
metadata:
|
||||
name: %[1]s
|
||||
namespace: %[1]s
|
||||
labels:
|
||||
id: ${numberStr}
|
||||
enabled: ${booleanStr}
|
||||
annotations:
|
||||
id: ${q}${number}${q}
|
||||
enabled: ${q}${boolean}${q}
|
||||
spec:
|
||||
interval: ${number}m
|
||||
url: https://host/repo
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: %[1]s
|
||||
namespace: %[1]s
|
||||
data:
|
||||
id: ${q}${number}${q}
|
||||
text: |
|
||||
This variable is escaped $${var}
|
||||
|
||||
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vivamus at
|
||||
nisl sem. Nullam nec dui ipsum. Nam vehicula volutpat ipsum, ac fringilla
|
||||
nisl convallis sed. Aliquam porttitor turpis finibus, finibus velit ut,
|
||||
imperdiet mauris. Cras nec neque nulla. Maecenas semper nulla et elit
|
||||
dictum sagittis. Quisque tincidunt non diam non ullamcorper. Curabitur
|
||||
pretium urna odio, vitae ullamcorper purus mollis sit amet. Nam ac lectus
|
||||
ac arcu varius feugiat id fringilla massa.
|
||||
|
||||
\?
|
||||
`, name),
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
artifact, err := testServer.ArtifactFromFiles(manifests(id))
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: randStringRunes(5),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifact, revision)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
inputK := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: id,
|
||||
Namespace: id,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
KubeConfig: &meta.KubeConfigReference{
|
||||
SecretRef: meta.SecretKeyReference{
|
||||
Name: "kubeconfig",
|
||||
},
|
||||
},
|
||||
Interval: metav1.Duration{Duration: reconciliationInterval},
|
||||
Path: "./",
|
||||
Prune: true,
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
Name: repositoryName.Name,
|
||||
},
|
||||
PostBuild: &kustomizev1.PostBuild{
|
||||
Substitute: map[string]string{
|
||||
"q": `"`,
|
||||
|
||||
"numberStr": "!!str 123",
|
||||
"number": "123",
|
||||
"booleanStr": "!!str true",
|
||||
"boolean": "true",
|
||||
},
|
||||
},
|
||||
Wait: false,
|
||||
},
|
||||
}
|
||||
g.Expect(k8sClient.Create(ctx, inputK)).Should(Succeed())
|
||||
|
||||
g.Eventually(func() bool {
|
||||
resultK := &kustomizev1.Kustomization{}
|
||||
_ = k8sClient.Get(ctx, client.ObjectKeyFromObject(inputK), resultK)
|
||||
for _, c := range resultK.Status.Conditions {
|
||||
if c.Reason == meta.ReconciliationSucceededReason {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
}, timeout, interval).Should(BeTrue())
|
||||
|
||||
resultRepo := &sourcev1.GitRepository{}
|
||||
g.Expect(k8sClient.Get(ctx, types.NamespacedName{Name: id, Namespace: id}, resultRepo)).Should(Succeed())
|
||||
g.Expect(resultRepo.Labels["id"]).To(Equal("123"))
|
||||
g.Expect(resultRepo.Annotations["id"]).To(Equal("123"))
|
||||
g.Expect(resultRepo.Labels["enabled"]).To(Equal("true"))
|
||||
g.Expect(resultRepo.Annotations["enabled"]).To(Equal("true"))
|
||||
|
||||
resultCM := &corev1.ConfigMap{}
|
||||
g.Expect(k8sClient.Get(ctx, types.NamespacedName{Name: id, Namespace: id}, resultCM)).Should(Succeed())
|
||||
g.Expect(resultCM.Data["id"]).To(Equal("123"))
|
||||
g.Expect(resultCM.Data["text"]).To(ContainSubstring(`${var}`))
|
||||
g.Expect(resultCM.Data["text"]).ToNot(ContainSubstring(`$${var}`))
|
||||
g.Expect(resultCM.Data["text"]).To(ContainSubstring(`\?`))
|
||||
}
|
||||
|
||||
func TestKustomizationReconciler_VarsubStrict(t *testing.T) {
|
||||
reconciler.StrictSubstitutions = true
|
||||
defer func() {
|
||||
reconciler.StrictSubstitutions = false
|
||||
}()
|
||||
|
||||
ctx := context.Background()
|
||||
|
||||
g := NewWithT(t)
|
||||
id := "vars-" + randStringRunes(5)
|
||||
revision := "v1.0.0/" + randStringRunes(7)
|
||||
|
||||
err := createNamespace(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create test namespace")
|
||||
|
||||
err = createKubeConfigSecret(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create kubeconfig secret")
|
||||
|
||||
manifests := func(name string) []testserver.File {
|
||||
return []testserver.File{
|
||||
{
|
||||
Name: "service-account.yaml",
|
||||
Body: fmt.Sprintf(`
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: %[1]s
|
||||
namespace: %[1]s
|
||||
labels:
|
||||
default: ${default:=test}
|
||||
missing: ${missing}
|
||||
`, name),
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
artifact, err := testServer.ArtifactFromFiles(manifests(id))
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: randStringRunes(5),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifact, revision)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
inputK := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: id,
|
||||
Namespace: id,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
KubeConfig: &meta.KubeConfigReference{
|
||||
SecretRef: meta.SecretKeyReference{
|
||||
Name: "kubeconfig",
|
||||
},
|
||||
},
|
||||
Interval: metav1.Duration{Duration: reconciliationInterval},
|
||||
Path: "./",
|
||||
Prune: true,
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
Name: repositoryName.Name,
|
||||
},
|
||||
PostBuild: &kustomizev1.PostBuild{
|
||||
Substitute: map[string]string{
|
||||
"test": "test",
|
||||
},
|
||||
},
|
||||
Wait: true,
|
||||
},
|
||||
}
|
||||
g.Expect(k8sClient.Create(ctx, inputK)).Should(Succeed())
|
||||
|
||||
var resultK kustomizev1.Kustomization
|
||||
t.Run("fails to reconcile", func(t *testing.T) {
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(inputK), &resultK)
|
||||
for _, c := range resultK.Status.Conditions {
|
||||
if c.Reason == meta.BuildFailedReason {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
}, timeout, interval).Should(BeTrue())
|
||||
})
|
||||
|
||||
ready := apimeta.FindStatusCondition(resultK.Status.Conditions, meta.ReadyCondition)
|
||||
g.Expect(ready.Message).To(ContainSubstring("variable not set"))
|
||||
g.Expect(k8sClient.Delete(context.Background(), &resultK)).To(Succeed())
|
||||
}
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
@ -22,13 +22,16 @@ import (
|
|||
"testing"
|
||||
"time"
|
||||
|
||||
runtimeClient "github.com/fluxcd/pkg/runtime/client"
|
||||
. "github.com/onsi/gomega"
|
||||
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||
"k8s.io/apimachinery/pkg/types"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
"sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
|
||||
|
||||
"github.com/fluxcd/pkg/apis/kustomize"
|
||||
"github.com/fluxcd/pkg/apis/meta"
|
||||
"github.com/fluxcd/pkg/runtime/conditions"
|
||||
"github.com/fluxcd/pkg/testserver"
|
||||
|
@ -127,8 +130,8 @@ parameters:
|
|||
}, timeout, time.Second).Should(BeTrue())
|
||||
logStatus(t, resultK)
|
||||
|
||||
g.Expect(conditions.IsTrue(resultK, kustomizev1.HealthyCondition)).To(BeTrue())
|
||||
g.Expect(conditions.GetReason(resultK, kustomizev1.HealthyCondition)).To(BeIdenticalTo(meta.SucceededReason))
|
||||
g.Expect(conditions.IsTrue(resultK, meta.HealthyCondition)).To(BeTrue())
|
||||
g.Expect(conditions.GetReason(resultK, meta.HealthyCondition)).To(BeIdenticalTo(meta.SucceededReason))
|
||||
|
||||
g.Expect(resultK.Status.ObservedGeneration).To(BeIdenticalTo(resultK.Generation))
|
||||
|
||||
|
@ -155,12 +158,12 @@ parameters:
|
|||
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
return isReconcileRunning(resultK) && conditions.IsUnknown(resultK, kustomizev1.HealthyCondition)
|
||||
return isReconcileRunning(resultK) && conditions.IsUnknown(resultK, meta.HealthyCondition)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
logStatus(t, resultK)
|
||||
|
||||
expectedMessage := "Running health checks"
|
||||
for _, c := range []string{meta.ReconcilingCondition, kustomizev1.HealthyCondition} {
|
||||
for _, c := range []string{meta.ReconcilingCondition, meta.HealthyCondition} {
|
||||
g.Expect(conditions.GetReason(resultK, c)).To(BeIdenticalTo(meta.ProgressingReason))
|
||||
g.Expect(conditions.GetMessage(resultK, c)).To(ContainSubstring(expectedMessage))
|
||||
g.Expect(conditions.GetObservedGeneration(resultK, c)).To(BeIdenticalTo(resultK.Generation))
|
||||
|
@ -175,9 +178,9 @@ parameters:
|
|||
}, timeout, time.Second).Should(BeTrue())
|
||||
logStatus(t, resultK)
|
||||
|
||||
for _, c := range []string{kustomizev1.HealthyCondition, meta.ReadyCondition} {
|
||||
for _, c := range []string{meta.HealthyCondition, meta.ReadyCondition} {
|
||||
g.Expect(conditions.IsFalse(resultK, c)).To(BeTrue())
|
||||
g.Expect(conditions.GetReason(resultK, c)).To(BeIdenticalTo(kustomizev1.HealthCheckFailedReason))
|
||||
g.Expect(conditions.GetReason(resultK, c)).To(BeIdenticalTo(meta.HealthCheckFailedReason))
|
||||
g.Expect(conditions.GetObservedGeneration(resultK, c)).To(BeIdenticalTo(resultK.Generation))
|
||||
}
|
||||
|
||||
|
@ -212,13 +215,13 @@ parameters:
|
|||
logStatus(t, resultK)
|
||||
|
||||
expectedMessage := "Health check passed"
|
||||
g.Expect(conditions.IsTrue(resultK, kustomizev1.HealthyCondition)).To(BeTrue())
|
||||
g.Expect(conditions.GetReason(resultK, kustomizev1.HealthyCondition)).To(BeIdenticalTo(meta.SucceededReason))
|
||||
g.Expect(conditions.GetObservedGeneration(resultK, kustomizev1.HealthyCondition)).To(BeIdenticalTo(resultK.Generation))
|
||||
g.Expect(conditions.GetMessage(resultK, kustomizev1.HealthyCondition)).To(ContainSubstring(expectedMessage))
|
||||
g.Expect(conditions.IsTrue(resultK, meta.HealthyCondition)).To(BeTrue())
|
||||
g.Expect(conditions.GetReason(resultK, meta.HealthyCondition)).To(BeIdenticalTo(meta.SucceededReason))
|
||||
g.Expect(conditions.GetObservedGeneration(resultK, meta.HealthyCondition)).To(BeIdenticalTo(resultK.Generation))
|
||||
g.Expect(conditions.GetMessage(resultK, meta.HealthyCondition)).To(ContainSubstring(expectedMessage))
|
||||
|
||||
g.Expect(conditions.IsTrue(resultK, meta.ReadyCondition)).To(BeTrue())
|
||||
g.Expect(conditions.GetReason(resultK, meta.ReadyCondition)).To(BeIdenticalTo(kustomizev1.ReconciliationSucceededReason))
|
||||
g.Expect(conditions.GetReason(resultK, meta.ReadyCondition)).To(BeIdenticalTo(meta.ReconciliationSucceededReason))
|
||||
g.Expect(conditions.GetObservedGeneration(resultK, meta.ReadyCondition)).To(BeIdenticalTo(resultK.Generation))
|
||||
g.Expect(conditions.GetMessage(resultK, meta.ReadyCondition)).To(BeIdenticalTo(fmt.Sprintf("Applied revision: %s", revision)))
|
||||
|
||||
|
@ -249,7 +252,7 @@ parameters:
|
|||
logStatus(t, resultK)
|
||||
|
||||
g.Expect(isReconcileSuccess(resultK)).To(BeTrue())
|
||||
g.Expect(conditions.IsTrue(resultK, kustomizev1.HealthyCondition)).To(BeTrue())
|
||||
g.Expect(conditions.IsTrue(resultK, meta.HealthyCondition)).To(BeTrue())
|
||||
g.Expect(conditions.GetMessage(resultK, meta.ReadyCondition)).To(BeIdenticalTo(fmt.Sprintf("Applied revision: %s", revision)))
|
||||
|
||||
g.Expect(resultK.Status.LastAttemptedRevision).To(BeIdenticalTo(resultK.Status.LastAppliedRevision))
|
||||
|
@ -275,3 +278,171 @@ parameters:
|
|||
}, timeout, time.Second).Should(BeTrue())
|
||||
})
|
||||
}
|
||||
|
||||
func TestKustomizationReconciler_WaitsForCustomHealthChecks(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
id := "cel-" + randStringRunes(5)
|
||||
revision := "v1.0.0"
|
||||
resultK := &kustomizev1.Kustomization{}
|
||||
timeout := 60 * time.Second
|
||||
|
||||
err := createNamespace(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create test namespace")
|
||||
|
||||
err = createKubeConfigSecret(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create kubeconfig secret")
|
||||
|
||||
manifests := func(name string) []testserver.File {
|
||||
return []testserver.File{
|
||||
{
|
||||
Name: "config.yaml",
|
||||
Body: fmt.Sprintf(`---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: %[1]s
|
||||
data: {}
|
||||
`, name),
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
artifact, err := testServer.ArtifactFromFiles(manifests(id))
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: fmt.Sprintf("wait-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifact, revision)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
kustomizationKey := types.NamespacedName{
|
||||
Name: fmt.Sprintf("wait-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
kustomization := &kustomizev1.Kustomization{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: kustomizationKey.Name,
|
||||
Namespace: kustomizationKey.Namespace,
|
||||
},
|
||||
Spec: kustomizev1.KustomizationSpec{
|
||||
Interval: metav1.Duration{Duration: 2 * time.Minute},
|
||||
Path: "./",
|
||||
KubeConfig: &meta.KubeConfigReference{
|
||||
SecretRef: meta.SecretKeyReference{
|
||||
Name: "kubeconfig",
|
||||
},
|
||||
},
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
TargetNamespace: id,
|
||||
Prune: true,
|
||||
Timeout: &metav1.Duration{Duration: time.Second},
|
||||
Wait: true,
|
||||
HealthCheckExprs: []kustomize.CustomHealthCheck{{
|
||||
APIVersion: "v1",
|
||||
Kind: "ConfigMap",
|
||||
HealthCheckExpressions: kustomize.HealthCheckExpressions{
|
||||
InProgress: "has(data.foo.bar)",
|
||||
Current: "true",
|
||||
},
|
||||
}},
|
||||
},
|
||||
}
|
||||
|
||||
err = k8sClient.Create(context.Background(), kustomization)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
return conditions.IsFalse(resultK, meta.ReadyCondition)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
logStatus(t, resultK)
|
||||
|
||||
msg := conditions.GetMessage(resultK, meta.ReadyCondition)
|
||||
g.Expect(msg).
|
||||
To(ContainSubstring("timeout waiting for: [ConfigMap"))
|
||||
g.Expect(msg).
|
||||
To(ContainSubstring("failed to evaluate the CEL expression 'has(data.foo.bar)': no such attribute(s): data.foo.bar"))
|
||||
}
|
||||
|
||||
func TestKustomizationReconciler_RESTMapper(t *testing.T) {
|
||||
g := NewWithT(t)
|
||||
id := "rm-" + randStringRunes(5)
|
||||
resultK := &kustomizev1.Kustomization{}
|
||||
|
||||
restMapper, err := runtimeClient.NewDynamicRESTMapper(testEnv.Config)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
err = createNamespace(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create test namespace")
|
||||
|
||||
err = createKubeConfigSecret(id)
|
||||
g.Expect(err).NotTo(HaveOccurred(), "failed to create kubeconfig secret")
|
||||
|
||||
artifactName := "val-" + randStringRunes(5)
|
||||
artifactChecksum, err := testServer.ArtifactFromDir("testdata/restmapper", artifactName)
|
||||
g.Expect(err).ToNot(HaveOccurred())
|
||||
|
||||
repositoryName := types.NamespacedName{
|
||||
Name: fmt.Sprintf("val-%s", randStringRunes(5)),
|
||||
Namespace: id,
|
||||
}
|
||||
|
||||
err = applyGitRepository(repositoryName, artifactName, "main/"+artifactChecksum)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
kustomization := &kustomizev1.Kustomization{}
|
||||
kustomization.Name = id
|
||||
kustomization.Namespace = id
|
||||
kustomization.Spec = kustomizev1.KustomizationSpec{
|
||||
Interval: metav1.Duration{Duration: 10 * time.Minute},
|
||||
Prune: true,
|
||||
Path: "./",
|
||||
Wait: true,
|
||||
SourceRef: kustomizev1.CrossNamespaceSourceReference{
|
||||
Name: repositoryName.Name,
|
||||
Namespace: repositoryName.Namespace,
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
},
|
||||
KubeConfig: &meta.KubeConfigReference{
|
||||
SecretRef: meta.SecretKeyReference{
|
||||
Name: "kubeconfig",
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
g.Expect(k8sClient.Create(context.Background(), kustomization)).To(Succeed())
|
||||
|
||||
g.Eventually(func() bool {
|
||||
_ = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
return isReconcileSuccess(resultK) && resultK.Status.LastAttemptedRevision == "main/"+artifactChecksum
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
|
||||
t.Run("discovers newly registered CRD and preferred version", func(t *testing.T) {
|
||||
mapping, err := restMapper.RESTMapping(schema.GroupKind{Kind: "ClusterCleanupPolicy", Group: "kyverno.io"})
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
g.Expect(mapping.Resource.Version).To(Equal("v2"))
|
||||
})
|
||||
|
||||
t.Run("finalizes object", func(t *testing.T) {
|
||||
g.Expect(k8sClient.Delete(context.Background(), resultK)).To(Succeed())
|
||||
|
||||
g.Eventually(func() bool {
|
||||
err = k8sClient.Get(context.Background(), client.ObjectKeyFromObject(kustomization), resultK)
|
||||
return apierrors.IsNotFound(err)
|
||||
}, timeout, time.Second).Should(BeTrue())
|
||||
})
|
||||
|
||||
t.Run("discovery fails for deleted CRD", func(t *testing.T) {
|
||||
newMapper, err := runtimeClient.NewDynamicRESTMapper(testEnv.Config)
|
||||
g.Expect(err).NotTo(HaveOccurred())
|
||||
_, err = newMapper.RESTMapping(schema.GroupKind{Kind: "ClusterCleanupPolicy", Group: "kyverno.io"})
|
||||
g.Expect(err).To(HaveOccurred())
|
||||
})
|
||||
}
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"sigs.k8s.io/controller-runtime/pkg/event"
|
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package controllers
|
||||
package controller
|
||||
|
||||
import (
|
||||
"context"
|
||||
|
@ -43,26 +43,22 @@ import (
|
|||
"github.com/fluxcd/pkg/runtime/conditions"
|
||||
kcheck "github.com/fluxcd/pkg/runtime/conditions/check"
|
||||
"github.com/fluxcd/pkg/runtime/controller"
|
||||
"github.com/fluxcd/pkg/runtime/metrics"
|
||||
"github.com/fluxcd/pkg/runtime/testenv"
|
||||
"github.com/fluxcd/pkg/testserver"
|
||||
sourcev1 "github.com/fluxcd/source-controller/api/v1"
|
||||
sourcev1b2 "github.com/fluxcd/source-controller/api/v1beta2"
|
||||
|
||||
kustomizev1 "github.com/fluxcd/kustomize-controller/api/v1"
|
||||
)
|
||||
|
||||
func init() {
|
||||
rand.Seed(time.Now().UnixNano())
|
||||
}
|
||||
|
||||
const (
|
||||
timeout = time.Second * 30
|
||||
interval = time.Second * 1
|
||||
reconciliationInterval = time.Second * 5
|
||||
vaultVersion = "1.13.2"
|
||||
overrideManagerName = "node-fetch"
|
||||
)
|
||||
|
||||
const vaultVersion = "1.2.2"
|
||||
|
||||
var (
|
||||
reconciler *KustomizationReconciler
|
||||
k8sClient client.Client
|
||||
|
@ -76,17 +72,19 @@ var (
|
|||
debugMode = os.Getenv("DEBUG_TEST") != ""
|
||||
)
|
||||
|
||||
func runInContext(registerControllers func(*testenv.Environment), run func() error, crdPath string) error {
|
||||
func runInContext(registerControllers func(*testenv.Environment), run func() int) (code int) {
|
||||
var err error
|
||||
utilruntime.Must(kustomizev1.AddToScheme(scheme.Scheme))
|
||||
utilruntime.Must(sourcev1.AddToScheme(scheme.Scheme))
|
||||
utilruntime.Must(sourcev1b2.AddToScheme(scheme.Scheme))
|
||||
|
||||
if debugMode {
|
||||
controllerLog.SetLogger(zap.New(zap.WriteTo(os.Stderr), zap.UseDevMode(false)))
|
||||
}
|
||||
|
||||
testEnv = testenv.New(testenv.WithCRDPath(crdPath))
|
||||
testEnv = testenv.New(
|
||||
testenv.WithCRDPath(filepath.Join("..", "..", "config", "crd", "bases")),
|
||||
testenv.WithMaxConcurrentReconciles(4),
|
||||
)
|
||||
|
||||
testServer, err = testserver.NewTempArtifactServer()
|
||||
if err != nil {
|
||||
|
@ -133,7 +131,7 @@ func runInContext(registerControllers func(*testenv.Environment), run func() err
|
|||
pool.Purge(resource)
|
||||
}()
|
||||
|
||||
runErr := run()
|
||||
code = run()
|
||||
|
||||
if debugMode {
|
||||
events := &corev1.EventList{}
|
||||
|
@ -156,15 +154,13 @@ func runInContext(registerControllers func(*testenv.Environment), run func() err
|
|||
panic(fmt.Sprintf("Failed to remove storage server dir: %v", err))
|
||||
}
|
||||
|
||||
return runErr
|
||||
return code
|
||||
}
|
||||
|
||||
func TestMain(m *testing.M) {
|
||||
code := 0
|
||||
|
||||
runInContext(func(testEnv *testenv.Environment) {
|
||||
code := runInContext(func(testEnv *testenv.Environment) {
|
||||
controllerName := "kustomize-controller"
|
||||
testMetricsH = controller.MustMakeMetrics(testEnv)
|
||||
testMetricsH = controller.NewMetrics(testEnv, metrics.MustMakeRecorder(), kustomizev1.KustomizationFinalizer)
|
||||
kstatusCheck = kcheck.NewChecker(testEnv.Client,
|
||||
&kcheck.Conditions{
|
||||
NegativePolarity: []string{meta.StalledCondition, meta.ReconcilingCondition},
|
||||
|
@ -176,21 +172,21 @@ func TestMain(m *testing.M) {
|
|||
kstatusInProgressCheck = kcheck.NewInProgressChecker(testEnv.Client)
|
||||
kstatusInProgressCheck.DisableFetch = true
|
||||
reconciler = &KustomizationReconciler{
|
||||
ControllerName: controllerName,
|
||||
Client: testEnv,
|
||||
EventRecorder: testEnv.GetEventRecorderFor(controllerName),
|
||||
Metrics: testMetricsH,
|
||||
ControllerName: controllerName,
|
||||
Client: testEnv,
|
||||
Mapper: testEnv.GetRESTMapper(),
|
||||
APIReader: testEnv,
|
||||
EventRecorder: testEnv.GetEventRecorderFor(controllerName),
|
||||
Metrics: testMetricsH,
|
||||
ConcurrentSSA: 4,
|
||||
DisallowedFieldManagers: []string{overrideManagerName},
|
||||
}
|
||||
if err := (reconciler).SetupWithManager(testEnv, KustomizationReconcilerOptions{
|
||||
MaxConcurrentReconciles: 4,
|
||||
if err := (reconciler).SetupWithManager(ctx, testEnv, KustomizationReconcilerOptions{
