Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump version tekton cli #1834

Closed

Conversation

MartinBasti
Copy link
Contributor

Before you complete this pull request ...

Look for any open pull requests in the repository with the title "e2e-tests update" and
see if there are recent e2e-tests updates that will be applicable to your change.

ralphbean and others added 2 commits December 4, 2024 13:30
Before this change, users could use the TIMEOUT param to increase their
timeout up from the 5m default, but they would hit a ceiling. If they
increased their timeout past 2h, then a tekton default on timeout for
the task itself would kick in.
The version is outdated and doesn't support the latest features (failing
on sceham validation)

Signed-off-by: Martin Basti <[email protected]>
@MartinBasti
Copy link
Contributor Author

/ok-to-test

@MartinBasti
Copy link
Contributor Author

didn't help, failed again

Error: failed to parse string as a Tekton object: "{\"apiVersion\":\"tekton.dev/v1\",\"kind\":\"Pipeline\",\"metadata\":{\"labels\":{\"build.appstudio.redhat.com/pipeline\":\"enterprise-contract\"},\"name\":\"enterprise-contract\"},\"spec\":{\"finally\":[],\"params\":[{\"description\":\"Spec section of an ApplicationSnapshot resource. Not all fields of the\\nresource are required. A minimal example:\\n  {\\n    \\\"components\\\": [\\n      {\\n        \\\"containerImage\\\": \\\"quay.io/example/repo:latest\\\"\\n      }\\n    ]\\n  }\\nEach \\\"containerImage\\\" in the \\\"components\\\" array is validated.\\n\",\"name\":\"SNAPSHOT\",\"type\":\"string\"},{\"default\":\"enterprise-contract-service/default\",\"description\":\"Name of the policy configuration (EnterpriseContractConfiguration\\nobject) to use. `namespace/name` or `name` syntax supported. If\\nnamespace is omitted the namespace where the task runs is used.\\n\",\"name\":\"POLICY_CONFIGURATION\",\"type\":\"string\"},{\"default\":\"\",\"description\":\"Path to a directory containing SSL certs to be used when communicating\\nwith external services. This is useful when using the integrated registry\\nand a local instance of Rekor on a development cluster which may use\\ncertificates issued by a not-commonly trusted root CA. In such cases,\\n\\\"/var/run/secrets/kubernetes.io/serviceaccount\\\" is a good value. Multiple\\npaths can be provided by using the \\\":\\\" separator.\\n\",\"name\":\"SSL_CERT_DIR\",\"type\":\"string\"},{\"default\":\"k8s://openshift-pipelines/public-key\",\"description\":\"Public key used to verify signatures. Must be a valid k8s cosign\\nreference, e.g. k8s://my-space/my-secret where my-secret contains\\nthe expected cosign.pub attribute.\\n\",\"name\":\"PUBLIC_KEY\",\"type\":\"string\"},{\"default\":\"5m0s\",\"description\":\"Timeout setting for `ec validate`.\",\"name\":\"TIMEOUT\",\"type\":\"string\"},{\"default\":\"1\",\"description\":\"Number of parallel workers to use for policy evaluation.\",\"name\":\"WORKERS\",\"type\":\"string\"},{\"default\":\"trusted-ca\",\"description\":\"The name of the ConfigMap to read CA bundle data from.\",\"name\":\"CA_TRUST_CONFIGMAP_NAME\",\"type\":\"string\"},{\"default\":\"ca-bundle.crt\",\"description\":\"The name of the key in the ConfigMap that contains the CA bundle data.\",\"name\":\"CA_TRUST_CONFIG_MAP_KEY\",\"type\":\"string\"},{\"default\":\"false\",\"description\":\"Reduce the Snapshot to only the component whose build caused the Snapshot to be created\",\"name\":\"SINGLE_COMPONENT\",\"type\":\"string\"},{\"default\":\"pr/$(context.pipelineRun.name)\",\"description\":\"PipelineRun ID\",\"name\":\"SINGLE_COMPONENT_CUSTOM_RESOURCE\",\"type\":\"string\"},{\"default\":\"true\",\"description\":\"A boolean flag that determines whether the result of the test will mark the TaskRun as passing or not.\\nSwap to false to make the IntegrationTestScenario informative.\\n\\nSetting to false is useful on specific conditions but will always mark the integration test as successful and\\nhumans will tend to ignore the test results if they failed. Use with caution.\\n\",\"name\":\"STRICT\",\"type\":\"string\"}],\"results\":[{\"name\":\"TEST_OUTPUT\",\"value\":\"$(tasks.verify.results.TEST_OUTPUT)\"}],\"tasks\":[{\"name\":\"verify\",\"params\":[{\"name\":\"POLICY_CONFIGURATION\",\"value\":\"$(params.POLICY_CONFIGURATION)\"},{\"name\":\"IMAGES\",\"value\":\"$(params.SNAPSHOT)\"},{\"name\":\"SSL_CERT_DIR\",\"value\":\"$(params.SSL_CERT_DIR)\"},{\"name\":\"STRICT\",\"value\":\"$(params.STRICT)\"},{\"name\":\"PUBLIC_KEY\",\"value\":\"$(params.PUBLIC_KEY)\"},{\"name\":\"IGNORE_REKOR\",\"value\":\"true\"},{\"name\":\"TIMEOUT\",\"value\":\"$(params.TIMEOUT)\"},{\"name\":\"WORKERS\",\"value\":\"$(params.WORKERS)\"},{\"name\":\"CA_TRUST_CONFIGMAP_NAME\",\"value\":\"$(params.CA_TRUST_CONFIGMAP_NAME)\"},{\"name\":\"CA_TRUST_CONFIG_MAP_KEY\",\"value\":\"$(params.CA_TRUST_CONFIG_MAP_KEY)\"},{\"name\":\"SINGLE_COMPONENT\",\"value\":\"$(params.SINGLE_COMPONENT)\"},{\"name\":\"SINGLE_COMPONENT_CUSTOM_RESOURCE\",\"value\":\"$(params.SINGLE_COMPONENT_CUSTOM_RESOURCE)\"}],\"taskRef\":{\"params\":[{\"name\":\"bundle\",\"value\":\"quay.io/enterprise-contract/ec-task-bundle:snapshot@sha256:f6fb0800d707b7eb6f3ccfc0026c39bb3a5b944aa1ecacc7d8de6cb2fa1a67a6\"},{\"name\":\"name\",\"value\":\"verify-enterprise-contract\"},{\"name\":\"kind\",\"value\":\"task\"}],\"resolver\":\"bundles\"},\"timeout\":0}]}}"
*Warning*: This is an experimental command, it's usage and behavior can change in the next release(s)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants