-cosign.*
__pycache__
output
*.bak
cert-manager.io/cluster-issuer: "acme-prod"
spec:
rules:
- - host: trigger.vexingworkshop.com
+ - host: {{ .Values.ingress.host }}
http:
paths:
- backend:
service:
- name: el-cluster-listener
+ name: {{ .Values.ingress.service }}
port:
number: 8080
path: /
pathType: ImplementationSpecific
tls:
- hosts:
- - trigger.vexingworkshop.com
- secretName: vexing-tls
+ - {{ .Values.ingress.host }}
+ secretName: {{ .Values.ingress.tlsSecretName }}
---
apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRole
+kind: Role
metadata:
name: event-listener-role
rules:
- apiGroups:
- triggers.tekton.dev
resources:
- - clusterinterceptors
- eventlisteners
- pipelineruns
- triggers
- create
---
apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRoleBinding
+kind: RoleBinding
metadata:
name: event-listener-rolebinding
subjects:
name: {{ .Values.serviceAccount.listener }}
namespace: {{ .Release.Namespace }}
roleRef:
- kind: ClusterRole
+ kind: Role
name: event-listener-role
apiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
-kind: Role
+kind: ClusterRole
+metadata:
+ name: interceptor-role
+rules:
+ - apiGroups:
+ - triggers.tekton.dev
+ resources:
+ - clusterinterceptors
+ verbs:
+ - get
+ - list
+ - watch
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ name: interceptor-rolebinding
+subjects:
+ - kind: ServiceAccount
+ name: {{ .Values.serviceAccount.listener }}
+ namespace: {{ .Release.Namespace }}
+roleRef:
+ kind: ClusterRole
+ name: interceptor-role
+ apiGroup: rbac.authorization.k8s.io
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
metadata:
name: pipeline-role
rules:
- create
---
apiVersion: rbac.authorization.k8s.io/v1
-kind: RoleBinding
+kind: ClusterRoleBinding
metadata:
name: pipeline-rolebinding
subjects:
- kind: ServiceAccount
- name: {{ .Values.serviceAccount.listener }}
+ name: {{ .Values.serviceAccount.pipeline }}
namespace: {{ .Release.Namespace }}
roleRef:
- kind: Role
+ kind: ClusterRole
name: pipeline-role
apiGroup: rbac.authorization.k8s.io
params:
- name: repo-url
value: $(body.repository.url)
- - name: image
- value: ghcr.io/coyote240/letters:$(body.head_commit.id)
+ - name: owner
+ value: $(body.repository.owner.name)
+ - name: image-name
+ value: $(body.repository.name)
+ - name: commit
+ value: $(body.head_commit.id)
---
apiVersion: triggers.tekton.dev/v1beta1
kind: TriggerTemplate
params:
- name: repo-url
description: git repo to clone
- - name: image
- description: published image
+ - name: owner
+ description: github owner of repo
+ - name: image-name
+ description: github repo name
+ - name: commit
+ description: git commit id
resourcetemplates:
- apiVersion: tekton.dev/v1beta1
kind: PipelineRun
value: $(tt.params.repo-url)
- name: image
value: $(tt.params.image)
+ value: ghcr.io/$(tt.params.owner)/$(tt.params.image-name):$(tt.params.commit)
serviceAccount:
pipeline: letters-pipeline
listener: cluster-listener
+ingress:
+ host: trigger.vexingworkshop.com
+ service: el-cluster-listener
+ tlsSecretName: vexing-tls
--- /dev/null
+-----BEGIN PUBLIC KEY-----
+MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEdovq4EPpKQ/UcwTH/84wWS4bRtjX
+v2HWN8YGCBV5z5Q/wIPxXO4Jd6ZChD72cq3X6YlYjhERgCaPDQAT4O5ogw==
+-----END PUBLIC KEY-----