|
||||
DependencyRequeueInterval: 2 * time.Second,
|
||||
}); err != nil {
|
||||
panic(fmt.Sprintf("Failed to start KustomizationReconciler: %v", err))
|
||||
}
|
||||
}, func() error {
|
||||
code = m.Run()
|
||||
return nil
|
||||
}, filepath.Join("..", "..", "config", "crd", "bases"))
|
||||
}, m.Run)
|
||||
|
||||
os.Exit(code)
|
||||
}
|
||||
|
@ -279,7 +275,29 @@ func createKubeConfigSecret(namespace string) error {
|
|||
return k8sClient.Create(context.Background(), secret)
|
||||
}
|
||||
|
||||
func applyGitRepository(objKey client.ObjectKey, artifactName string, revision string) error {
|
||||
type gitRepoOption func(*gitRepoOptions)
|
||||
|
||||
type gitRepoOptions struct {
|
||||
artifactMetadata map[string]string
|
||||
}
|
||||
|
||||
func withGitRepoArtifactMetadata(k, v string) gitRepoOption {
|
||||
return func(o *gitRepoOptions) {
|
||||
if o.artifactMetadata == nil {
|
||||
o.artifactMetadata = make(map[string]string)
|
||||
}
|
||||
o.artifactMetadata[k] = v
|
||||
}
|
||||
}
|
||||
|
||||
func applyGitRepository(objKey client.ObjectKey, artifactName string,
|
||||
revision string, opts ...gitRepoOption) error {
|
||||
|
||||
var opt gitRepoOptions
|
||||
for _, o := range opts {
|
||||
o(&opt)
|
||||
}
|
||||
|
||||
repo := &sourcev1.GitRepository{
|
||||
TypeMeta: metav1.TypeMeta{
|
||||
Kind: sourcev1.GitRepositoryKind,
|
||||
|
@ -315,15 +333,16 @@ func applyGitRepository(objKey client.ObjectKey, artifactName string, revision s
|
|||
Revision: revision,
|
||||
Digest: dig.String(),
|
||||
LastUpdateTime: metav1.Now(),
|
||||
Metadata: opt.artifactMetadata,
|
||||
},
|
||||
}
|
||||
|
||||
opt := []client.PatchOption{
|
||||
patchOpts := []client.PatchOption{
|
||||
client.ForceOwnership,
|
||||
client.FieldOwner("kustomize-controller"),
|
||||
}
|
||||
|
||||
if err := k8sClient.Patch(context.Background(), repo, client.Apply, opt...); err != nil {
|
||||
if err := k8sClient.Patch(context.Background(), repo, client.Apply, patchOpts...); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
|
@ -346,13 +365,13 @@ func createVaultTestInstance() (*dockertest.Pool, *dockertest.Resource, error) {
|
|||
// uses a sensible default on windows (tcp/http) and linux/osx (socket)
|
||||
pool, err := dockertest.NewPool("")
|
||||
if err != nil {
|
||||
return nil, nil, fmt.Errorf("Could not connect to docker: %s", err)
|
||||
return nil, nil, fmt.Errorf("could not connect to docker: %s", err)
|
||||
}
|
||||
|
||||
// pulls an image, creates a container based on it and runs it
|
||||
resource, err := pool.Run("vault", vaultVersion, []string{"VAULT_DEV_ROOT_TOKEN_ID=secret"})
|
||||
if err != nil {
|
||||
return nil, nil, fmt.Errorf("Could not start resource: %s", err)
|
||||
return nil, nil, fmt.Errorf("could not start resource: %s", err)
|
||||
}
|
||||
|
||||
os.Setenv("VAULT_ADDR", fmt.Sprintf("http://127.0.0.1:%v", resource.GetPort("8200/tcp")))
|
||||
|
@ -361,24 +380,24 @@ func createVaultTestInstance() (*dockertest.Pool, *dockertest.Resource, error) {
|
|||
if err := pool.Retry(func() error {
|
||||
cli, err := api.NewClient(api.DefaultConfig())
|
||||
if err != nil {
|
||||
return fmt.Errorf("Cannot create Vault Client: %w", err)
|
||||
return fmt.Errorf("cannot create Vault Client: %w", err)
|
||||
}
|
||||
status, err := cli.Sys().InitStatus()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if status != true {
|
||||
return fmt.Errorf("Vault not ready yet")
|
||||
return fmt.Errorf("vault not ready yet")
|
||||
}
|
||||
if err := cli.Sys().Mount("sops", &api.MountInput{
|
||||
Type: "transit",
|
||||
}); err != nil {
|
||||
return fmt.Errorf("Cannot create Vault Transit Engine: %w", err)
|
||||
return fmt.Errorf("cannot create Vault Transit Engine: %w", err)
|
||||
}
|
||||
|
||||
return nil
|
||||
}); err != nil {
|
||||
return nil, nil, fmt.Errorf("Could not connect to docker: %w", err)
|
||||
return nil, nil, fmt.Errorf("could not connect to docker: %w", err)
|
||||
}
|
||||
|
||||
return pool, resource, nil
|
|
@ -0,0 +1,74 @@
|
|||
apiVersion: apiextensions.k8s.io/v1
|
||||
kind: CustomResourceDefinition
|
||||
metadata:
|
||||
name: namespaces.servicebus.azure.com
|
||||
spec:
|
||||
group: servicebus.azure.com
|
||||
names:
|
||||
kind: Namespace
|
||||
listKind: NamespaceList
|
||||
plural: namespaces
|
||||
singular: namespace
|
||||
scope: Namespaced
|
||||
versions:
|
||||
- additionalPrinterColumns:
|
||||
- jsonPath: .spec.type
|
||||
name: TYPE
|
||||
type: string
|
||||
name: v1beta20210101preview
|
||||
schema:
|
||||
openAPIV3Schema:
|
||||
description: Test is the Schema for the testing API
|
||||
properties:
|
||||
apiVersion:
|
||||
type: string
|
||||
kind:
|
||||
type: string
|
||||
metadata:
|
||||
type: object
|
||||
spec:
|
||||
description: TestSpec defines the desired state of a test run
|
||||
properties:
|
||||
type:
|
||||
description: Type of test
|
||||
type: string
|
||||
enum:
|
||||
- unit
|
||||
- integration
|
||||
valuesFrom:
|
||||
description: config reference
|
||||
type: string
|
||||
type: object
|
||||
status:
|
||||
default:
|
||||
observedGeneration: -1
|
||||
properties:
|
||||
observedGeneration:
|
||||
description: ObservedGeneration is the last observed generation.
|
||||
format: int64
|
||||
type: integer
|
||||
type: object
|
||||
type: object
|
||||
served: true
|
||||
storage: true
|
||||
subresources:
|
||||
status: {}
|
||||
---
|
||||
apiVersion: servicebus.azure.com/v1beta20210101preview
|
||||
kind: Namespace
|
||||
metadata:
|
||||
annotations:
|
||||
serviceoperator.azure.com/reconcile-policy: detach-on-delete
|
||||
name: sptribs-servicebus-preview
|
||||
namespace: sptribs
|
||||
spec:
|
||||
type: integration
|
||||
valuesFrom: test-config
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
labels:
|
||||
slackChannel: special-tribunals-builds
|
||||
name: sptribs
|
||||
|
|
@ -0,0 +1,22 @@
|
|||
apiVersion: kyverno.io/v2
|
||||
kind: ClusterCleanupPolicy
|
||||
metadata:
|
||||
name: test-cluster-cleanup-policy
|
||||
spec:
|
||||
conditions:
|
||||
all:
|
||||
- key: '{{ time_since('''', ''{{ target.metadata.creationTimestamp }}'', '''') }}'
|
||||
operator: GreaterThan
|
||||
value: 168h
|
||||
match:
|
||||
any:
|
||||
- resources:
|
||||
annotations:
|
||||
openshift.io/description: review-*
|
||||
openshift.io/requester: system:serviceaccount:*
|
||||
kinds:
|
||||
- Namespace
|
||||
selector:
|
||||
matchLabels:
|
||||
test/project-name: "review"
|
||||
schedule: '*/5 * * * *'
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,30 @@
|
|||
stores:
|
||||
json:
|
||||
indent: 2
|
||||
yaml:
|
||||
indent: 2
|
||||
|
||||
# creation rules are evaluated sequentially, the first match wins
|
||||
creation_rules:
|
||||
# Testing PGP
|
||||
- path_regex: (inside|pgp)\.yaml$
|
||||
encrypted_regex: &encrypted_regex ^(data|stringData)$
|
||||
pgp: &pgp 35C1A64CD7FC0AB6EB66756B2445463C3234ECE1
|
||||
|
||||
- path_regex: json\.yaml$
|
||||
encrypted_regex: ".*"
|
||||
age: &age age1l44xcng8dqj32nlv6d930qvvrny05hglzcv9qpc7kxjc6902ma4qufys29
|
||||
|
||||
- path_regex: \.yaml$
|
||||
encrypted_regex: *encrypted_regex
|
||||
age: *age
|
||||
|
||||
- path_regex: \.(env|txt)$
|
||||
age: *age
|
||||
|
||||
# Fallback
|
||||
- key_groups:
|
||||
- age:
|
||||
- *age
|
||||
- pgp:
|
||||
- *pgp
|
|
@ -0,0 +1,26 @@
|
|||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: age
|
||||
stringData:
|
||||
key: ENC[AES256_GCM,data:mHeXsmQ=,iv:vUMpILz3xchORqkzDFvgwENY7EqIHHGJdEF6C8xqbFE=,tag:IroV7hykADvD0IUaq6kikA==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
azure_kv: []
|
||||
hc_vault: []
|
||||
age:
|
||||
- recipient: age1l44xcng8dqj32nlv6d930qvvrny05hglzcv9qpc7kxjc6902ma4qufys29
|
||||
enc: |
|
||||
-----BEGIN AGE ENCRYPTED FILE-----
|
||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBZeHVSdjJoY3ZSQjJzbk1q
|
||||
ZXFxMWJ5amkrN1VXeHI4QzQ5OHcwVGxDem1zCm8wQVEzNEUrOUhtRUFkVnFUY0tN
|
||||
aFgwaHNrWmVWY1RGWXI2YlpYbUhYMGMKLS0tIDBFSXo3cjRCMngvTXpldzhMRlVp
|
||||
TXk2d2ExSVZYNDVTV0xwVlZnQnpScG8KVpjffjtRTA7Z4Wf/l1VMLjcl16hOrRUv
|
||||
LKiZDcq+nqKDUI7owZ+xNs2w5SrQjEWVhDXRSeSSRiJrK/bCYKzRxA==
|
||||
-----END AGE ENCRYPTED FILE-----
|
||||
lastmodified: "2024-11-12T13:33:42Z"
|
||||
mac: ENC[AES256_GCM,data:vmrF+VgW3o8z4h/DOStCUNudz68yHEC8Mws+LPoKpM3Xc7GM0Z1CfX0TKwdLLjMuvyWa2Nx2NIxm0+MCbmR8+y2izn0hHPSWhNVCWSK+iW48M05vXhDCV0xNkqM7g0kLhQ3PiSrB69loQj8C590HIfEViEtyDCFUeynDgcC289Q=,iv:u5lhmtXMxyt+3Pw09wWvgBhmKLoOSpKNWUpu/LuCr3Y=,tag:Dg0HFdLgQltzPgnEmltAzQ==,type:str]
|
||||
pgp: []
|
||||
encrypted_regex: ^(data|stringData)$
|
||||
version: 3.9.0
|
|
@ -0,0 +1,7 @@
|
|||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
namePrefix: algo-
|
||||
resources:
|
||||
- age.yaml
|
||||
- pgp.yaml
|
||||
- vault.yaml
|
|
@ -0,0 +1,37 @@
|
|||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: pgp
|
||||
stringData:
|
||||
key: ENC[AES256_GCM,data:EJey73Q=,iv:QRdpZJ6WYi3fWpKwjl8ZiV+Wwq9qtYTpcMQ0j0OEa44=,tag:d1WlcRpwEJg1lk3X3ILDmA==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
azure_kv: []
|
||||
hc_vault: []
|
||||
age: []
|
||||
lastmodified: "2024-11-12T13:33:42Z"
|
||||
mac: ENC[AES256_GCM,data:25ERLClNe3o33jEo109QtmVH/qzl+e0pMRR1RDyQ4QHrVqYfMIvgUeYDHAIJ5WDwQaueON8nne1KIo+fcPYVBdHvTYvnZiicCUPA5/fpgbyts0u5CdUs31bltI/blnUlU8VbJfIk2Zjlj93erLw23sdzdo/0xsdDTrf3bYiS2CI=,iv:vxrgdyqIKRWGBA+dgrGbjGn7tkXEqbADayIxuzNwxp0=,tag:qWesJqClsLpZHY9UR7ptLQ==,type:str]
|
||||
pgp:
|
||||
- created_at: "2024-11-12T13:33:42Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
hQIMA90SOJihaAjLARAAqSf7bnqHB0/gfh8CmweYr5cfUpH8aYg7B5QhsnD6nOok
|
||||
x0UIPtaxtfEBvuDsM9M678Gj/hTEzMv0FmDYRt88NAXm1+63HHnz0/0O3xXQ/DR6
|
||||
+1uEZruuyC23nyzjc1fefaqgZ1YJAnj5WCvcWaF12bXbIdFQpRhpVcoMMqWhQizF
|
||||
5QJFXjU3cnzIVtvcpMDD63NTpk8+hSTYJr5ZFODSMbQr+EPHvKPMrIx3LLcihkkS
|
||||
eyxvfLalj556f/3QVgGuOX6VX8lPIaUyIcmXyUkGsooEirOyhiZg2sk/QB6TYIa6
|
||||
Nm62hmeeXP01wyY6tax7l3LpAuda6CJRVg+Je1OkIjiuPMIBzHgtfhGFks8vgeTP
|
||||
xsHXKLKXlJAQyS4ewOItm9n9jc9Xdnwfli4HrGbHNzq7lgEyAOyZZtOifl4KqFbM
|
||||
0c3kGiP3ezycRrQGudvbdIZqGfeD+gKrBv6cV49Wgt7Nb1WJUKLcPv4PNtSlYzSu
|
||||
lGDM63bO+QBAKObc6MOvLnVXbFXrErLMqrexN9XFdjvvsmQAVr2z5phZk5fEk7kw
|
||||
j8CqyTuy2Dm+ChJwNEeqIY3BNHkvvWMLx8Cr7ZY6bO1BvOdp01mBf+XD/apeBBUe
|
||||
v2DT36mCehKZh5BHDYH7hKCNw+4PN2hzZd02zKMNzmARqLzQeseaTXti3Hyze23S
|
||||
XAG1ddNzKXsgbTwLog5EN7DTIQKR+uCIgHuK0DclyWvTiUK7P6HGepTE7byJnnpl
|
||||
jHtAVs8t+cYHBtY+gKFsstRGbJgAe8QfIt12/XMu9jcA/r8m7xdyNS5P9VZj
|
||||
=gXAv
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 35C1A64CD7FC0AB6EB66756B2445463C3234ECE1
|
||||
encrypted_regex: ^(data|stringData)$
|
||||
version: 3.9.0
|
|
@ -0,0 +1,6 @@
|
|||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: vault
|
||||
stringData:
|
||||
key: value
|
|
@ -0,0 +1,7 @@
|
|||
key=ENC[AES256_GCM,data:HfbmmMU=,iv:nWWqqIzzutZJBzu5PbaTPBsqvszaz2/+58mYOK7hj9Q=,tag:b+VcateAccwdb7x2dmYDrQ==,type:str]
|
||||
sops_age__list_0__map_enc=-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBsc0Vyd25KTE1sYWM1akFH\nTUFBeHBmSmdGMnY3ZFJvazRZMUtPMFpscmhBCnVsL2Y0cUd1Nkx1Z0Q1OWpHOG0w\nNnhXSmxjbzR5NVE1NGpjR3d2SHN6SzgKLS0tIG5tdXpXK0U2SUlsQlcvY0ZvRWJB\nS2N6MS9QRVR4K2toMEg1eDR3a3ZtdzAKiliurqchsdfT4XbttES0ohnuTMNKlZy9\nefqbQO2lTLw8wUsNUunTpJBEAx9MFZ+LFHE/EZfHZqYlzxCPzfhufA==\n-----END AGE ENCRYPTED FILE-----\n
|
||||
sops_age__list_0__map_recipient=age1l44xcng8dqj32nlv6d930qvvrny05hglzcv9qpc7kxjc6902ma4qufys29
|
||||
sops_lastmodified=2024-11-12T13:33:42Z
|
||||
sops_mac=ENC[AES256_GCM,data:kPn8FhXF7UcPbkA7gjfjfYljawfT67SQBsYbnaAgtcFAtMWTryTHSDAASp2RZiClZiWnKgOgT8NeFUC+hUvjlz/Vj3pQxl6zY+3CmlrbBiqYUwd8ksXjps8UTqcioWKc7xULLqV5GMUHpoWnDWkkt0F6F10uCL78P0JoKmIeCXM=,iv:/G3GIGXriXuoS9OhfEazEYgVBbo+XvouTGYEi5XVYqQ=,tag:80P9IXhwJzoqJ43eK2W+4g==,type:str]
|
||||
sops_unencrypted_suffix=_unencrypted
|
||||
sops_version=3.9.0
|
|
@ -0,0 +1,8 @@
|
|||
apiVersion: kustomize.config.k8s.io/v1alpha1
|
||||
kind: Component
|
||||
generatorOptions:
|
||||
disableNameSuffixHash: true
|
||||
secretGenerator:
|
||||
- name: component
|
||||
envs:
|
||||
- env.env
|
|
@ -0,0 +1,7 @@
|
|||
key=ENC[AES256_GCM,data:3PTvx6o=,iv:74ni7B2QMB6aygdd3R7IEzNCwo1W+TpPWMJLfYCCG4U=,tag:mK2Tu7JWDdEmZUrXz3uRzw==,type:str]
|
||||
sops_age__list_0__map_enc=-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA5aDhVTW1IenNXQmptWnha\nMjd1UWN3dHp0QXRkSnhUSjBHVFdKSmdXYzNNClVWeXVGWndJQ1RpRUlJRy9yeHJY\nb1VhbnR2TlovSUg1MlpZdkhWdkVHTG8KLS0tIHVOSEhOVVV2cXRUQUs2Sk15eU1a\nRW92L1BWQnhNbStFekZjVVRDUFJtaWsK+wPkQAtZtTbh2WHik1ovX61ZJPpkmwuO\nnUYAn37tZELXX/alrOORRwoq+0oBQO5pZYsJBi0fvijfm9VqR/4jKg==\n-----END AGE ENCRYPTED FILE-----\n
|
||||
sops_age__list_0__map_recipient=age1l44xcng8dqj32nlv6d930qvvrny05hglzcv9qpc7kxjc6902ma4qufys29
|
||||
sops_lastmodified=2024-11-12T13:33:42Z
|
||||
sops_mac=ENC[AES256_GCM,data:YQHMLRk85ozeuqIvNekLAVp2DFSj+VgDG2z70uQaeCA+uxFp3k/THlANAXx+GP1Oab923Q6nG5ItV9dcG1hTXpA/NRpbM02pfNe/iYnVL7AtcXqFg/jy2T4kkqx7cHAXJi9zd+ZrISIZCNWinLoFfaAo70+epsFumUmLUaDzUPQ=,iv:TdOIRoy6Wch1/x9GlEsmArA5g461ILJZUE7tIxi9G28=,tag:miip/H0SuHqvaoxGvzheIg==,type:str]
|
||||
sops_unencrypted_suffix=_unencrypted
|
||||
sops_version=3.9.0
|
|
@ -1,8 +1,13 @@
|
|||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
secretGenerator:
|
||||
- name: sops-year2
|
||||
envs:
|
||||
- ./secrets/year2.txt
|
||||
namePrefix: envs-
|
||||
generatorOptions:
|
||||
disableNameSuffixHash: true
|
||||
secretGenerator:
|
||||
- name: secret
|
||||
envs:
|
||||
- env.env
|
||||
configMapGenerator:
|
||||
- name: configmap
|
||||
envs:
|
||||
- env.env
|
|
@ -0,0 +1,20 @@
|
|||
{
|
||||
"data": "ENC[AES256_GCM,data:QNbPAYY=,iv:cMvqZZXqOFmH+bAFdzX+ORH3cnj2cgKX/f6+8q8bDlA=,tag:Pb5wsv4wq5mbccaUhjqQCA==,type:str]",
|
||||
"sops": {
|
||||
"kms": null,
|
||||
"gcp_kms": null,
|
||||
"azure_kv": null,
|
||||
"hc_vault": null,
|
||||
"age": [
|
||||
{
|
||||
"recipient": "age1l44xcng8dqj32nlv6d930qvvrny05hglzcv9qpc7kxjc6902ma4qufys29",
|
||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAybkpYNFFjVFprQndmWklK\nVnpyVzFjRGZ5cU5IK1NHb2t6bjhKUnZVZ24wCnZFSjBrVEJ6RmpORGMrVHRWUXA5\nL1BMbk1jWXM2aGpVcTkzckdHYm14SmMKLS0tIDdBS2NGaWFWRlZvRktPYksvd0pa\nRzFBRWtHcXlWcVkvK0VKQVRPRGFlYXcKeSgCitkcDxVNZSxS/TsR72xVh6iPL4l5\nS+FP0R0wbo3LbunScvF168f4NhB5HRpS29a5onxH64HEiYdMitV8WA==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||
}
|
||||
],
|
||||
"lastmodified": "2024-11-12T13:33:42Z",
|
||||
"mac": "ENC[AES256_GCM,data:8H24g0IjdODRma+52utYPlZnGEH+Oi3LiXel2JExHEd1YwbBL417lTbJpZVIfwk7+SYLWw6V4ZbPgHFUHchhRH5URNqb4I0m/FhTMyDW2h0Zm1kM1zMdE8AZTGUyNhmVkrlw7GnBwuGwWS6Usm9C9XD5O+/2Yn20YqmB2/T3a0o=,iv:0sclmOePSOpekgQLr/kNTM2xKdr7djHn2xYSNrFSGD4=,tag:6gvdsQKSqKafO6VrXqlaeA==,type:str]",
|
||||
"pgp": null,
|
||||
"unencrypted_suffix": "_unencrypted",
|
||||
"version": "3.9.0"
|
||||
}
|
||||
}
|
|
@ -1,14 +1,13 @@
|
|||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
secretGenerator:
|
||||
- name: sops-month
|
||||
files:
|
||||
- month.yaml
|
||||
- name: sops-year
|
||||
envs:
|
||||
- year.env
|
||||
- name: unencrypted-sops-year
|
||||
envs:
|
||||
- unencrypted-year.env
|
||||
namePrefix: files-
|
||||
generatorOptions:
|
||||
disableNameSuffixHash: true
|
||||
secretGenerator:
|
||||
- name: secret
|
||||
files:
|
||||
- key=file.txt
|
||||
configMapGenerator:
|
||||
- name: configmap
|
||||
files:
|
||||
- key=file.txt
|
|
@ -0,0 +1,5 @@
|
|||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
namePrefix: inside-
|
||||
resources:
|
||||
- secret.yaml
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue