-
Notifications
You must be signed in to change notification settings - Fork 0
/
cloudbuild.yaml
35 lines (35 loc) · 1.54 KB
/
cloudbuild.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
steps:
# Generate the kubeconfig file needed to authenticate to the GKE cluster. The root user generates this file with restricted permissions.
- name: 'gcr.io/cloud-builders/kubectl'
args: ['config', 'current-context']
volumes:
- name: 'kube'
path: '/kube'
env:
- 'KUBECONFIG=/kube/config'
- 'CLOUDSDK_COMPUTE_ZONE=ZONE'
- 'CLOUDSDK_CONTAINER_CLUSTER=CLUSTER_NAME'
- 'CLOUDSDK_CONTAINER_USE_APPLICATION_DEFAULT_CREDENTIALS=true'
# Grant read permissions to the kubeconfig file.
- name: 'bash'
args: ['chmod', '644', '/kube/config']
volumes:
- name: 'kube'
path: '/kube'
# Grant read/write permissions to the workspace.
- name: 'bash'
args: ['chmod', '777', '/workspace']
# Run nomos hydrate on the config-root directory and output the result into hydrated-configs.
- name: 'gcr.io/config-management-release/nomos'
args: ['nomos', 'hydrate', '--path', '/workspace/ci-pipeline/config-root', '--output', '/workspace/hydrated-configs']
volumes:
- name: 'kube'
path: '/kube'
env:
- 'KUBECONFIG=/kube/config'
# Recursively read a directory of kubernetes YAML configs from the workspace and output them as one list into config-source.yaml.
- name: 'gcr.io/config-management-release/read-yaml'
args: ['--input', '/dev/null', '-d', 'source_dir=/workspace/hydrated-configs', '--output', '/workspace/config-source.yaml']
# Validate input configs against any OPA ConstraintTemplates and Constraints it finds in its input.
- name: 'gcr.io/config-management-release/policy-controller-validate'
args: ['--input', '/workspace/config-source.yaml']