Skip to content

Commit aaadf53

Browse files
authored
Check image arch (#258)
Signed-off-by: Tamal Saha <tamal@appscode.com>
1 parent 9d6d375 commit aaadf53

File tree

1,103 files changed

+457487
-4697
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,103 files changed

+457487
-4697
lines changed

DEVELOPMENT.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,5 @@
55
Uses [image-packer](https://github.com/kmodules/image-packer)
66

77
```bash
8-
image-packer list --root-dir=charts --output-dir=catalog
9-
10-
image-packer generate-scripts --insecure --allow-nondistributable-artifacts \
11-
--output-dir=catalog \
12-
--src=catalog/imagelist.yaml
13-
14-
make add-license fmt
8+
./hack/scripts/update-catalog.sh
159
```

apis/installer/fuzzer/fuzzer.go

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,5 @@ var Funcs = func(codecs runtimeserializer.CodecFactory) []interface{} {
3838
func(s *v1alpha1.KubevaultWebhookServer, c fuzz.Continue) {
3939
c.FuzzNoCustom(s) // fuzz self without calling this function again
4040
},
41-
func(s *v1alpha1.SecretsStoreReader, c fuzz.Continue) {
42-
c.FuzzNoCustom(s) // fuzz self without calling this function again
43-
},
4441
}
4542
}

apis/installer/v1alpha1/register.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,6 @@ func addKnownTypes(scheme *runtime.Scheme) error {
6262
&KubevaultWebhookServerList{},
6363
&KubevaultWebhookServer{},
6464
&Kubevault{},
65-
&SecretsStoreReaderList{},
66-
&SecretsStoreReader{},
6765
)
6866

6967
scheme.AddKnownTypes(SchemeGroupVersion,

apis/installer/v1alpha1/secrets_store_reader_types.go

Lines changed: 0 additions & 90 deletions
This file was deleted.

apis/installer/v1alpha1/types_test.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,6 @@ func TestDefaultValues(t *testing.T) {
3131
schemachecker.TestCase{Obj: v1alpha1.KubevaultOperatorSpec{}},
3232
schemachecker.TestCase{Obj: v1alpha1.KubevaultWebhookServerSpec{}},
3333
schemachecker.TestCase{Obj: v1alpha1.KubevaultSpec{}},
34-
schemachecker.TestCase{Obj: v1alpha1.SecretsStoreReaderSpec{}},
3534
)
3635
checker.TestAll(t)
3736
}

apis/installer/v1alpha1/zz_generated.deepcopy.go

Lines changed: 0 additions & 123 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

catalog/copy-images.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ mv /tmp/crane .
3535

3636
CMD="./crane"
3737

38-
$CMD cp --allow-nondistributable-artifacts --insecure ghcr.io/kubevault/secrets-store-reader:v2024.9.30 $IMAGE_REGISTRY/kubevault/secrets-store-reader:v2024.9.30
3938
$CMD cp --allow-nondistributable-artifacts --insecure ghcr.io/kubevault/vault-exporter:v0.1.1 $IMAGE_REGISTRY/kubevault/vault-exporter:v0.1.1
4039
$CMD cp --allow-nondistributable-artifacts --insecure ghcr.io/kubevault/vault-operator:v0.19.0 $IMAGE_REGISTRY/kubevault/vault-operator:v0.19.0
4140
$CMD cp --allow-nondistributable-artifacts --insecure kubevault/vault-unsealer:v0.19.0 $IMAGE_REGISTRY/kubevault/vault-unsealer:v0.19.0

catalog/export-images.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,6 @@ mv /tmp/crane images
3232

3333
CMD="./images/crane"
3434

35-
$CMD pull --allow-nondistributable-artifacts --insecure ghcr.io/kubevault/secrets-store-reader:v2024.9.30 images/kubevault-secrets-store-reader-v2024.9.30.tar
3635
$CMD pull --allow-nondistributable-artifacts --insecure ghcr.io/kubevault/vault-exporter:v0.1.1 images/kubevault-vault-exporter-v0.1.1.tar
3736
$CMD pull --allow-nondistributable-artifacts --insecure ghcr.io/kubevault/vault-operator:v0.19.0 images/kubevault-vault-operator-v0.19.0.tar
3837
$CMD pull --allow-nondistributable-artifacts --insecure kubevault/vault-unsealer:v0.19.0 images/kubevault-vault-unsealer-v0.19.0.tar

catalog/imagelist.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
- ghcr.io/kubevault/secrets-store-reader:v2024.9.30
21
- ghcr.io/kubevault/vault-exporter:v0.1.1
32
- ghcr.io/kubevault/vault-operator:v0.19.0
43
- kubevault/vault-unsealer:v0.19.0

catalog/import-images.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ tar -zxvf $TARBALL
2626

2727
CMD="./crane"
2828

29-
$CMD push --allow-nondistributable-artifacts --insecure images/kubevault-secrets-store-reader-v2024.9.30.tar $IMAGE_REGISTRY/kubevault/secrets-store-reader:v2024.9.30
3029
$CMD push --allow-nondistributable-artifacts --insecure images/kubevault-vault-exporter-v0.1.1.tar $IMAGE_REGISTRY/kubevault/vault-exporter:v0.1.1
3130
$CMD push --allow-nondistributable-artifacts --insecure images/kubevault-vault-operator-v0.19.0.tar $IMAGE_REGISTRY/kubevault/vault-operator:v0.19.0
3231
$CMD push --allow-nondistributable-artifacts --insecure images/kubevault-vault-unsealer-v0.19.0.tar $IMAGE_REGISTRY/kubevault/vault-unsealer:v0.19.0

0 commit comments

Comments
 (0)