* Remove references to osbuilder-tools image
because it has been merged with auroraboot here:
https://github.com/kairos-io/AuroraBoot/pull/110
as part of https://github.com/kairos-io/kairos/issues/1633
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* WIP
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Fix test command
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* go mod tidy
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Bump linting action
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Don't look for artifacts in build/ subdir
because it has been fixed here:
https://github.com/kairos-io/AuroraBoot/pull/115
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
---------
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Add fields to the CRDs
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* WIP Create test
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Refactor code to split in testable functions
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* WIP
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Do something actually useful in tests
- Create a random namespace
- Create an artifact
- Check that CreateConfigmap doesn't error
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* WIP
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Refactor before each so that we can change the artifact object per test
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* WIP
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* WIP
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Run kaniko to build the Dockerfile
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Build the image from Dockerfile with kaniko
Currently can build an image. For example apply these:
```
kind: Secret
apiVersion: v1
metadata:
name: mydockerfile
stringData:
Dockerfile: |
FROM ubuntu
RUN touch myfile
---
kind: OSArtifact
apiVersion: build.kairos.io/v1alpha2
metadata:
name: hello-kairos
spec:
imageName: "quay.io/kairos/core-opensuse-leap:latest"
baseImageDockerfile:
name: "mydockerfile"
key: "Dockerfile"
iso: true
```
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Clarify that convert-to-kairos is not yet implemented
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Remove implemented TODO
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* WIP
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Bump linting action
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Fix linting errors
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Bump it again
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Unexport function and run controller tests in CI
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Unexport the other one too
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Extract case to a function
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Split controller tests in a separate job
so that they run on a fresh cluster and they run in parallel
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Remove non-implemented functionality
Will happen as part of this: https://github.com/kairos-io/kairos/issues/1721
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* go mod tidy
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Try to use a random (free) port in tests
because sometimes we collide
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
---------
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
Currently fails with:
```
Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:default:hello-kairos" cannot list resource "pods" in API group "" at the cluster scope
```
because we try to list pods with `-A`. This means we are going to get a
similar error if we try to copy files to a Pod on another namespace
unless we grant permission at the cluster scope or just that
namespace. (Is that possible? Maybe if we create the Role in the same
namespace as the server.)
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>