Skip to content
Snippets Groups Projects
Commit f6ae03d9 authored by Guillermo Gomez's avatar Guillermo Gomez
Browse files

release v0.5.2

parent e3318ecb
No related branches found
No related tags found
No related merge requests found
Showing
with 168 additions and 130 deletions
# Description
[Issue link](https://jirabdsfr.fsc.atos-services.net/browse/BRSE-REPLACE)
# How was this tested?
# Follow-up PRs
# Related PRs
......@@ -20,7 +20,9 @@ concurrency:
cancel-in-progress: true
env:
TMT_REGISTRY_COMMON: registry.atosresearch.eu:18488
TMT_REGISTRY_COMMON: registry.atosresearch.eu:18488
# Target repo in Nexus registry
NEPHELE_REGISTRY_COMMON: registry.atosresearch.eu:18498
jobs:
test_internal_charts:
......@@ -28,9 +30,9 @@ jobs:
runs-on: [self-hosted]
steps:
- name: Checkout repository
uses: actions/checkout@v3
uses: actions/checkout@v4
- name: Run format tests
uses: addnab/docker-run-action@v3
uses: GLB-BDS-ETSN-COMMON/.github-private/docker_action@main
with:
registry: https://${{ env.TMT_REGISTRY_COMMON }}
username: ${{ secrets.NEXUS_USER }}
......@@ -42,60 +44,19 @@ jobs:
mkdir -p charts
helm package deploy/k8s/hdarapi -d charts
helm lint charts/*
if [ $? -eq 1 ] ; then
echo "invalid charts"
exit 1
fi
# Fails if the values does not render right
helm template hdarapi deploy/k8s/hdarapi -n hdar -f deploy/k8s/hdarapi/values.yaml
# test_external_charts:
# name: Execute Helm chart linter too for syntax and format
# runs-on: [self-hosted]
# steps:
# - name: Checkout repository
# uses: actions/checkout@v3
# - name: Run format tests
# uses: addnab/docker-run-action@v3
# with:
# registry: https://${{ env.TMT_REGISTRY_COMMON }}
# username: ${{ secrets.NEXUS_USER }}
# password: ${{ secrets.NEXUS_PAT }}
# image: ${{ env.TMT_REGISTRY_COMMON }}/helm:latest
# options: -v ${{ github.workspace }}:/repo
# run: |
# cd /repo
# echo "${{ secrets.NEXUS_PAT }}" | helm registry login -u "${{ secrets.NEXUS_USER }}" --password-stdin OCI://registry.atosresearch.eu:18467
# echo "${{ secrets.NEXUS_PAT }}" | helm registry login -u "${{ secrets.NEXUS_USER }}" --password-stdin OCI://registry.atosresearch.eu:18488
# helm template registry OCI://registry.atosresearch.eu:18467/xnfregistry --version 1.0.0 -n hdar -f deploy/k8s/registry/values.yaml
# helm template hdav OCI://registry.atosresearch.eu:18467/xnfv --version 1.0.0 -n hdar -f deploy/k8s/hdav/values.yaml
# helm template devdocs oci://registry-1.docker.io/bitnamicharts/nginx --version 18.2.4 -f deploy/k8s/dev-env-docs/values.yaml
# helm template gateway OCI://registry.atosresearch.eu:18488/gateway --version 1.2.0 -n hdar -f deploy/k8s/gateway/values.yaml
# push_charts:
# name: Execute Helm chart linter too for syntax and format
# needs: [test_internal_charts] # test_external_charts]
# # if: github.ref == 'refs/tags/*' || github.ref_name == 'develop'
# runs-on: [self-hosted]
# steps:
# - name: Checkout repository
# uses: actions/checkout@v3
# # - name: Release
# # uses: addnab/docker-run-action@v3
# # with:
# # registry: https://${{ env.TMT_REGISTRY_COMMON }}
# # username: ${{ secrets.NEXUS_USER }}
# # password: ${{ secrets.NEXUS_PAT }}
# # image: ${{ env.TMT_REGISTRY_COMMON }}/helm:latest
# # options: -v ${{ github.workspace }}:/repo
# # run: |
# # cd /repo
# # mkdir -p charts
# # helm package deploy/k8s/hdarapi -d charts
# # helm lint charts/*
# # echo "${{ secrets.NEXUS_PAT }}" | helm registry login -u "${{ secrets.NEXUS_USER }}" --password-stdin OCI://registry.atosresearch.eu:18467
# # echo "${{ secrets.NEXUS_PAT }}" | helm registry login -u "${{ secrets.NEXUS_USER }}" --password-stdin OCI://registry.atosresearch.eu:18488
# # helm push charts/hdarapi* OCI://registry.atosresearch.eu:18467
# - name: Run chart-releaser for gs-cloud
# uses: bitdeps/helm-oci-charts-releaser@v0.1.0
# # if: github.ref == 'refs/tags/*' || github.ref_name == 'develop'
# with:
# oci_registry: registry.atosresearch.eu:18488
# oci_username: ${{ secrets.NEXUS_USER }}
# oci_password: ${{ secrets.NEXUS_PAT }}"
# github_token: ${{ secrets.GH_TOKEN }}
# charts_dir: deploy/k8s/hdarapi
\ No newline at end of file
if [ $? -eq 1 ] ; then
echo "invalid charts"
exit 1
fi
if [[ ${{ github.ref }} != 'refs/tags/'* && ${{ github.ref_name }} != 'develop' ]]; then
echo "not valid github reference to push ${{ github.ref }}"
exit 0
fi
echo ${{ secrets.NEXUS_PAT }} | helm registry login ${{ env.NEPHELE_REGISTRY_COMMON }} -u ${{ secrets.NEXUS_USER }} --password-stdin
helm push charts/*.tgz OCI://${{ env.NEPHELE_REGISTRY_COMMON }}
\ No newline at end of file
......@@ -9,13 +9,13 @@ on:
- main
- develop
paths:
- dev-env-docs/**
- components/dev-env-docs/**
- .github/dev-env-docs.yaml
tags:
- '*'
pull_request:
paths:
- dev-env-docs/**
- components/dev-env-docs/**
- .github/dev-env-docs.yaml
env: # Cannot be directly used to populate the workflow inputs and secrets..
......@@ -33,13 +33,9 @@ jobs:
name: devenvdocs
target-registry: registry.atosresearch.eu:18498
image-name: devenvdocs
context: dev-env-docs
dockerfile-path: dev-env-docs/cicd/dockerfile
context: components/dev-env-docs
dockerfile-path: components/dev-env-docs/install/dockerfile
secrets:
etsn-user: ${{ secrets.NEXUS_USER }}
etsn-password: ${{ secrets.NEXUS_PAT }}
target-registry-user: ${{ secrets.NEXUS_USER }}
target-registry-password: ${{ secrets.NEXUS_PAT }}
kaniko-login: |
{
"auths": {
......@@ -51,10 +47,15 @@ jobs:
},
"https://registry.atosresearch.eu:18498": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
},
"https://registry.atosresearch.eu:18520": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
}
}
}
gh-pat: ${{ secrets.GH_PAT }}
extra-args: |
--push-retry 2
use-documentation:
needs: [use-kaniko-build]
uses: GLB-BDS-ETSN-COMMON/.github-private/.github/workflows/documentation.yaml@main
......
......@@ -26,7 +26,7 @@ env: # Cannot be directly used to populate the workflow inputs and secrets..
# Needed for the dockerfile base image
TMT_REGISTRY_COMMON: registry.atosresearch.eu:18488
# Target repo in Nexus registry
NEPHELE_REGISTRY_COMMON: registry.atosresearch.eu:18488
NEPHELE_REGISTRY_COMMON: registry.atosresearch.eu:18498
IMAGE_NAME: hdarapi
# The workflow has a concurrency check
......@@ -40,10 +40,8 @@ jobs:
context: ""
dockerfile-path: components/hdar-api/install/dockerfile
secrets:
etsn-user: ${{ secrets.NEXUS_USER }}
etsn-password: ${{ secrets.NEXUS_PAT }}
target-registry-user: ${{ secrets.NEXUS_USER }}
target-registry-password: ${{ secrets.NEXUS_PAT }}
extra-args: |
--push-retry 2
kaniko-login: |
{
"auths": {
......@@ -55,6 +53,9 @@ jobs:
},
"https://registry.atosresearch.eu:18498": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
},
"https://registry.atosresearch.eu:18520": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
}
}
}
......
......@@ -26,7 +26,7 @@ env: # Cannot be directly used to populate the workflow inputs and secrets..
# Needed for the dockerfile base image
TMT_REGISTRY_COMMON: registry.atosresearch.eu:18488
# Target repo in Nexus registry
NEPHELE_REGISTRY_COMMON: registry.atosresearch.eu:18488
NEPHELE_REGISTRY_COMMON: registry.atosresearch.eu:18498
IMAGE_NAME: hdarctl
# The workflow has a concurrency check
......@@ -40,10 +40,8 @@ jobs:
context: ""
dockerfile-path: components/hdar-ctl/install/dockerfile
secrets:
etsn-user: ${{ secrets.NEXUS_USER }}
etsn-password: ${{ secrets.NEXUS_PAT }}
target-registry-user: ${{ secrets.NEXUS_USER }}
target-registry-password: ${{ secrets.NEXUS_PAT }}
extra-args: |
--push-retry 2
kaniko-login: |
{
"auths": {
......@@ -55,6 +53,9 @@ jobs:
},
"https://registry.atosresearch.eu:18498": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
},
"https://registry.atosresearch.eu:18520": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
}
}
}
......
......@@ -24,7 +24,7 @@ env: # Cannot be directly used to populate the workflow inputs and secrets..
# Needed for the dockerfile base image
TMT_REGISTRY_COMMON: registry.atosresearch.eu:18488
# Target repo in Nexus registry
NEPHELE_REGISTRY_COMMON: registry.atosresearch.eu:18488
NEPHELE_REGISTRY_COMMON: registry.atosresearch.eu:18498
IMAGE_NAME: hdarsdk
# The workflow has a concurrency check
......@@ -38,10 +38,6 @@ jobs:
context: ""
dockerfile-path: components/hdar-sdk/install/dockerfile
secrets:
etsn-user: ${{ secrets.NEXUS_USER }}
etsn-password: ${{ secrets.NEXUS_PAT }}
target-registry-user: ${{ secrets.NEXUS_USER }}
target-registry-password: ${{ secrets.NEXUS_PAT }}
kaniko-login: |
{
"auths": {
......@@ -53,10 +49,15 @@ jobs:
},
"https://registry.atosresearch.eu:18498": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
},
"https://registry.atosresearch.eu:18520": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
}
}
}
gh-pat: ${{ secrets.GH_PAT }}
extra-args: |
--push-retry 2
use-go-test-coverage:
needs: [use-kaniko-build]
uses: GLB-BDS-ETSN-COMMON/.github-private/.github/workflows/go-test-coverage.yaml@main
......
......@@ -26,7 +26,7 @@ env: # Cannot be directly used to populate the workflow inputs and secrets..
# Needed for the dockerfile base image
TMT_REGISTRY_COMMON: registry.atosresearch.eu:18488
# Target repo in Nexus registry
NEPHELE_REGISTRY_COMMON: registry.atosresearch.eu:18488
NEPHELE_REGISTRY_COMMON: registry.atosresearch.eu:18498
IMAGE_NAME: hdavlisteners
# The workflow has a concurrency check
......@@ -40,10 +40,6 @@ jobs:
context: ""
dockerfile-path: components/hdav-listeners/install/dockerfile
secrets:
etsn-user: ${{ secrets.NEXUS_USER }}
etsn-password: ${{ secrets.NEXUS_PAT }}
target-registry-user: ${{ secrets.NEXUS_USER }}
target-registry-password: ${{ secrets.NEXUS_PAT }}
kaniko-login: |
{
"auths": {
......@@ -55,10 +51,15 @@ jobs:
},
"https://registry.atosresearch.eu:18498": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
},
"https://registry.atosresearch.eu:18520": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
}
}
}
gh-pat: ${{ secrets.GH_PAT }}
extra-args: |
--push-retry 2
use-go-test-coverage:
needs: [use-kaniko-build]
uses: GLB-BDS-ETSN-COMMON/.github-private/.github/workflows/go-test-coverage.yaml@main
......
......@@ -8,3 +8,4 @@ hda-examples
hdar/cosign.key
hdar/cosign.pub
components/hdar-api/.env
components/hdar-ctl/.env
[submodule "assets/xNF-Registry-Verification"]
path = assets/xNF-Registry-Verification
url = https://github.gsissc.myatos.net/GLB-BDS-ETSN-SECURITY/xNF-Registry-Verification.git
branch = develop
# [submodule "assets/xNF-Registry-Verification"]
# path = assets/xNF-Registry-Verification
# url = https://github.gsissc.myatos.net/GLB-BDS-ETSN-SECURITY/xNF-Registry-Verification.git
# branch = develop
# [submodule "assets/gateway"]
# path = assets/gateway
# url = https://github.gsissc.myatos.net/GLB-BDS-ETSN-COMMON/gateway.git
# branch = develop
......@@ -24,17 +24,17 @@ This multi-project repository hosts the commitments of T4.1. Please refer to WP4
- helm (v3): No support for V2 repo index.yaml
- hdar: commands following the Helm structure. Library and CLI to interact with the Hyper Distributed Application Registry.
- The REST API currently focuses on: Available **nephele-hdar.netmode.ece.ntua.gr/hdarapi/swagger/index.html**
- The REST API currently focuses on: Available **hdarapi.nephele-hdar.netmode.ece.ntua.gr/swagger/index.html**
1. Custom functionalities for ease the use of the Nephele meta-orchestration framework
2. Service catalogue and discovery
- The Verification Engine focuses on: Available indirectly via the HDAR REST API
- The Verification Engine focuses on: Available indirectly via the HDAR REST API and on Available **hdarv.nephele-hdar.netmode.ece.ntua.gr/swagger/index.html**
1. Verification of syntax, semantic and integrity of components
2. Scanning of Docker images and VM images searching for CVE
3. Scanning Helm charts and OSM descriptors searching for missconfigurations
- The development environment sandbox is a template repository in gitlab that is used by HDA developers and that automates the generation of CICD pipelines based on the hdarctl tool.
- The development environment documentation hosts the guidelines to develop a HDA and to interact with the NEPHELE Platform. This is done via a sphinx project similar to readthedocs.
- The development environment sandbox is a template repository in gitlab that is used by HDA developers and that automates the generation of CICD pipelines based on the hdarctl tool.
- The development environment documentation hosts the guidelines to develop a HDA and to interact with the NEPHELE Platform. This is done via a sphinx project similar to readthedocs. Available **documentation.nephele-hdar.netmode.ece.ntua.gr**
The T4.1 contributions in the NEPHELE Platform. Note: The OCI config manifest be requested to the HDAR REST API to know what the artifact contains and how to process it before accessing the actual artifact.
......@@ -46,13 +46,14 @@ More in the WP4 deliverables of Nephele.
## Usage
```bash
git submodule update init --recursive --remote
# first time
git submodule update --init --recursive --remote
# next iterations
git submodule update --recursive --remote
```
Each component is developed individually and then deployed in K8s via helm charts from the deploy/k8s folder
## Contribution
Tech:
......
# Description
[Issue link](https://jirabdsfr.fsc.atos-services.net/browse/BRSE-REPLACE)
# How was this tested?
# Follow-up PRs
# Related PRs
......@@ -21,16 +21,18 @@ concurrency:
env:
TMT_REGISTRY_COMMON: registry.atosresearch.eu:18488
# Target repo in Nexus registry
SNS_REGISTRY_COMMON: registry.atosresearch.eu:18467
jobs:
test_charts:
registry_chart:
name: Execute Helm chart linter too for syntax and format
runs-on: [self-hosted]
steps:
- name: Checkout repository
uses: actions/checkout@v3
uses: actions/checkout@v4
- name: Run format tests
uses: addnab/docker-run-action@v3
uses: GLB-BDS-ETSN-COMMON/.github-private/docker_action@main
with:
registry: https://${{ env.TMT_REGISTRY_COMMON }}
username: ${{ secrets.NEXUS_USER }}
......@@ -41,6 +43,38 @@ jobs:
cd /repo
mkdir -p charts
helm package deploy/k8s/registry-chart -d charts
helm lint charts/*
if [[ ${{ github.ref }} != 'refs/tags/'* && ${{ github.ref_name }} != 'develop' ]]; then
echo "not valid github reference to push ${{ github.ref }}"
exit 0
fi
echo ${{ secrets.NEXUS_PAT }} | helm registry login ${{ env.SNS_REGISTRY_COMMON }} -u ${{ secrets.NEXUS_USER }} --password-stdin
# Fails if the values does not render right
helm push charts/*.tgz OCI://${{ env.SNS_REGISTRY_COMMON }}
xnfv_chart:
name: Execute Helm chart linter too for syntax and format
runs-on: [self-hosted]
steps:
- name: Checkout repository
uses: actions/checkout@v4
- name: Run format tests
uses: GLB-BDS-ETSN-COMMON/.github-private/docker_action@main
with:
registry: https://${{ env.TMT_REGISTRY_COMMON }}
username: ${{ secrets.NEXUS_USER }}
password: ${{ secrets.NEXUS_PAT }}
image: ${{ env.TMT_REGISTRY_COMMON }}/helm:latest
options: -v ${{ github.workspace }}:/repo
run: |
cd /repo
mkdir -p charts
helm package deploy/k8s/xnfv-chart -d charts
helm lint charts/*
# ToDo: pending to push
if [[ ${{ github.ref }} != 'refs/tags/'* && ${{ github.ref_name }} != 'develop' ]]; then
echo "not valid github reference to push ${{ github.ref }}"
exit 0
fi
echo ${{ secrets.NEXUS_PAT }} | helm registry login ${{ env.SNS_REGISTRY_COMMON }} -u ${{ secrets.NEXUS_USER }} --password-stdin
# Fails if the values does not render right
helm push charts/*.tgz OCI://${{ env.SNS_REGISTRY_COMMON }}
......@@ -41,10 +41,8 @@ jobs:
context: ""
dockerfile-path: components/xnfr-ctl/install/dockerfile
secrets:
etsn-user: ${{ secrets.NEXUS_USER }}
etsn-password: ${{ secrets.NEXUS_PAT }}
target-registry-user: ${{ secrets.NEXUS_USER }}
target-registry-password: ${{ secrets.NEXUS_PAT }}
extra-args: |
--push-retry 2
kaniko-login: |
{
"auths": {
......@@ -53,6 +51,9 @@ jobs:
},
"https://registry.atosresearch.eu:18488": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
},
"https://registry.atosresearch.eu:18520": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
}
}
}
......
......@@ -37,10 +37,8 @@ jobs:
context: ""
dockerfile-path: components/xnfrv-sdk/install/xnfrv_sdk_tests.dockerfile
secrets:
etsn-user: ${{ secrets.NEXUS_USER }}
etsn-password: ${{ secrets.NEXUS_PAT }}
target-registry-user: ${{ secrets.NEXUS_USER }}
target-registry-password: ${{ secrets.NEXUS_PAT }}
extra-args: |
--push-retry 2
kaniko-login: |
{
"auths": {
......@@ -49,6 +47,9 @@ jobs:
},
"https://registry.atosresearch.eu:18488": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
},
"https://registry.atosresearch.eu:18520": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
}
}
}
......
......@@ -38,10 +38,8 @@ jobs:
context: ""
dockerfile-path: components/xnfv-api/install/dockerfile
secrets:
etsn-user: ${{ secrets.NEXUS_USER }}
etsn-password: ${{ secrets.NEXUS_PAT }}
target-registry-user: ${{ secrets.NEXUS_USER }}
target-registry-password: ${{ secrets.NEXUS_PAT }}
extra-args: |
--push-retry 2
kaniko-login: |
{
"auths": {
......@@ -50,6 +48,9 @@ jobs:
},
"https://registry.atosresearch.eu:18488": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
},
"https://registry.atosresearch.eu:18520": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
}
}
}
......
......@@ -38,10 +38,8 @@ jobs:
context: ""
dockerfile-path: components/xnfv-listeners/install/dockerfile
secrets:
etsn-user: ${{ secrets.NEXUS_USER }}
etsn-password: ${{ secrets.NEXUS_PAT }}
target-registry-user: ${{ secrets.NEXUS_USER }}
target-registry-password: ${{ secrets.NEXUS_PAT }}
extra-args: |
--push-retry 2
kaniko-login: |
{
"auths": {
......@@ -50,6 +48,9 @@ jobs:
},
"https://registry.atosresearch.eu:18488": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
},
"https://registry.atosresearch.eu:18520": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
}
}
}
......
......@@ -36,10 +36,8 @@ jobs:
context: ""
dockerfile-path: components/xnfrv-sdk/install/xnfv_base.dockerfile
secrets:
etsn-user: ${{ secrets.NEXUS_USER }}
etsn-password: ${{ secrets.NEXUS_PAT }}
target-registry-user: ${{ secrets.NEXUS_USER }}
target-registry-password: ${{ secrets.NEXUS_PAT }}
extra-args: |
--push-retry 2
kaniko-login: |
{
"auths": {
......@@ -48,6 +46,9 @@ jobs:
},
"https://registry.atosresearch.eu:18488": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
},
"https://registry.atosresearch.eu:18520": {
"auth": "$(echo -n "${{ secrets.NEXUS_USER }}:${{ secrets.NEXUS_PAT }}" | base64 -w0)"
}
}
}
......
[submodule "assets/go-common"]
path = assets/go-common
url = https://github.gsissc.myatos.net/GLB-BDS-ETSN-COMMON/go-common.git
branch = develop
\ No newline at end of file
# [submodule "assets/go-common"]
# path = assets/go-common
# url = https://github.gsissc.myatos.net/GLB-BDS-ETSN-COMMON/go-common.git
# branch = develop
\ No newline at end of file
# Description
[Issue link](https://jirabdsfr.fsc.atos-services.net/browse/BRSE-REPLACE)
# How was this tested?
# Follow-up PRs
# Related PRs
......@@ -8,6 +8,8 @@ on:
branches:
- main
- develop
tags:
- '*'
paths:
- 'components/utils/**'
- '.github/workflows/utils.yaml'
......@@ -32,10 +34,6 @@ jobs:
context: ""
dockerfile-path: components/utils/install/dockerfile
secrets:
etsn-user: ${{ secrets.NEXUS_USER }}
etsn-password: ${{ secrets.NEXUS_PAT }}
target-registry-user: ${{ secrets.NEXUS_USER }}
target-registry-password: ${{ secrets.NEXUS_PAT }}
kaniko-login: |
{
"auths": {
......@@ -45,6 +43,8 @@ jobs:
}
}
gh-pat: ${{ secrets.GH_PAT }}
extra-args: |
--push-retry 2
use-go-test-coverage:
needs: [use-kaniko-build]
uses: GLB-BDS-ETSN-COMMON/.github-private/.github/workflows/go-test-coverage.yaml@main
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment