Merge "chore(img): updates tekton images"

This commit is contained in:
Zuul 2021-04-22 20:21:15 +00:00 committed by Gerrit Code Review
commit cf3cfb2f50
99 changed files with 863 additions and 592 deletions

View File

@ -4,44 +4,44 @@ kind: CustomResourceDefinition
metadata: metadata:
name: extensions.dashboard.tekton.dev name: extensions.dashboard.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton app.kubernetes.io/component: dashboard
app.kubernetes.io/name: extensions app.kubernetes.io/name: extensions
app.kubernetes.io/part-of: tekton-dashboard app.kubernetes.io/part-of: tekton-dashboard
spec: spec:
group: dashboard.tekton.dev group: dashboard.tekton.dev
names: names:
categories: categories:
- tekton - tekton
- tekton-dashboard - tekton-dashboard
kind: Extension kind: Extension
plural: extensions
singular: extension singular: extension
plural: extensions
shortNames: shortNames:
- ext - ext
- exts - exts
preserveUnknownFields: false preserveUnknownFields: false
scope: Namespaced scope: Namespaced
versions: versions:
- name: v1alpha1 - additionalPrinterColumns:
served: true - jsonPath: .spec.apiVersion
storage: true name: API version
additionalPrinterColumns: type: string
- jsonPath: .spec.apiVersion - jsonPath: .spec.name
name: API version name: Kind
type: string type: string
- jsonPath: .spec.name - jsonPath: .spec.displayname
name: Kind name: Display name
type: string type: string
- jsonPath: .spec.displayname - jsonPath: .metadata.creationTimestamp
name: Display name name: Age
type: string type: date
- jsonPath: .metadata.creationTimestamp name: v1alpha1
name: Age schema:
type: date openAPIV3Schema:
schema: type: object
openAPIV3Schema: x-kubernetes-preserve-unknown-fields: true
type: object served: true
x-kubernetes-preserve-unknown-fields: true storage: true
subresources: subresources:
status: {} status: {}
... ...

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-backend name: tekton-dashboard-backend
rules: rules:
- apiGroups: - apiGroups:

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-dashboard name: tekton-dashboard-dashboard
rules: rules:
- apiGroups: - apiGroups:

View File

@ -7,7 +7,7 @@ aggregationRule:
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-extensions name: tekton-dashboard-extensions
... ...
{{- end -}} {{- end -}}

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-pipelines name: tekton-dashboard-pipelines
rules: rules:
- apiGroups: - apiGroups:

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-tenant name: tekton-dashboard-tenant
rules: rules:
- apiGroups: - apiGroups:

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-triggers name: tekton-dashboard-triggers
rules: rules:
- apiGroups: - apiGroups:

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-backend name: tekton-dashboard-backend
roleRef: roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-extensions name: tekton-dashboard-extensions
roleRef: roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-tenant name: tekton-dashboard-tenant
roleRef: roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io

View File

@ -4,7 +4,7 @@ apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: {{ template "helpers.labels.fullname" $ }} name: {{ template "helpers.labels.fullname" $ }}
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
spec: spec:
replicas: 1 replicas: 1
selector: selector:
@ -17,7 +17,7 @@ spec:
maxSurge: 3 maxSurge: 3
template: template:
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard") | nindent 8 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 8 }}
spec: spec:
serviceAccountName: {{ template "helpers.labels.fullname" . }} serviceAccountName: {{ template "helpers.labels.fullname" . }}
securityContext: securityContext:
@ -30,12 +30,11 @@ spec:
image: {{ include "helpers.pod.container.image" ( dict "Global" $ "Application" "tekton_dashboard" ) }} image: {{ include "helpers.pod.container.image" ( dict "Global" $ "Application" "tekton_dashboard" ) }}
imagePullPolicy: {{ $.Values.images.pull.policy | quote }} imagePullPolicy: {{ $.Values.images.pull.policy | quote }}
args: args:
- --port=8080 - --port=9097
- --logout-url={{ $.Values.config.args.logout_url }} - --logout-url={{ $.Values.config.args.logout_url }}
- --pipelines-namespace={{ $.Release.Namespace }} - --pipelines-namespace={{ $.Release.Namespace }}
- --triggers-namespace={{ $.Release.Namespace }} - --triggers-namespace={{ $.Release.Namespace }}
- --read-only={{ $.Values.config.args.read_only }} - --read-only={{ $.Values.config.args.read_only }}
- --csrf-secure-cookie={{ $.Values.config.args.csrf_secure_cookie }}
- --log-level={{ $.Values.config.args.log_level }} - --log-level={{ $.Values.config.args.log_level }}
- --log-format={{ $.Values.config.args.log_format }} - --log-format={{ $.Values.config.args.log_format }}
- --namespace={{ $.Values.config.args.namespace }} - --namespace={{ $.Values.config.args.namespace }}
@ -48,20 +47,19 @@ spec:
fieldRef: fieldRef:
fieldPath: metadata.namespace fieldPath: metadata.namespace
ports: ports:
- name: web - containerPort: 9097
containerPort: 8080
readinessProbe: readinessProbe:
httpGet: httpGet:
scheme: HTTP scheme: HTTP
path: /readiness path: /readiness
port: 8080 port: 9097
initialDelaySeconds: 15 initialDelaySeconds: 15
periodSeconds: 10 periodSeconds: 10
livenessProbe: livenessProbe:
httpGet: httpGet:
scheme: HTTP scheme: HTTP
path: /health path: /health
port: 8080 port: 9097
initialDelaySeconds: 50 initialDelaySeconds: 50
periodSeconds: 20 periodSeconds: 20
timeoutSeconds: 5 timeoutSeconds: 5

View File

@ -1,6 +1,6 @@
{{- define "ingress-dashboard" -}} {{- define "ingress-dashboard" -}}
--- ---
apiVersion: networking.k8s.io/v1beta1 apiVersion: networking.k8s.io/v1
kind: Ingress kind: Ingress
metadata: metadata:
name: {{ template "helpers.labels.fullname" $ }} name: {{ template "helpers.labels.fullname" $ }}
@ -18,10 +18,14 @@ spec:
- host: {{ $.Values.params.endpoints.hostname }} - host: {{ $.Values.params.endpoints.hostname }}
http: http:
paths: paths:
- backend: - path: /
serviceName: tekton-dashboard pathType: Prefix
servicePort: web backend:
path: / service:
name: tekton-dashboard
port:
name: http
{{- if and $.Values.params.endpoints.tls.enabled }} {{- if and $.Values.params.endpoints.tls.enabled }}
tls: tls:
- hosts: - hosts:
@ -31,5 +35,3 @@ spec:
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "ingress-dashboard" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "ingress-dashboard" ) }}

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-dashboard name: tekton-dashboard-dashboard
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
roleRef: roleRef:

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-pipelines name: tekton-dashboard-pipelines
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
roleRef: roleRef:

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: tekton-dashboard-triggers name: tekton-dashboard-triggers
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
roleRef: roleRef:

View File

@ -4,13 +4,14 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
name: tekton-dashboard name: tekton-dashboard
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
spec: spec:
selector: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "dashboard") | nindent 4 }} selector: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
ports: ports:
- name: web - name: http
port: 9097
protocol: TCP protocol: TCP
port: 8080 targetPort: 9097
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "service-deployment" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "service-deployment" ) }}

View File

@ -3,7 +3,7 @@
apiVersion: v1 apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-dashboard") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "dashboard" "PartOf" "tekton-dashboard") | nindent 4 }}
name: {{ template "helpers.labels.fullname" . }} name: {{ template "helpers.labels.fullname" . }}
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
... ...

View File

@ -1,7 +1,6 @@
--- ---
config: config:
args: args:
csrf_secure_cookie: false
external-logs: '' external-logs: ''
log_format: json log_format: json
log_level: info log_level: info
@ -16,7 +15,7 @@ images:
tekton_dashboard: tekton_dashboard:
name: tektoncd/dashboard/cmd/dashboard name: tektoncd/dashboard/cmd/dashboard
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
tag: v0.12.0 tag: v0.14.0
pull: pull:
policy: IfNotPresent policy: IfNotPresent

View File

@ -4,7 +4,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: tekton-aggregate-edit name: tekton-aggregate-edit
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules: rules:

View File

@ -4,22 +4,22 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: tekton-aggregate-view name: tekton-aggregate-view
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-view: "true"
rules: rules:
- apiGroups: - apiGroups:
- tekton.dev - tekton.dev
resources: resources:
- tasks - tasks
- taskruns - taskruns
- pipelines - pipelines
- pipelineruns - pipelineruns
- pipelineresources - pipelineresources
- conditions - conditions
verbs: verbs:
- get - get
- list - list
- watch - watch
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "clusterrole-aggregate-view" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "clusterrole-aggregate-view" ) }}

View File

@ -4,7 +4,7 @@ kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: tekton-pipelines-controller-cluster-access name: tekton-pipelines-controller-cluster-access
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 4 }}
rules: rules:
- apiGroups: [""] - apiGroups: [""]
# Namespace access is required because the controller timeout handling logic # Namespace access is required because the controller timeout handling logic
@ -16,15 +16,13 @@ rules:
# Controller needs cluster access to all of the CRDs that it is responsible for # Controller needs cluster access to all of the CRDs that it is responsible for
# managing. # managing.
- apiGroups: ["tekton.dev"] - apiGroups: ["tekton.dev"]
resources: ["tasks", "clustertasks", "taskruns", "pipelines", "pipelineruns", "pipelineresources", resources: ["tasks", "clustertasks", "taskruns", "pipelines", "pipelineruns", "pipelineresources", "conditions", "runs"]
"conditions", "runs"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"] verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
- apiGroups: ["tekton.dev"] - apiGroups: ["tekton.dev"]
resources: ["taskruns/finalizers", "pipelineruns/finalizers"] resources: ["taskruns/finalizers", "pipelineruns/finalizers", "runs/finalizers"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"] verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
- apiGroups: ["tekton.dev"] - apiGroups: ["tekton.dev"]
resources: ["tasks/status", "clustertasks/status", "taskruns/status", "pipelines/status", resources: ["tasks/status", "clustertasks/status", "taskruns/status", "pipelines/status", "pipelineruns/status", "pipelineresources/status", "runs/status"]
"pipelineruns/status", "pipelineresources/status"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"] verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
... ...
{{- end -}} {{- end -}}

View File

@ -5,11 +5,10 @@ apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
# This is the access that the controller needs on a per-namespace basis. # This is the access that the controller needs on a per-namespace basis.
name: tekton-pipelines-controller-tenant-access name: tekton-pipelines-controller-tenant-access
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 4 }}
rules: rules:
- apiGroups: [""] - apiGroups: [""]
resources: ["pods", "pods/log", "secrets", "events", "serviceaccounts", "configmaps", resources: ["pods", "pods/log", "secrets", "events", "serviceaccounts", "configmaps", "persistentvolumeclaims", "limitranges"]
"persistentvolumeclaims", "limitranges"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"] verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
# Unclear if this access is actually required. Simply a hold-over from the previous # Unclear if this access is actually required. Simply a hold-over from the previous
# incarnation of the controller's ClusterRole. # incarnation of the controller's ClusterRole.

View File

@ -4,7 +4,7 @@ kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: tekton-pipelines-webhook-cluster-access name: tekton-pipelines-webhook-cluster-access
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
rules: rules:
- # The webhook needs to be able to list and update customresourcedefinitions, - # The webhook needs to be able to list and update customresourcedefinitions,
# mainly to update the webhook certificates. # mainly to update the webhook certificates.

View File

@ -4,7 +4,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: tekton-pipelines-controller-cluster-access name: tekton-pipelines-controller-cluster-access
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 4 }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: tekton-pipelines-controller name: tekton-pipelines-controller

View File

@ -8,7 +8,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: tekton-pipelines-controller-tenant-access name: tekton-pipelines-controller-tenant-access
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 4 }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: tekton-pipelines-controller name: tekton-pipelines-controller

View File

@ -4,7 +4,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: tekton-pipelines-webhook-cluster-access name: tekton-pipelines-webhook-cluster-access
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: tekton-pipelines-webhook name: tekton-pipelines-webhook

View File

@ -5,7 +5,7 @@ kind: ConfigMap
metadata: metadata:
name: config-artifact-bucket name: config-artifact-bucket
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
data: data:
{{- if $.Values.controller.conf.artifact_bucket.location }} {{- if $.Values.controller.conf.artifact_bucket.location }}
# location of the gcs bucket to be used for artifact storage # location of the gcs bucket to be used for artifact storage

View File

@ -5,7 +5,7 @@ kind: ConfigMap
metadata: metadata:
name: config-artifact-pvc name: config-artifact-pvc
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
data: data:
{{- if $.Values.controller.conf.artifact_pvc.size }} {{- if $.Values.controller.conf.artifact_pvc.size }}
# size of the PVC volume # size of the PVC volume

View File

@ -5,7 +5,7 @@ kind: ConfigMap
metadata: metadata:
name: config-defaults name: config-defaults
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
data: data:
{{- if $.Values.controller.conf.defaults.default_timeout_minutes }} {{- if $.Values.controller.conf.defaults.default_timeout_minutes }}
# default-timeout-minutes contains the default number of # default-timeout-minutes contains the default number of

View File

@ -5,7 +5,7 @@ kind: ConfigMap
metadata: metadata:
name: feature-flags name: feature-flags
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
data: data:
# Setting this flag to "true" will prevent Tekton to create an # Setting this flag to "true" will prevent Tekton to create an
# Affinity Assistant for every TaskRun sharing a PVC workspace # Affinity Assistant for every TaskRun sharing a PVC workspace
@ -39,6 +39,21 @@ data:
# info. # info.
disable-working-directory-overwrite: {{ $.Values.controller.conf.feature_flags.disable_working_directory_overwrite | quote }} disable-working-directory-overwrite: {{ $.Values.controller.conf.feature_flags.disable_working_directory_overwrite | quote }}
# Setting this flag to "true" will prevent Tekton scanning attached
# service accounts and injecting any credentials it finds into your
# Steps.
#
# The default behaviour currently is for Tekton to search service
# accounts for secrets matching a specified format and automatically
# mount those into your Steps.
#
# Note: setting this to "true" will prevent PipelineResources from
# working.
#
# See https://github.com/tektoncd/pipeline/issues/1836 for more
# info.
disable-creds-init: {{ $.Values.controller.conf.feature_flags.disable_creds_init | quote }}
# This option should be set to false when Pipelines is running in a # This option should be set to false when Pipelines is running in a
# cluster that does not use injected sidecars such as Istio. Setting # cluster that does not use injected sidecars such as Istio. Setting
# it to false should decrease the time it takes for a TaskRun to start # it to false should decrease the time it takes for a TaskRun to start
@ -47,6 +62,24 @@ data:
# #
# See https://github.com/tektoncd/pipeline/issues/2080 for more info. # See https://github.com/tektoncd/pipeline/issues/2080 for more info.
running-in-environment-with-injected-sidecars: {{ $.Values.controller.conf.feature_flags.running_in_environment_with_injected_sidecars | quote }} running-in-environment-with-injected-sidecars: {{ $.Values.controller.conf.feature_flags.running_in_environment_with_injected_sidecars | quote }}
# Setting this flag to "true" will require that any Git SSH Secret
# offered to Tekton must have known_hosts included.
#
# See https://github.com/tektoncd/pipeline/issues/2981 for more
# info.
require-git-ssh-secret-known-hosts: {{ $.Values.controller.conf.feature_flags.require_git_ssh_secret_known_hosts | quote }}
# Setting this flag to "true" enables the use of Tekton OCI bundle.
# This is an experimental feature and thus should still be considered
# an alpha feature.
enable-tekton-oci-bundles: {{ $.Values.controller.conf.feature_flags.enable_tekton_oci_bundles | quote }}
# Setting this flag to "true" enables the use of custom tasks from
# within pipelines.
# This is an experimental feature and thus should still be considered
# an alpha feature.
enable-custom-tasks: {{ $.Values.controller.conf.feature_flags.enable_custom_tasks | quote }}
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "configmap-feature-flags" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "configmap-feature-flags" ) }}

View File

@ -5,7 +5,7 @@ kind: ConfigMap
metadata: metadata:
name: config-leader-election name: config-leader-election
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
data: data:
# An inactive but valid configuration follows; see example. # An inactive but valid configuration follows; see example.
resourceLock: {{ $.Values.common_config.leader_election.resourceLock | quote }} resourceLock: {{ $.Values.common_config.leader_election.resourceLock | quote }}

View File

@ -5,7 +5,7 @@ kind: ConfigMap
metadata: metadata:
name: config-logging name: config-logging
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
data: data:
# Common configuration for all knative codebase # Common configuration for all knative codebase
zap-logger-config: | zap-logger-config: |

View File

@ -5,7 +5,7 @@ kind: ConfigMap
metadata: metadata:
name: config-observability name: config-observability
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
data: data:
{{- if $.Values.common_config.observability.metrics.backend_destination }} {{- if $.Values.common_config.observability.metrics.backend_destination }}
# metrics.backend-destination field specifies the system metrics destination. # metrics.backend-destination field specifies the system metrics destination.

View File

@ -0,0 +1,14 @@
{{- define "configmap-registry" -}}
---
apiVersion: v1
kind: ConfigMap
metadata:
name: config-registry-cert
namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
# data:
# # Registry's self-signed certificate
# cert: |
...
{{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "configmap-registry" ) }}

View File

@ -4,7 +4,6 @@ kind: CustomResourceDefinition
metadata: metadata:
name: clustertasks.tekton.dev name: clustertasks.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: clustertasks app.kubernetes.io/name: clustertasks
app.kubernetes.io/instance: default app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines app.kubernetes.io/part-of: tekton-pipelines
@ -12,53 +11,39 @@ spec:
group: tekton.dev group: tekton.dev
preserveUnknownFields: false preserveUnknownFields: false
versions: versions:
- name: v1alpha1 - &version
served: true name: v1alpha1
storage: false served: true
schema: storage: false
openAPIV3Schema: schema:
type: object openAPIV3Schema:
# One can use x-kubernetes-preserve-unknown-fields: true type: object
# at the root of the schema (and inside any properties, additionalProperties) # One can use x-kubernetes-preserve-unknown-fields: true
# to get the traditional CRD behaviour that nothing is pruned, despite # at the root of the schema (and inside any properties, additionalProperties)
# setting spec.preserveUnknownProperties: false. # to get the traditional CRD behaviour that nothing is pruned, despite
# # setting spec.preserveUnknownProperties: false.
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/ #
# See issue: https://github.com/knative/serving/issues/912 # See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
x-kubernetes-preserve-unknown-fields: true # See issue: https://github.com/knative/serving/issues/912
# Opt into the status subresource so metadata.generation x-kubernetes-preserve-unknown-fields: true
# starts to increment # Opt into the status subresource so metadata.generation
subresources: # starts to increment
status: {} subresources:
- name: v1beta1 status: {}
served: true - !!merge <<: *version
storage: true name: v1beta1
schema: storage: true
openAPIV3Schema:
type: object
# One can use x-kubernetes-preserve-unknown-fields: true
# at the root of the schema (and inside any properties, additionalProperties)
# to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
names: names:
kind: ClusterTask kind: ClusterTask
plural: clustertasks plural: clustertasks
categories: categories:
- tekton - tekton
- tekton-pipelines - tekton-pipelines
scope: Cluster scope: Cluster
conversion: conversion:
strategy: Webhook strategy: Webhook
webhook: webhook:
conversionReviewVersions: ["v1beta1","v1alpha1"] conversionReviewVersions: ["v1beta1"]
clientConfig: clientConfig:
service: service:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook

View File

@ -4,7 +4,6 @@ kind: CustomResourceDefinition
metadata: metadata:
name: conditions.tekton.dev name: conditions.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: conditions app.kubernetes.io/name: conditions
app.kubernetes.io/instance: default app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines app.kubernetes.io/part-of: tekton-pipelines

View File

@ -4,7 +4,6 @@ kind: CustomResourceDefinition
metadata: metadata:
name: images.caching.internal.knative.dev name: images.caching.internal.knative.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: images-caching app.kubernetes.io/name: images-caching
app.kubernetes.io/instance: default app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines app.kubernetes.io/part-of: tekton-pipelines

View File

@ -4,36 +4,35 @@ kind: CustomResourceDefinition
metadata: metadata:
name: pipelineresources.tekton.dev name: pipelineresources.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: pipelineresources app.kubernetes.io/name: pipelineresources
app.kubernetes.io/instance: default app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines app.kubernetes.io/part-of: tekton-pipelines
spec: spec:
group: tekton.dev group: tekton.dev
versions:
- name: v1alpha1
served: true
storage: true
schema:
openAPIV3Schema:
type: object
# One can use x-kubernetes-preserve-unknown-fields: true
# at the root of the schema (and inside any properties, additionalProperties)
# to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
names: names:
kind: PipelineResource kind: PipelineResource
plural: pipelineresources plural: pipelineresources
categories: categories:
- tekton - tekton
- tekton-pipelines - tekton-pipelines
scope: Namespaced scope: Namespaced
versions:
- name: v1alpha1
served: true
storage: true
schema:
openAPIV3Schema:
type: object
# One can use x-kubernetes-preserve-unknown-fields: true
# at the root of the schema (and inside any properties, additionalProperties)
# to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
... ...

View File

@ -4,7 +4,6 @@ kind: CustomResourceDefinition
metadata: metadata:
name: pipelineruns.tekton.dev name: pipelineruns.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: pipelineruns app.kubernetes.io/name: pipelineruns
app.kubernetes.io/instance: default app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines app.kubernetes.io/part-of: tekton-pipelines
@ -12,82 +11,55 @@ spec:
group: tekton.dev group: tekton.dev
preserveUnknownFields: false preserveUnknownFields: false
versions: versions:
- name: v1alpha1 - &version
served: true name: v1alpha1
storage: false served: true
schema: storage: false
openAPIV3Schema: schema:
type: object openAPIV3Schema:
# One can use x-kubernetes-preserve-unknown-fields: true type: object
# at the root of the schema (and inside any properties, additionalProperties) # One can use x-kubernetes-preserve-unknown-fields: true
# to get the traditional CRD behaviour that nothing is pruned, despite # at the root of the schema (and inside any properties, additionalProperties)
# setting spec.preserveUnknownProperties: false. # to get the traditional CRD behaviour that nothing is pruned, despite
# # setting spec.preserveUnknownProperties: false.
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/ #
# See issue: https://github.com/knative/serving/issues/912 # See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
x-kubernetes-preserve-unknown-fields: true # See issue: https://github.com/knative/serving/issues/912
# Opt into the status subresource so metadata.generation x-kubernetes-preserve-unknown-fields: true
# starts to increment additionalPrinterColumns:
subresources: - name: Succeeded
status: {} type: string
additionalPrinterColumns: jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].status"
- name: Succeeded - name: Reason
type: string type: string
jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].status" jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].reason"
- name: Reason - name: StartTime
type: string type: date
jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].reason" jsonPath: .status.startTime
- name: StartTime - name: CompletionTime
type: date type: date
jsonPath: .status.startTime jsonPath: .status.completionTime
- name: CompletionTime # Opt into the status subresource so metadata.generation
type: date # starts to increment
jsonPath: .status.completionTime subresources:
- name: v1beta1 status: {}
served: true - !!merge <<: *version
storage: true name: v1beta1
schema: storage: true
openAPIV3Schema:
type: object
# One can use x-kubernetes-preserve-unknown-fields: true
# at the root of the schema (and inside any properties, additionalProperties)
# to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
additionalPrinterColumns:
- name: Succeeded
type: string
jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].status"
- name: Reason
type: string
jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].reason"
- name: StartTime
type: date
jsonPath: .status.startTime
- name: CompletionTime
type: date
jsonPath: .status.completionTime
names: names:
kind: PipelineRun kind: PipelineRun
plural: pipelineruns plural: pipelineruns
categories: categories:
- tekton - tekton
- tekton-pipelines - tekton-pipelines
shortNames: shortNames:
- pr - pr
- prs - prs
scope: Namespaced scope: Namespaced
conversion: conversion:
strategy: Webhook strategy: Webhook
webhook: webhook:
conversionReviewVersions: ["v1beta1","v1alpha1"] conversionReviewVersions: ["v1beta1"]
clientConfig: clientConfig:
service: service:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook

View File

@ -4,7 +4,6 @@ kind: CustomResourceDefinition
metadata: metadata:
name: pipelines.tekton.dev name: pipelines.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: pipelines app.kubernetes.io/name: pipelines
app.kubernetes.io/instance: default app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines app.kubernetes.io/part-of: tekton-pipelines
@ -12,53 +11,39 @@ spec:
group: tekton.dev group: tekton.dev
preserveUnknownFields: false preserveUnknownFields: false
versions: versions:
- name: v1alpha1 - &version
served: true name: v1alpha1
storage: false served: true
schema: storage: false
openAPIV3Schema: # Opt into the status subresource so metadata.generation
type: object # starts to increment
# One can use x-kubernetes-preserve-unknown-fields: true subresources:
# at the root of the schema (and inside any properties, additionalProperties) status: {}
# to get the traditional CRD behaviour that nothing is pruned, despite schema:
# setting spec.preserveUnknownProperties: false. openAPIV3Schema:
# type: object
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/ # One can use x-kubernetes-preserve-unknown-fields: true
# See issue: https://github.com/knative/serving/issues/912 # at the root of the schema (and inside any properties, additionalProperties)
x-kubernetes-preserve-unknown-fields: true # to get the traditional CRD behaviour that nothing is pruned, despite
# Opt into the status subresource so metadata.generation # setting spec.preserveUnknownProperties: false.
# starts to increment #
subresources: # See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
status: {} # See issue: https://github.com/knative/serving/issues/912
- name: v1beta1 x-kubernetes-preserve-unknown-fields: true
served: true - !!merge <<: *version
storage: true name: v1beta1
schema: storage: true
openAPIV3Schema:
type: object
# One can use x-kubernetes-preserve-unknown-fields: true
# at the root of the schema (and inside any properties, additionalProperties)
# to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
names: names:
kind: Pipeline kind: Pipeline
plural: pipelines plural: pipelines
categories: categories:
- tekton - tekton
- tekton-pipelines - tekton-pipelines
scope: Namespaced scope: Namespaced
conversion: conversion:
strategy: Webhook strategy: Webhook
webhook: webhook:
conversionReviewVersions: ["v1beta1","v1alpha1"] conversionReviewVersions: ["v1beta1"]
clientConfig: clientConfig:
service: service:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook

View File

@ -4,7 +4,6 @@ kind: CustomResourceDefinition
metadata: metadata:
name: runs.tekton.dev name: runs.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: runs app.kubernetes.io/name: runs
app.kubernetes.io/instance: default app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines app.kubernetes.io/part-of: tekton-pipelines
@ -12,47 +11,42 @@ spec:
group: tekton.dev group: tekton.dev
preserveUnknownFields: false preserveUnknownFields: false
versions: versions:
- name: v1alpha1 - name: v1alpha1
served: true served: true
storage: true storage: true
schema: schema:
openAPIV3Schema: openAPIV3Schema:
type: object type: object
# One can use x-kubernetes-preserve-unknown-fields: true # One can use x-kubernetes-preserve-unknown-fields: true
# at the root of the schema (and inside any properties, additionalProperties) # at the root of the schema (and inside any properties, additionalProperties)
# to get the traditional CRD behaviour that nothing is pruned, despite # to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false. # setting spec.preserveUnknownProperties: false.
# #
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/ # See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912 # See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation additionalPrinterColumns:
# starts to increment - name: Succeeded
subresources: type: string
status: {} jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].status"
additionalPrinterColumns: - name: Reason
- name: Succeeded type: string
type: string jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].reason"
jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].status" - name: StartTime
- name: Reason type: date
type: string jsonPath: .status.startTime
jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].reason" - name: CompletionTime
- name: StartTime type: date
type: date jsonPath: .status.completionTime
jsonPath: .status.startTime # Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
names: names:
kind: Run kind: Run
plural: runs plural: runs
categories: categories:
- tekton - tekton
- tekton-pipelines - tekton-pipelines
scope: Namespaced scope: Namespaced
conversion:
strategy: Webhook
webhook:
conversionReviewVersions: ["v1beta1","v1alpha1"]
clientConfig:
service:
name: tekton-pipelines-webhook
namespace: {{ $.Release.Namespace }}
... ...

View File

@ -4,7 +4,6 @@ kind: CustomResourceDefinition
metadata: metadata:
name: taskruns.tekton.dev name: taskruns.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: taskruns app.kubernetes.io/name: taskruns
app.kubernetes.io/instance: default app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines app.kubernetes.io/part-of: tekton-pipelines
@ -12,82 +11,55 @@ spec:
group: tekton.dev group: tekton.dev
preserveUnknownFields: false preserveUnknownFields: false
versions: versions:
- name: v1alpha1 - &version
served: true name: v1alpha1
storage: false served: true
schema: storage: false
openAPIV3Schema: schema:
type: object openAPIV3Schema:
# One can use x-kubernetes-preserve-unknown-fields: true type: object
# at the root of the schema (and inside any properties, additionalProperties) # One can use x-kubernetes-preserve-unknown-fields: true
# to get the traditional CRD behaviour that nothing is pruned, despite # at the root of the schema (and inside any properties, additionalProperties)
# setting spec.preserveUnknownProperties: false. # to get the traditional CRD behaviour that nothing is pruned, despite
# # setting spec.preserveUnknownProperties: false.
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/ #
# See issue: https://github.com/knative/serving/issues/912 # See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
x-kubernetes-preserve-unknown-fields: true # See issue: https://github.com/knative/serving/issues/912
# Opt into the status subresource so metadata.generation x-kubernetes-preserve-unknown-fields: true
# starts to increment additionalPrinterColumns:
subresources: - name: Succeeded
status: {} type: string
additionalPrinterColumns: jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].status"
- name: Succeeded - name: Reason
type: string type: string
jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].status" jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].reason"
- name: Reason - name: StartTime
type: string type: date
jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].reason" jsonPath: .status.startTime
- name: StartTime - name: CompletionTime
type: date type: date
jsonPath: .status.startTime jsonPath: .status.completionTime
- name: CompletionTime # Opt into the status subresource so metadata.generation
type: date # starts to increment
jsonPath: .status.completionTime subresources:
- name: v1beta1 status: {}
served: true - !!merge <<: *version
storage: true name: v1beta1
schema: storage: true
openAPIV3Schema:
type: object
# One can use x-kubernetes-preserve-unknown-fields: true
# at the root of the schema (and inside any properties, additionalProperties)
# to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
additionalPrinterColumns:
- name: Succeeded
type: string
jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].status"
- name: Reason
type: string
jsonPath: ".status.conditions[?(@.type==\"Succeeded\")].reason"
- name: StartTime
type: date
jsonPath: .status.startTime
- name: CompletionTime
type: date
jsonPath: .status.completionTime
names: names:
kind: TaskRun kind: TaskRun
plural: taskruns plural: taskruns
categories: categories:
- tekton - tekton
- tekton-pipelines - tekton-pipelines
shortNames: shortNames:
- tr - tr
- trs - trs
scope: Namespaced scope: Namespaced
conversion: conversion:
strategy: Webhook strategy: Webhook
webhook: webhook:
conversionReviewVersions: ["v1beta1","v1alpha1"] conversionReviewVersions: ["v1beta1"]
clientConfig: clientConfig:
service: service:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook

View File

@ -4,7 +4,6 @@ kind: CustomResourceDefinition
metadata: metadata:
name: tasks.tekton.dev name: tasks.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: tasks app.kubernetes.io/name: tasks
app.kubernetes.io/instance: default app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines app.kubernetes.io/part-of: tekton-pipelines
@ -12,55 +11,42 @@ spec:
group: tekton.dev group: tekton.dev
preserveUnknownFields: false preserveUnknownFields: false
versions: versions:
- name: v1alpha1 - &version
served: true name: v1alpha1
storage: false served: true
schema: storage: false
openAPIV3Schema: schema:
type: object openAPIV3Schema:
# One can use x-kubernetes-preserve-unknown-fields: true type: object
# at the root of the schema (and inside any properties, additionalProperties) # One can use x-kubernetes-preserve-unknown-fields: true
# to get the traditional CRD behaviour that nothing is pruned, despite # at the root of the schema (and inside any properties, additionalProperties)
# setting spec.preserveUnknownProperties: false. # to get the traditional CRD behaviour that nothing is pruned, despite
# # setting spec.preserveUnknownProperties: false.
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/ #
# See issue: https://github.com/knative/serving/issues/912 # See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
x-kubernetes-preserve-unknown-fields: true # See issue: https://github.com/knative/serving/issues/912
# Opt into the status subresource so metadata.generation x-kubernetes-preserve-unknown-fields: true
# starts to increment # Opt into the status subresource so metadata.generation
subresources: # starts to increment
status: {} subresources:
- name: v1beta1 status: {}
served: true - !!merge <<: *version
storage: true name: v1beta1
schema: storage: true
openAPIV3Schema:
type: object
# One can use x-kubernetes-preserve-unknown-fields: true
# at the root of the schema (and inside any properties, additionalProperties)
# to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
names: names:
kind: Task kind: Task
plural: tasks plural: tasks
categories: categories:
- tekton - tekton
- tekton-pipelines - tekton-pipelines
scope: Namespaced scope: Namespaced
conversion: conversion:
strategy: Webhook strategy: Webhook
webhook: webhook:
conversionReviewVersions: ["v1beta1","v1alpha1"] conversionReviewVersions: ["v1beta1"]
clientConfig: clientConfig:
service: service:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook
namespace: tekton-pipelines
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
... ...

View File

@ -5,16 +5,16 @@ kind: Deployment
metadata: metadata:
name: tekton-pipelines-controller name: tekton-pipelines-controller
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 4 }}
spec: spec:
replicas: {{ $.Values.controller.pod.replicas }} replicas: {{ $.Values.controller.pod.replicas }}
selector: selector:
matchLabels: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "controller") | nindent 6 }} matchLabels: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "controller" ) | nindent 6 }}
template: template:
metadata: metadata:
annotations: annotations:
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" cluster-autoscaler.kubernetes.io/safe-to-evict: "false"
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 8 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 8 }}
spec: spec:
serviceAccountName: tekton-pipelines-controller serviceAccountName: tekton-pipelines-controller
nodeSelector: {{- include "helpers.pod.node_selector" ( dict "Global" $ "Component" "controller" ) | nindent 8 }} nodeSelector: {{- include "helpers.pod.node_selector" ( dict "Global" $ "Component" "controller" ) | nindent 8 }}
@ -27,8 +27,6 @@ spec:
# by image references by digest. # by image references by digest.
- -kubeconfig-writer-image - -kubeconfig-writer-image
- {{ include "helpers.pod.container.image" ( dict "Global" $ "Component" "kubeconfig_writer_image" ) }} - {{ include "helpers.pod.container.image" ( dict "Global" $ "Component" "kubeconfig_writer_image" ) }}
- -creds-image
- {{ include "helpers.pod.container.image" ( dict "Global" $ "Component" "creds_image" ) }}
- -git-image - -git-image
- {{ include "helpers.pod.container.image" ( dict "Global" $ "Component" "git_image" ) }} - {{ include "helpers.pod.container.image" ( dict "Global" $ "Component" "git_image" ) }}
- -entrypoint-image - -entrypoint-image
@ -46,17 +44,19 @@ spec:
- -shell-image - -shell-image
- {{ include "helpers.pod.container.image" ( dict "Global" $ "Component" "shell_image" ) }} - {{ include "helpers.pod.container.image" ( dict "Global" $ "Component" "shell_image" ) }}
volumeMounts: volumeMounts:
- name: config-logging - name: config-logging
mountPath: /etc/config-logging mountPath: /etc/config-logging
- name: config-registry-cert
mountPath: /etc/config-registry-cert
env: env:
- name: SYSTEM_NAMESPACE - name: SYSTEM_NAMESPACE
valueFrom: valueFrom:
fieldRef: fieldRef:
fieldPath: metadata.namespace fieldPath: metadata.namespace
- # If you are changing these names, you will also need to update # If you are changing these names, you will also need to update
# the controller's Role in 200-role.yaml to include the new # the controller's Role in 200-role.yaml to include the new
# values in the "configmaps" "get" rule. # values in the "configmaps" "get" rule.
name: CONFIG_DEFAULTS_NAME - name: CONFIG_DEFAULTS_NAME
value: config-defaults value: config-defaults
- name: CONFIG_LOGGING_NAME - name: CONFIG_LOGGING_NAME
value: config-logging value: config-logging
@ -70,6 +70,10 @@ spec:
value: feature-flags value: feature-flags
- name: CONFIG_LEADERELECTION_NAME - name: CONFIG_LEADERELECTION_NAME
value: config-leader-election value: config-leader-election
- name: SSL_CERT_FILE
value: /etc/config-registry-cert/cert
- name: SSL_CERT_DIR
value: /etc/ssl/certs
- name: METRICS_DOMAIN - name: METRICS_DOMAIN
value: {{ $.Values.controller.conf.metrics_domain }} value: {{ $.Values.controller.conf.metrics_domain }}
securityContext: securityContext:
@ -79,10 +83,32 @@ spec:
capabilities: capabilities:
drop: drop:
- all - all
ports:
- name: probes
containerPort: {{ $.Values.controller.endpoints.ports.probes.port }}
livenessProbe:
httpGet:
path: /health
port: probes
scheme: HTTP
initialDelaySeconds: 5
periodSeconds: 10
timeoutSeconds: 5
readinessProbe:
httpGet:
path: /readiness
port: probes
scheme: HTTP
initialDelaySeconds: 5
periodSeconds: 10
timeoutSeconds: 5
volumes: volumes:
- name: config-logging - name: config-logging
configMap: configMap:
name: config-logging name: config-logging
- name: config-registry-cert
configMap:
name: config-registry-cert
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "deployment-controller" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "deployment-controller" ) }}

View File

@ -8,7 +8,7 @@ metadata:
# change the value of WEBHOOK_SERVICE_NAME below. # change the value of WEBHOOK_SERVICE_NAME below.
name: tekton-pipelines-webhook name: tekton-pipelines-webhook
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
spec: spec:
replicas: {{ $.Values.webhook.pod.replicas }} replicas: {{ $.Values.webhook.pod.replicas }}
selector: selector:
@ -17,8 +17,17 @@ spec:
metadata: metadata:
annotations: annotations:
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" cluster-autoscaler.kubernetes.io/safe-to-evict: "false"
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 8 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 8 }}
app: tekton-pipelines-webhook
spec: spec:
affinity:
podAntiAffinity:
preferredDuringSchedulingIgnoredDuringExecution:
- podAffinityTerm:
topologyKey: kubernetes.io/hostname
labelSelector:
matchLabels: {{- include "helpers.labels.matchLabels" (dict "Global" $) | nindent 20 }}
weight: 100
serviceAccountName: tekton-pipelines-webhook serviceAccountName: tekton-pipelines-webhook
nodeSelector: {{- include "helpers.pod.node_selector" ( dict "Global" $ "Component" "webhook" ) | nindent 8 }} nodeSelector: {{- include "helpers.pod.node_selector" ( dict "Global" $ "Component" "webhook" ) | nindent 8 }}
containers: containers:
@ -27,15 +36,22 @@ spec:
# and substituted here. # and substituted here.
image: {{ include "helpers.pod.container.image" ( dict "Global" $ "Component" "webhook" ) }} image: {{ include "helpers.pod.container.image" ( dict "Global" $ "Component" "webhook" ) }}
imagePullPolicy: {{ $.Values.images.pull.policy | quote }} imagePullPolicy: {{ $.Values.images.pull.policy | quote }}
resources:
requests:
cpu: 100m
memory: 100Mi
limits:
cpu: 100m
memory: 500Mi
env: env:
- name: SYSTEM_NAMESPACE - name: SYSTEM_NAMESPACE
valueFrom: valueFrom:
fieldRef: fieldRef:
fieldPath: metadata.namespace fieldPath: metadata.namespace
- # If you are changing these names, you will also need to update # If you are changing these names, you will also need to update
# the webhook's Role in 200-role.yaml to include the new # the webhook's Role in 200-role.yaml to include the new
# values in the "configmaps" "get" rule. # values in the "configmaps" "get" rule.
name: CONFIG_LOGGING_NAME - name: CONFIG_LOGGING_NAME
value: config-logging value: config-logging
- name: CONFIG_OBSERVABILITY_NAME - name: CONFIG_OBSERVABILITY_NAME
value: config-observability value: config-observability
@ -61,6 +77,8 @@ spec:
containerPort: {{ $.Values.webhook.endpoints.ports.profiling.targetPort }} containerPort: {{ $.Values.webhook.endpoints.ports.profiling.targetPort }}
- name: https-webhook - name: https-webhook
containerPort: {{ $.Values.webhook.endpoints.ports.https_webhook.targetPort }} containerPort: {{ $.Values.webhook.endpoints.ports.https_webhook.targetPort }}
- name: probes
containerPort: {{ $.Values.webhook.endpoints.ports.probes.port }}
livenessProbe: livenessProbe:
tcpSocket: tcpSocket:
port: {{ $.Values.webhook.pod.probes.liveness.tcpPort }} port: {{ $.Values.webhook.pod.probes.liveness.tcpPort }}

View File

@ -0,0 +1,23 @@
{{- define "hpa-webhook" -}}
---
apiVersion: autoscaling/v2beta1
kind: HorizontalPodAutoscaler
metadata:
name: tekton-pipelines-webhook
namespace: tekton-pipelines
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
spec:
minReplicas: 1
maxReplicas: 5
scaleTargetRef:
apiVersion: apps/v1
kind: Deployment
name: tekton-pipelines-webhook
metrics:
- type: Resource
resource:
name: cpu
targetAverageUtilization: 100
...
{{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "hpa-webhook" ) }}

View File

@ -4,10 +4,10 @@ apiVersion: admissionregistration.k8s.io/v1
kind: MutatingWebhookConfiguration kind: MutatingWebhookConfiguration
metadata: metadata:
name: webhook.pipeline.tekton.dev name: webhook.pipeline.tekton.dev
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
webhooks: webhooks:
- admissionReviewVersions: - admissionReviewVersions:
- v1beta1 - v1
clientConfig: clientConfig:
service: service:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook

View File

@ -0,0 +1,14 @@
{{- define "pdb-webhook" -}}
---
apiVersion: policy/v1beta1
kind: PodDisruptionBudget
metadata:
name: tekton-pipelines-webhook
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
spec:
minAvailable: 80%
selector:
matchLabels: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "webhook" ) | nindent 6 }}
...
{{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "pdb-webhook" ) }}

View File

@ -4,7 +4,7 @@ apiVersion: policy/v1beta1
kind: PodSecurityPolicy kind: PodSecurityPolicy
metadata: metadata:
name: tekton-pipelines name: tekton-pipelines
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
spec: spec:
privileged: false privileged: false
allowPrivilegeEscalation: false allowPrivilegeEscalation: false

View File

@ -5,7 +5,7 @@ apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: tekton-pipelines-controller name: tekton-pipelines-controller
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 4 }}
rules: rules:
- apiGroups: [""] - apiGroups: [""]
resources: ["configmaps"] resources: ["configmaps"]
@ -14,8 +14,7 @@ rules:
apiGroups: [""] apiGroups: [""]
resources: ["configmaps"] resources: ["configmaps"]
verbs: ["get"] verbs: ["get"]
resourceNames: ["config-logging", "config-observability", "config-artifact-bucket", resourceNames: ["config-logging", "config-observability", "config-artifact-bucket", "config-artifact-pvc", "feature-flags", "config-leader-election", "config-registry-cert"]
"config-artifact-pvc", "feature-flags", "config-leader-election"]
- apiGroups: ["policy"] - apiGroups: ["policy"]
resources: ["podsecuritypolicies"] resources: ["podsecuritypolicies"]
resourceNames: ["tekton-pipelines"] resourceNames: ["tekton-pipelines"]

View File

@ -1,15 +1,15 @@
{{- define "clusterrole-leader-election" -}} {{- define "role-leader-election" -}}
--- ---
kind: ClusterRole kind: Role
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: tekton-pipelines-leader-election name: tekton-pipelines-leader-election
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-pipelines") | nindent 4 }}
rules: rules:
- # We uses leases for leaderelection # We uses leases for leaderelection
apiGroups: ["coordination.k8s.io"] - apiGroups: ["coordination.k8s.io"]
resources: ["leases"] resources: ["leases"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"] verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "clusterrole-leader-election" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "role-leader-election" ) }}

View File

@ -5,7 +5,7 @@ apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
rules: rules:
- apiGroups: [""] - apiGroups: [""]
resources: ["configmaps"] resources: ["configmaps"]

View File

@ -1,18 +1,18 @@
{{- define "clusterrolebinding-controller-leader-election" -}} {{- define "rolebinding-controller-leaderelection" -}}
--- ---
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: RoleBinding
metadata: metadata:
name: tekton-pipelines-controller-leaderelection name: tekton-pipelines-controller-leaderelection
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 4 }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: tekton-pipelines-controller name: tekton-pipelines-controller
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
roleRef: roleRef:
kind: ClusterRole kind: Role
name: tekton-pipelines-leader-election name: tekton-pipelines-leader-election
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "clusterrolebinding-controller-leader-election" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "rolebinding-controller-leaderelection" ) }}

View File

@ -5,7 +5,7 @@ kind: RoleBinding
metadata: metadata:
name: tekton-pipelines-controller name: tekton-pipelines-controller
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 4 }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: tekton-pipelines-controller name: tekton-pipelines-controller

View File

@ -1,18 +1,18 @@
{{- define "clusterrolebinding-webhook-leader-election" -}} {{- define "rolebinding-webhook-leader-election" -}}
--- ---
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: RoleBinding
metadata: metadata:
name: tekton-pipelines-webhook-leaderelection name: tekton-pipelines-webhook-leaderelection
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: tekton-pipelines-webhook name: tekton-pipelines-webhook
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
roleRef: roleRef:
kind: ClusterRole kind: Role
name: tekton-pipelines-leader-election name: tekton-pipelines-leader-election
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "clusterrolebinding-webhook-leader-election" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "rolebinding-webhook-leader-election" ) }}

View File

@ -5,7 +5,7 @@ kind: RoleBinding
metadata: metadata:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: tekton-pipelines-webhook name: tekton-pipelines-webhook

View File

@ -5,7 +5,7 @@ kind: Secret
metadata: metadata:
name: webhook-certs name: webhook-certs
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
# The data is populated at install time. # The data is populated at install time.
... ...
{{- end -}} {{- end -}}

View File

@ -3,7 +3,7 @@
apiVersion: v1 apiVersion: v1
kind: Service kind: Service
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 4 }}
name: tekton-pipelines-controller name: tekton-pipelines-controller
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
spec: spec:
@ -12,7 +12,9 @@ spec:
port: {{ $.Values.controller.endpoints.ports.metrics.port }} port: {{ $.Values.controller.endpoints.ports.metrics.port }}
protocol: {{ $.Values.controller.endpoints.ports.metrics.protocol }} protocol: {{ $.Values.controller.endpoints.ports.metrics.protocol }}
targetPort: {{ $.Values.controller.endpoints.ports.metrics.targetPort }} targetPort: {{ $.Values.controller.endpoints.ports.metrics.targetPort }}
selector: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "controller") | nindent 4 }} - name: probes
port: {{ $.Values.controller.endpoints.ports.probes.port }}
selector: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 4 }}
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "service-controller" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "service-controller" ) }}

View File

@ -3,7 +3,7 @@
apiVersion: v1 apiVersion: v1
kind: Service kind: Service
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
name: tekton-pipelines-webhook name: tekton-pipelines-webhook
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
spec: spec:
@ -18,7 +18,9 @@ spec:
- name: https-webhook - name: https-webhook
port: {{ $.Values.webhook.endpoints.ports.https_webhook.port }} port: {{ $.Values.webhook.endpoints.ports.https_webhook.port }}
targetPort: {{ $.Values.webhook.endpoints.ports.https_webhook.targetPort }} targetPort: {{ $.Values.webhook.endpoints.ports.https_webhook.targetPort }}
selector: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "webhook" ) | nindent 4 }} - name: probes
port: {{ $.Values.webhook.endpoints.ports.probes.port }}
selector: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "service-webhook" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "service-webhook" ) }}

View File

@ -5,7 +5,7 @@ kind: ServiceAccount
metadata: metadata:
name: tekton-pipelines-controller name: tekton-pipelines-controller
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-pipelines") | nindent 4 }}
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "serviceaccount-controller" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "serviceaccount-controller" ) }}

View File

@ -5,7 +5,7 @@ kind: ServiceAccount
metadata: metadata:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "serviceaccount-webhook" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "serviceaccount-webhook" ) }}

View File

@ -4,10 +4,10 @@ apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration kind: ValidatingWebhookConfiguration
metadata: metadata:
name: config.webhook.pipeline.tekton.dev name: config.webhook.pipeline.tekton.dev
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
webhooks: webhooks:
- admissionReviewVersions: - admissionReviewVersions:
- v1beta1 - v1
clientConfig: clientConfig:
service: service:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook

View File

@ -4,10 +4,10 @@ apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration kind: ValidatingWebhookConfiguration
metadata: metadata:
name: validation.webhook.pipeline.tekton.dev name: validation.webhook.pipeline.tekton.dev
labels: {{- include "helpers.labels.labels" (dict "Global" $) | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-pipelines") | nindent 4 }}
webhooks: webhooks:
- admissionReviewVersions: - admissionReviewVersions:
- v1beta1 - v1
clientConfig: clientConfig:
service: service:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook

View File

@ -1,41 +1,35 @@
# Default values file for Tekton-Pipelines
---
images: images:
applications: applications:
controller: controller:
tag: v0.19.0 tag: v0.21.0
name: tektoncd/pipeline/cmd/controller name: tektoncd/pipeline/cmd/controller
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
kubeconfig_writer_image: kubeconfig_writer_image:
tag: v0.19.0 tag: v0.21.0
name: tektoncd/pipeline/cmd/kubeconfigwriter name: tektoncd/pipeline/cmd/kubeconfigwriter
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
creds_image:
tag: v0.19.0
name: tektoncd/pipeline/cmd/creds-init
repo: gcr.io/tekton-releases/github.com
git_image: git_image:
tag: v0.19.0 tag: v0.21.0
name: tektoncd/pipeline/cmd/git-init name: tektoncd/pipeline/cmd/git-init
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
entrypoint_image: entrypoint_image:
tag: v0.19.0 tag: v0.21.0
name: tektoncd/pipeline/cmd/entrypoint name: tektoncd/pipeline/cmd/entrypoint
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
nop_image: nop_image:
tag: v0.19.0 tag: v0.21.0
name: tektoncd/pipeline/cmd/nop name: tektoncd/pipeline/cmd/nop
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
imagedigest_exporter_image: imagedigest_exporter_image:
tag: v0.19.0 tag: v0.21.0
name: tektoncd/pipeline/cmd/imagedigestexporter name: tektoncd/pipeline/cmd/imagedigestexporter
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
pr_image: pr_image:
tag: v0.19.0 tag: v0.21.0
name: pipeline/cmd/pullrequest-init name: pipeline/cmd/pullrequest-init
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
build_gcs_fetcher_image: build_gcs_fetcher_image:
tag: v0.19.0 tag: v0.21.0
name: tektoncd/pipeline/vendor/github.com/googlecloudplatform/cloud-builders/gcs-fetcher/cmd/gcs-fetcher name: tektoncd/pipeline/vendor/github.com/googlecloudplatform/cloud-builders/gcs-fetcher/cmd/gcs-fetcher
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
gsutil_image: gsutil_image:
@ -50,7 +44,7 @@ images:
name: base@sha256 name: base@sha256
repo: gcr.io/distroless repo: gcr.io/distroless
webhook: webhook:
tag: v0.19.0 tag: v0.21.0
name: tektoncd/pipeline/cmd/webhook name: tektoncd/pipeline/cmd/webhook
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
pull: pull:
@ -71,6 +65,8 @@ controller:
port: 9090 port: 9090
protocol: TCP protocol: TCP
targetPort: 9090 targetPort: 9090
probes:
port: 8080
pod: pod:
replicas: 1 replicas: 1
@ -102,6 +98,10 @@ controller:
disable_home_env_overwrite: "false" disable_home_env_overwrite: "false"
disable_working_directory_overwrite: "false" disable_working_directory_overwrite: "false"
running_in_environment_with_injected_sidecars: "true" running_in_environment_with_injected_sidecars: "true"
disable_creds_init: "false"
require_git_ssh_secret_known_hosts: "false"
enable_tekton_oci_bundles: "false"
enable_custom_tasks: "false"
webhook: webhook:
endpoints: endpoints:
@ -115,6 +115,8 @@ webhook:
https_webhook: https_webhook:
port: 443 port: 443
targetPort: 8443 targetPort: 8443
probes:
port: 8080
pod: pod:
probes: probes:

View File

@ -4,11 +4,11 @@ kind: CustomResourceDefinition
metadata: metadata:
name: clustertriggerbindings.triggers.tekton.dev name: clustertriggerbindings.triggers.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: clustertriggerbindings app.kubernetes.io/name: clustertriggerbindings
app.kubernetes.io/part-of: tekton-triggers app.kubernetes.io/part-of: tekton-triggers
spec: spec:
group: triggers.tekton.dev group: triggers.tekton.dev
scope: Cluster
names: names:
kind: ClusterTriggerBinding kind: ClusterTriggerBinding
plural: clustertriggerbindings plural: clustertriggerbindings
@ -18,16 +18,21 @@ spec:
categories: categories:
- tekton - tekton
- tekton-triggers - tekton-triggers
preserveUnknownFields: false
scope: Cluster
versions: versions:
- name: v1alpha1 - name: v1alpha1
served: true served: true
storage: true storage: true
subresources: schema:
status: {} openAPIV3Schema:
schema: type: object
openAPIV3Schema: # One can use x-kubernetes-preserve-unknown-fields: true
type: object # at the root of the schema (and inside any properties, additionalProperties)
x-kubernetes-preserve-unknown-fields: true # to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
subresources:
status: {}
... ...

View File

@ -4,11 +4,11 @@ kind: CustomResourceDefinition
metadata: metadata:
name: eventlisteners.triggers.tekton.dev name: eventlisteners.triggers.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: eventlisteners app.kubernetes.io/name: eventlisteners
app.kubernetes.io/part-of: tekton-triggers app.kubernetes.io/part-of: tekton-triggers
spec: spec:
group: triggers.tekton.dev group: triggers.tekton.dev
scope: Namespaced
names: names:
kind: EventListener kind: EventListener
plural: eventlisteners plural: eventlisteners
@ -18,26 +18,39 @@ spec:
categories: categories:
- tekton - tekton
- tekton-triggers - tekton-triggers
preserveUnknownFields: false
scope: Namespaced
versions: versions:
- name: v1alpha1 - name: v1alpha1
served: true served: true
storage: true storage: true
subresources: schema:
status: {} openAPIV3Schema:
additionalPrinterColumns: type: object
- name: Address # One can use x-kubernetes-preserve-unknown-fields: true
type: string # at the root of the schema (and inside any properties, additionalProperties)
jsonPath: .status.address.url # to get the traditional CRD behaviour that nothing is pruned, despite
- name: Available # setting spec.preserveUnknownProperties: false.
type: string #
jsonPath: ".status.conditions[?(@.type=='Available')].status" # See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
- name: Reason # See issue: https://github.com/knative/serving/issues/912
type: string x-kubernetes-preserve-unknown-fields: true
jsonPath: ".status.conditions[?(@.type=='Available')].reason" # Opt into the status subresource so metadata.generation
schema: # starts to increment
openAPIV3Schema: subresources:
type: object status: {}
x-kubernetes-preserve-unknown-fields: true additionalPrinterColumns:
- name: Address
type: string
jsonPath: .status.address.url
- name: Available
type: string
jsonPath: ".status.conditions[?(@.type=='Available')].status"
- name: Reason
type: string
jsonPath: ".status.conditions[?(@.type=='Available')].reason"
- name: Ready
type: string
jsonPath: ".status.conditions[?(@.type=='Ready')].status"
- name: Reason
type: string
jsonPath: ".status.conditions[?(@.type=='Ready')].reason"
... ...

View File

@ -4,11 +4,11 @@ kind: CustomResourceDefinition
metadata: metadata:
name: triggers.triggers.tekton.dev name: triggers.triggers.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: triggers app.kubernetes.io/name: triggers
app.kubernetes.io/part-of: tekton-triggers app.kubernetes.io/part-of: tekton-triggers
spec: spec:
group: triggers.tekton.dev group: triggers.tekton.dev
scope: Namespaced
names: names:
kind: Trigger kind: Trigger
plural: triggers plural: triggers
@ -18,16 +18,23 @@ spec:
categories: categories:
- tekton - tekton
- tekton-triggers - tekton-triggers
preserveUnknownFields: false
scope: Namespaced
versions: versions:
- name: v1alpha1 - name: v1alpha1
served: true served: true
storage: true storage: true
subresources: schema:
status: {} openAPIV3Schema:
schema: type: object
openAPIV3Schema: # One can use x-kubernetes-preserve-unknown-fields: true
type: object # at the root of the schema (and inside any properties, additionalProperties)
x-kubernetes-preserve-unknown-fields: true # to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
... ...

View File

@ -4,11 +4,11 @@ kind: CustomResourceDefinition
metadata: metadata:
name: triggerbindings.triggers.tekton.dev name: triggerbindings.triggers.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: triggerbindings app.kubernetes.io/name: triggerbindings
app.kubernetes.io/part-of: tekton-triggers app.kubernetes.io/part-of: tekton-triggers
spec: spec:
group: triggers.tekton.dev group: triggers.tekton.dev
scope: Namespaced
names: names:
kind: TriggerBinding kind: TriggerBinding
plural: triggerbindings plural: triggerbindings
@ -18,16 +18,23 @@ spec:
categories: categories:
- tekton - tekton
- tekton-triggers - tekton-triggers
preserveUnknownFields: false
scope: Namespaced
versions: versions:
- name: v1alpha1 - name: v1alpha1
served: true served: true
storage: true storage: true
subresources: schema:
status: {} openAPIV3Schema:
schema: type: object
openAPIV3Schema: # One can use x-kubernetes-preserve-unknown-fields: true
type: object # at the root of the schema (and inside any properties, additionalProperties)
x-kubernetes-preserve-unknown-fields: true # to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
... ...

View File

@ -4,11 +4,11 @@ kind: CustomResourceDefinition
metadata: metadata:
name: triggertemplates.triggers.tekton.dev name: triggertemplates.triggers.tekton.dev
labels: labels:
app.kubernetes.io/component: tekton
app.kubernetes.io/name: triggertemplates app.kubernetes.io/name: triggertemplates
app.kubernetes.io/part-of: tekton-triggers app.kubernetes.io/part-of: tekton-triggers
spec: spec:
group: triggers.tekton.dev group: triggers.tekton.dev
scope: Namespaced
names: names:
kind: TriggerTemplate kind: TriggerTemplate
plural: triggertemplates plural: triggertemplates
@ -18,16 +18,23 @@ spec:
categories: categories:
- tekton - tekton
- tekton-triggers - tekton-triggers
preserveUnknownFields: false
scope: Namespaced
versions: versions:
- name: v1alpha1 - name: v1alpha1
served: true served: true
storage: true storage: true
subresources: schema:
status: {} openAPIV3Schema:
schema: type: object
openAPIV3Schema: # One can use x-kubernetes-preserve-unknown-fields: true
type: object # at the root of the schema (and inside any properties, additionalProperties)
x-kubernetes-preserve-unknown-fields: true # to get the traditional CRD behaviour that nothing is pruned, despite
# setting spec.preserveUnknownProperties: false.
#
# See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/
# See issue: https://github.com/knative/serving/issues/912
x-kubernetes-preserve-unknown-fields: true
# Opt into the status subresource so metadata.generation
# starts to increment
subresources:
status: {}
... ...

View File

@ -3,7 +3,7 @@
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-triggers") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
name: tekton-triggers-admin name: tekton-triggers-admin
rules: rules:
- apiGroups: - apiGroups:
@ -91,6 +91,21 @@ rules:
- delete - delete
- patch - patch
- watch - watch
- apiGroups:
- serving.knative.dev
resources:
- "*"
- "*/status"
- "*/finalizers"
verbs:
- get
- list
- create
- update
- delete
- deletecollection
- patch
- watch
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "clusterrole-admin" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "clusterrole-admin" ) }}

View File

@ -4,7 +4,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: tekton-triggers-aggregate-edit name: tekton-triggers-aggregate-edit
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-triggers") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules: rules:

View File

@ -4,7 +4,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: tekton-triggers-aggregate-view name: tekton-triggers-aggregate-view
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-triggers") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-view: "true"
rules: rules:
- apiGroups: - apiGroups:

View File

@ -0,0 +1,19 @@
{{- define "clusterrole-core_interceptors" -}}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: tekton-triggers-core-interceptors
labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
rules:
- apiGroups:
- "*"
resources:
- secrets
verbs:
- get
- list
- watch
...
{{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "clusterrole-core_interceptors" ) }}

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-triggers") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
name: tekton-triggers-controller-admin name: tekton-triggers-controller-admin
roleRef: roleRef:
kind: ClusterRole kind: ClusterRole

View File

@ -0,0 +1,18 @@
{{- define "clusterrolebinding-core_interceptors" -}}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
name: tekton-triggers-core-interceptors
roleRef:
kind: ClusterRole
name: tekton-triggers-core-interceptors
apiGroup: rbac.authorization.k8s.io
subjects:
- kind: ServiceAccount
name: tekton-triggers-core-interceptors
namespace: {{ $.Release.Namespace }}
...
{{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "clusterrolebinding-core_interceptors" ) }}

View File

@ -3,7 +3,7 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-triggers") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
name: tekton-triggers-webhook-admin name: tekton-triggers-webhook-admin
roleRef: roleRef:
kind: ClusterRole kind: ClusterRole

View File

@ -4,6 +4,7 @@ apiVersion: v1
kind: ConfigMap kind: ConfigMap
metadata: metadata:
name: config-logging-triggers name: config-logging-triggers
labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
data: data:
zap-logger-config: | zap-logger-config: |
{{ $.Values.config.zap_logger_config | toJson }} {{ $.Values.config.zap_logger_config | toJson }}

View File

@ -4,6 +4,7 @@ apiVersion: v1
kind: ConfigMap kind: ConfigMap
metadata: metadata:
name: config-observability-triggers name: config-observability-triggers
labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
data: data:
{{- $.Values.configobservability | toYaml | nindent 2 }} {{- $.Values.configobservability | toYaml | nindent 2 }}
{{- end -}} {{- end -}}

View File

@ -4,7 +4,7 @@ apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: tekton-triggers-controller name: tekton-triggers-controller
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-triggers") | nindent 4 }}
spec: spec:
replicas: 1 replicas: 1
selector: selector:
@ -17,7 +17,8 @@ spec:
maxSurge: 3 maxSurge: 3
template: template:
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 8 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-triggers") | nindent 8 }}
app: tekton-triggers-controller
annotations: annotations:
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" cluster-autoscaler.kubernetes.io/safe-to-evict: "false"
spec: spec:
@ -36,6 +37,14 @@ spec:
- {{ include "helpers.pod.container.image" ( dict "Global" $ "Application" "tekton_eventlistener" ) }} - {{ include "helpers.pod.container.image" ( dict "Global" $ "Application" "tekton_eventlistener" ) }}
- -el-port - -el-port
- {{ $.Values.config.controller.el_port | quote }} - {{ $.Values.config.controller.el_port | quote }}
- -el-readtimeout
- {{ $.Values.config.controller.el_readtimeout | quote }}
- -el-writetimeout
- {{ $.Values.config.controller.el_writetimeout | quote }}
- -el-idletimeout
- {{ $.Values.config.controller.el_idletimeout | quote }}
- -el-timeouthandler
- {{ $.Values.config.controller.el_timeouthandler | quote }}
- -period-seconds - -period-seconds
- {{ $.Values.config.controller.period_seconds | quote }} - {{ $.Values.config.controller.period_seconds | quote }}
- -failure-threshold - -failure-threshold

View File

@ -0,0 +1,55 @@
{{- define "deployment-core_interceptors" -}}
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: tekton-triggers-core-interceptors
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "interceptors" "PartOf" "tekton-triggers") | nindent 4 }}
spec:
replicas: 1
selector:
matchLabels: {{- include "helpers.labels.matchLabels" (dict "Global" $) | nindent 6 }}
revisionHistoryLimit: 3
strategy:
type: RollingUpdate
rollingUpdate:
maxUnavailable: 1
maxSurge: 3
template:
metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "interceptors" "PartOf" "tekton-triggers") | nindent 8 }}
app: tekton-triggers-core-interceptors
spec:
serviceAccountName: tekton-triggers-core-interceptors
nodeSelector: {{- include "helpers.pod.node_selector" ( dict "Global" $ "Application" "tekton_interceptor" ) | nindent 8 }}
terminationGracePeriodSeconds: 30
containers:
- name: tekton-triggers-core-interceptors
image: {{ include "helpers.pod.container.image" ( dict "Global" $ "Application" "tekton_interceptors" ) }}
imagePullPolicy: {{ $.Values.images.pull.policy | quote }}
args:
- -logtostderr
- -stderrthreshold
- {{ $.Values.config.controller.stderrthreshold | quote }}
env:
- name: SYSTEM_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: CONFIG_LOGGING_NAME
value: config-logging-triggers
- name: CONFIG_OBSERVABILITY_NAME
value: config-observability-triggers
- name: METRICS_DOMAIN
value: tekton.dev/triggers
securityContext:
allowPrivilegeEscalation: false
runAsUser: 65532
runAsGroup: 65532
capabilities:
drop:
- all
volumes: []
...
{{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "deployment-core_interceptors" ) }}

View File

@ -4,7 +4,7 @@ apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: tekton-triggers-webhook name: tekton-triggers-webhook
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-triggers") | nindent 4 }}
spec: spec:
replicas: 1 replicas: 1
selector: selector:
@ -17,7 +17,8 @@ spec:
maxSurge: 3 maxSurge: 3
template: template:
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 8 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-triggers") | nindent 8 }}
app: tekton-triggers-webhook
annotations: annotations:
cluster-autoscaler.kubernetes.io/safe-to-evict: "false" cluster-autoscaler.kubernetes.io/safe-to-evict: "false"
spec: spec:
@ -43,7 +44,7 @@ spec:
value: tekton.dev/triggers value: tekton.dev/triggers
ports: ports:
- name: metrics - name: metrics
containerPort: {{ $.Values.params.endpoints.ports.metrics.port }} containerPort: {{ $.Values.params.endpoints.ports.metrics.target }}
- name: profiling - name: profiling
containerPort: {{ $.Values.params.endpoints.ports.profiling.port }} containerPort: {{ $.Values.params.endpoints.ports.profiling.port }}
- name: https-webhook - name: https-webhook

View File

@ -4,9 +4,11 @@ apiVersion: admissionregistration.k8s.io/v1
kind: MutatingWebhookConfiguration kind: MutatingWebhookConfiguration
metadata: metadata:
name: webhook.triggers.tekton.dev name: webhook.triggers.tekton.dev
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-triggers") | nindent 4 }}
webhooks: webhooks:
- admissionReviewVersions: - admissionReviewVersions:
- v1beta1 - v1beta1
- v1
clientConfig: clientConfig:
service: service:
name: tekton-triggers-webhook name: tekton-triggers-webhook

View File

@ -4,9 +4,7 @@ apiVersion: policy/v1beta1
kind: PodSecurityPolicy kind: PodSecurityPolicy
metadata: metadata:
name: tekton-triggers name: tekton-triggers
labels: labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
app.kubernetes.io/instance: tekton-triggers
app.kubernetes.io/part-of: tekton-triggers
spec: spec:
privileged: false privileged: false
allowPrivilegeEscalation: false allowPrivilegeEscalation: false

View File

@ -0,0 +1,27 @@
{{- define "role-core_interceptors" -}}
---
kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
name: tekton-triggers-core-interceptors
namespace: {{ $.Release.Namespace }}
rules:
- apiGroups:
- policy
resources:
- podsecuritypolicies
resourceNames:
- tekton-triggers
verbs:
- use
- apiGroups:
- "*"
resources:
- configmaps
verbs:
- get
- list
- watch
{{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "role-core_interceptors" ) }}

View File

@ -1,9 +1,9 @@
{{- define "role_admin-triggers" -}} {{- define "role-triggers_admin" -}}
--- ---
kind: Role kind: Role
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-triggers") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
name: tekton-triggers-admin name: tekton-triggers-admin
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
rules: rules:
@ -16,4 +16,4 @@ rules:
verbs: verbs:
- use - use
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "role_admin-triggers" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "role-triggers_admin" ) }}

View File

@ -3,7 +3,7 @@
kind: Role kind: Role
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-triggers") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
name: tekton-triggers-admin-webhook name: tekton-triggers-admin-webhook
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
rules: rules:

View File

@ -1,14 +1,11 @@
{{- define "rolebinding-controller_admin" -}} {{- define "rolebinding-controller_admin" -}}
--- ---
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: tekton-triggers-controller-admin name: tekton-triggers-controller-admin
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
app.kubernetes.io/instance: tekton-triggers
app.kubernetes.io/part-of: tekton-triggers
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: tekton-triggers-controller name: tekton-triggers-controller

View File

@ -0,0 +1,18 @@
{{- define "rolebinding-core_interceptors" -}}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: tekton-triggers-core-interceptors
namespace: {{ $.Release.Namespace }}
labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
subjects:
- kind: ServiceAccount
name: tekton-triggers-core-interceptors
namespace: {{ $.Release.Namespace }}
roleRef:
kind: Role
name: tekton-triggers-core-interceptors
apiGroup: rbac.authorization.k8s.io
{{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "rolebinding-core_interceptors" ) }}

View File

@ -5,9 +5,7 @@ kind: RoleBinding
metadata: metadata:
name: tekton-triggers-webhook-admin name: tekton-triggers-webhook-admin
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
labels: labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
app.kubernetes.io/instance: tekton-triggers
app.kubernetes.io/part-of: tekton-triggers
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: tekton-triggers-webhook name: tekton-triggers-webhook

View File

@ -4,6 +4,7 @@ apiVersion: v1
kind: Secret kind: Secret
metadata: metadata:
name: triggers-webhook-certs name: triggers-webhook-certs
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-triggers") | nindent 4 }}
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "secret-triggers" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "secret-triggers" ) }}

View File

@ -4,14 +4,14 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
name: tekton-triggers-controller name: tekton-triggers-controller
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-triggers") | nindent 4 }}
spec: spec:
selector: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "controller") | nindent 4 }} selector: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "controller" "PartOf" "tekton-triggers") | nindent 4 }}
ports: ports:
- name: http-metrics - name: http-metrics
protocol: TCP protocol: TCP
port: {{ $.Values.params.endpoints.ports.metrics.port }} port: {{ $.Values.params.endpoints.ports.metrics.port }}
targetPort: {{ $.Values.params.endpoints.ports.metrics.port }} targetPort: {{ $.Values.params.endpoints.ports.metrics.target }}
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "service-controller" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "service-controller" ) }}

View File

@ -0,0 +1,16 @@
{{- define "service-core_interceptors" -}}
---
apiVersion: v1
kind: Service
metadata:
name: tekton-triggers-core-interceptors
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "interceptors" "PartOf" "tekton-triggers") | nindent 4 }}
spec:
selector: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "interceptors" "PartOf" "tekton-triggers") | nindent 4 }}
ports:
- name: http
port: {{ $.Values.params.endpoints.ports.interceptors.port }}
targetPort: {{ $.Values.params.endpoints.ports.interceptors.target }}
...
{{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "service-core_interceptors" ) }}

View File

@ -4,9 +4,9 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
name: tekton-triggers-webhook name: tekton-triggers-webhook
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-triggers") | nindent 4 }}
spec: spec:
selector: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "webhook")| nindent 4 }} selector: {{- include "helpers.labels.matchLabels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-triggers")| nindent 4 }}
ports: ports:
- name: https-webhook - name: https-webhook
protocol: TCP protocol: TCP

View File

@ -3,7 +3,7 @@
apiVersion: v1 apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-triggers") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
name: tekton-triggers-controller name: tekton-triggers-controller
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
... ...

View File

@ -0,0 +1,11 @@
{{- define "serviceaccount-core_interceptors" -}}
---
apiVersion: v1
kind: ServiceAccount
metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
name: tekton-triggers-core-interceptors
namespace: {{ $.Release.Namespace }}
...
{{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "serviceaccount-core_interceptors" ) }}

View File

@ -3,7 +3,7 @@
apiVersion: v1 apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "tekton" "PartOf" "tekton-triggers") | nindent 4 }} labels: {{- include "helpers.labels.labels" (dict "Global" $ "PartOf" "tekton-triggers") | nindent 4 }}
name: tekton-triggers-webhook name: tekton-triggers-webhook
namespace: {{ $.Release.Namespace }} namespace: {{ $.Release.Namespace }}
... ...

View File

@ -1,12 +1,14 @@
{{- define "config-validation" -}} {{- define "validatingwebhookconfig-config" -}}
--- ---
apiVersion: admissionregistration.k8s.io/v1 apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration kind: ValidatingWebhookConfiguration
metadata: metadata:
name: config.webhook.triggers.tekton.dev name: config.webhook.triggers.tekton.dev
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-triggers") | nindent 4 }}
webhooks: webhooks:
- admissionReviewVersions: - admissionReviewVersions:
- v1beta1 - v1beta1
- v1
clientConfig: clientConfig:
service: service:
name: tekton-triggers-webhook name: tekton-triggers-webhook
@ -20,4 +22,4 @@ webhooks:
operator: Exists operator: Exists
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "config-validation" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "validatingwebhookconfig-config" ) }}

View File

@ -1,12 +1,14 @@
{{- define "validatingwebhookconfig-webhook" -}} {{- define "validatingwebhookconfig-validation" -}}
--- ---
apiVersion: admissionregistration.k8s.io/v1 apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration kind: ValidatingWebhookConfiguration
metadata: metadata:
name: validation.webhook.triggers.tekton.dev name: validation.webhook.triggers.tekton.dev
labels: {{- include "helpers.labels.labels" (dict "Global" $ "Component" "webhook" "PartOf" "tekton-triggers") | nindent 4 }}
webhooks: webhooks:
- admissionReviewVersions: - admissionReviewVersions:
- v1beta1 - v1beta1
- v1
clientConfig: clientConfig:
service: service:
name: tekton-triggers-webhook name: tekton-triggers-webhook
@ -14,6 +16,10 @@ webhooks:
failurePolicy: Fail failurePolicy: Fail
sideEffects: None sideEffects: None
name: validation.webhook.triggers.tekton.dev name: validation.webhook.triggers.tekton.dev
namespaceSelector:
matchExpressions:
- key: triggers.tekton.dev/release
operator: Exists
... ...
{{- end -}} {{- end -}}
{{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "validatingwebhookconfig-webhook" ) }} {{- include "helpers.template.overlay" ( dict "Global" $ "template_definition" "validatingwebhookconfig-validation" ) }}

View File

@ -1,10 +1,14 @@
--- ---
config: config:
controller: controller:
period_seconds: 10
failure_threshold: 1
stderrthreshold: INFO
el_port: 8080 el_port: 8080
el_readtimeout: 5
el_writetimeout: 40
el_idletimeout: 120
el_timeouthandler: 30
failure_threshold: 1
period_seconds: 10
stderrthreshold: INFO
loglevel: loglevel:
controller: info controller: info
eventlistener: info eventlistener: info
@ -23,8 +27,8 @@ config:
messageKey: msg messageKey: msg
nameKey: logger nameKey: logger
stacktraceKey: stacktrace stacktraceKey: stacktrace
timeEncoder: '' timeEncoder: iso8601
timeKey: '' timeKey: ts
encoding: json encoding: json
errorOutputPaths: errorOutputPaths:
- stderr - stderr
@ -40,6 +44,7 @@ params:
ports: ports:
metrics: metrics:
port: 9090 port: 9090
target: 9090
scheme: http scheme: http
profiling: profiling:
port: 8008 port: 8008
@ -48,21 +53,32 @@ params:
port: 443 port: 443
target: 8443 target: 8443
scheme: https scheme: https
interceptors:
port: 80
target: 8082
images: images:
applications: applications:
tekton_controller: tekton_controller:
name: tektoncd/triggers/cmd/controller name: tektoncd/triggers/cmd/controller
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
tag: v0.10.2 tag: v0.12.0
tekton_eventlistener: tekton_eventlistener:
name: tektoncd/triggers/cmd/eventlistenersink name: tektoncd/triggers/cmd/eventlistenersink
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
tag: v0.10.2 tag: v0.12.0
tekton_webhook: tekton_webhook:
name: tektoncd/triggers/cmd/webhook name: tektoncd/triggers/cmd/webhook
repo: gcr.io/tekton-releases/github.com repo: gcr.io/tekton-releases/github.com
tag: v0.10.2 tag: v0.12.0
tekton_interceptors:
name: tektoncd/triggers/cmd/interceptors
repo: gcr.io/tekton-releases/github.com
tag: v0.12.0
tekton_eventlistenersink:
name: tektoncd/triggers/cmd/eventlistenersink
repo: gcr.io/tekton-releases/github.com
tag: v0.12.0
pull: pull:
policy: IfNotPresent policy: IfNotPresent