Skip to content

Commit

Permalink
chore(release): nightly (#10515)
Browse files Browse the repository at this point in the history
* chore(release): nightly

* ci: remove musl builds
  • Loading branch information
moabu authored Dec 27, 2024
1 parent aa1b2ed commit ef085e6
Show file tree
Hide file tree
Showing 208 changed files with 345 additions and 390 deletions.
47 changes: 1 addition & 46 deletions .github/workflows/build-packages.yml
Original file line number Diff line number Diff line change
Expand Up @@ -378,49 +378,4 @@ jobs:
gpg --armor --detach-sign cedarling_python-"${TAG}"-cp311-cp311-manylinux_2_34_x86_64.whl || echo "Failed to sign"
gpg --armor --detach-sign cedarling_python-"${TAG}"-cp310-cp310-manylinux_2_34_x86_64.whl || echo "Failed to sign"
echo "${{ secrets.MOAUTO_WORKFLOW_TOKEN }}" | gh auth login --with-token
gh release upload "${VERSION}" *.whl *.sha256sum *.asc
build_cedarling_python_musl:
if: github.repository == 'JanssenProject/jans'
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@a4aa98b93cab29d9b1101a6143fb8bce00e2eac4 # v2.7.1
with:
egress-policy: audit

- name: Checkout
uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
- name: Import GPG key
id: import_gpg
continue-on-error: true
uses: crazy-max/ghaction-import-gpg@01dd5d3ca463c7f10f7f4f7b4f177225ac661ee4 # v6.1.0
with:
gpg_private_key: ${{ secrets.MOAUTO_GPG_PRIVATE_KEY }}
passphrase: ${{ secrets.MOAUTO_GPG_PRIVATE_KEY_PASSPHRASE }}
git_user_signingkey: true
git_commit_gpgsign: true

- uses: actions/setup-python@v5
- uses: PyO3/maturin-action@v1
with:
working-directory: ${{ github.workspace }}/jans-cedarling/bindings/cedarling_python
manylinux: musllinux_1_2
command: build
args: --release -i python3.10 python3.11

- name: Generate sha256sum and sign
id: sign-cedarling
run: |
TAG=$(echo ${{ github.event.ref }} | cut -d '/' -f 3 | sed 's/^v//')
VERSION="$(echo ${{ github.event.ref }} | cut -d '/' -f 3)"
if [ "${TAG}" == "nightly" ]; then
VERSION=nightly
TAG="0.0.0"
fi
cd ${{ github.workspace }}/jans-cedarling/target/wheels
sha256sum cedarling_python-"${TAG}"-cp311-cp311-musllinux_1_2_x86_64.whl > cedarling_python-"${TAG}"-cp311-cp311-musllinux_1_2_x86_64.whl.sha256sum
sha256sum cedarling_python-"${TAG}"-cp310-cp310-musllinux_1_2_x86_64.whl > cedarling_python-"${TAG}"-cp310-cp310-musllinux_1_2_x86_64.whl.sha256sum
gpg --armor --detach-sign cedarling_python-"${TAG}"-cp311-cp311-musllinux_1_2_x86_64.whl || echo "Failed to sign"
gpg --armor --detach-sign cedarling_python-"${TAG}"-cp310-cp310-musllinux_1_2_x86_64.whl || echo "Failed to sign"
echo "${{ secrets.MOAUTO_WORKFLOW_TOKEN }}" | gh auth login --with-token
gh release upload "${VERSION}" *.whl *.sha256sum *.asc
gh release upload "${VERSION}" *.whl *.sha256sum *.asc
2 changes: 1 addition & 1 deletion .github/workflows/test-microk8s.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ on:
jans_version:
description: 'Janssen helm chart version'
required: true
default: '1.2.0'
default: '0.0.0-nightly'
permissions:
contents: read

Expand Down
2 changes: 1 addition & 1 deletion agama/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
<groupId>io.jans</groupId>
<artifactId>agama</artifactId>
<packaging>pom</packaging>
<version>1.2.0</version>
<version>0.0.0-nightly</version>
<name>agama parent</name>

<prerequisites>
Expand Down
2 changes: 1 addition & 1 deletion agama/transpiler/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
<parent>
<groupId>io.jans</groupId>
<artifactId>agama</artifactId>
<version>1.2.0</version>
<version>0.0.0-nightly</version>
</parent>

<properties>
Expand Down
6 changes: 3 additions & 3 deletions charts/janssen-all-in-one/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,14 +3,14 @@ annotations:
artifacthub.io/containsSecurityUpdates: 'true'
artifacthub.io/images: |
- name: all-in-one
image: ghcr.io/janssenproject/jans/all-in-one:1.2.0-1
image: ghcr.io/janssenproject/jans/all-in-one:0.0.0-nightly
artifacthub.io/license: Apache-2.0
artifacthub.io/prerelease: 'true'
catalog.cattle.io/certified: partner
catalog.cattle.io/release-name: janssen-all-in-one
catalog.cattle.io/display-name: Janssen Cloud Identity and Access Management All-in-One
apiVersion: v2
appVersion: "1.2.0"
appVersion: "0.0.0-nightly"
icon: >-
https://raw.githubusercontent.com/JanssenProject/jans/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png
home: https://jans.io
Expand All @@ -22,4 +22,4 @@ maintainers:
email: [email protected]
description: Janssen Access and Identity Management All-in-One Chart. This chart deploys the selected janssen microservice all in one deployment.
name: janssen-all-in-one
version: 1.2.0
version: 0.0.0-nightly
12 changes: 6 additions & 6 deletions charts/janssen-all-in-one/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# janssen-all-in-one

![Version: 1.2.0](https://img.shields.io/badge/Version-1.2.0-informational?style=flat-square) ![AppVersion: 1.2.0](https://img.shields.io/badge/AppVersion-1.2.0-informational?style=flat-square)
![Version: 0.0.0-nightly](https://img.shields.io/badge/Version-0.0.0--nightly-informational?style=flat-square) ![AppVersion: 0.0.0-nightly](https://img.shields.io/badge/AppVersion-0.0.0--nightly-informational?style=flat-square)

Janssen Access and Identity Management All-in-One Chart. This chart deploys the selected janssen microservice all in one deployment.

Expand Down Expand Up @@ -30,7 +30,7 @@ Kubernetes: `>=v1.22.0-0`
| adminPassword | string | `"Test1234#"` | Admin password to log in to the UI. |
| alb.ingress | bool | `false` | switches the service to Nodeport for ALB ingress |
| auth-server | object | `{"appLoggers":{"auditStatsLogLevel":"INFO","auditStatsLogTarget":"FILE","authLogLevel":"INFO","authLogTarget":"STDOUT","enableStdoutLogPrefix":"true","httpLogLevel":"INFO","httpLogTarget":"FILE","persistenceDurationLogLevel":"INFO","persistenceDurationLogTarget":"FILE","persistenceLogLevel":"INFO","persistenceLogTarget":"FILE","scriptLogLevel":"INFO","scriptLogTarget":"FILE"},"authEncKeys":"RSA1_5 RSA-OAEP","authSigKeys":"RS256 RS384 RS512 ES256 ES384 ES512 PS256 PS384 PS512","enabled":true,"ingress":{"authServerAdditionalAnnotations":{},"authServerEnabled":true,"authServerLabels":{},"authzenAdditionalAnnotations":{},"authzenConfigEnabled":true,"authzenConfigLabels":{},"deviceCodeAdditionalAnnotations":{},"deviceCodeEnabled":true,"deviceCodeLabels":{},"firebaseMessagingAdditionalAnnotations":{},"firebaseMessagingEnabled":true,"firebaseMessagingLabels":{},"lockAdditionalAnnotations":{},"lockConfigAdditionalAnnotations":{},"lockConfigEnabled":false,"lockConfigLabels":{},"lockEnabled":false,"lockLabels":{},"openidAdditionalAnnotations":{},"openidConfigEnabled":true,"openidConfigLabels":{},"u2fAdditionalAnnotations":{},"u2fConfigEnabled":true,"u2fConfigLabels":{},"uma2AdditionalAnnotations":{},"uma2ConfigEnabled":true,"uma2ConfigLabels":{},"webdiscoveryAdditionalAnnotations":{},"webdiscoveryEnabled":true,"webdiscoveryLabels":{},"webfingerAdditionalAnnotations":{},"webfingerEnabled":true,"webfingerLabels":{}},"lockEnabled":false}` | Parameters used globally across all services helm charts. |
| auth-server-key-rotation | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","enabled":true,"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/certmanager","tag":"1.2.0-1"},"initKeysLife":48,"keysLife":48,"keysPushDelay":0,"keysPushStrategy":"NEWER","keysStrategy":"NEWER","lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for regenerating auth-keys per x hours |
| auth-server-key-rotation | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","enabled":true,"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/certmanager","tag":"0.0.0-nightly"},"initKeysLife":48,"keysLife":48,"keysPushDelay":0,"keysPushStrategy":"NEWER","keysStrategy":"NEWER","lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for regenerating auth-keys per x hours |
| auth-server-key-rotation.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} |
| auth-server-key-rotation.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} |
| auth-server-key-rotation.customCommand | list | `[]` | Add custom jobs's command. If passed, it will override the default conditional command. |
Expand All @@ -41,7 +41,7 @@ Kubernetes: `>=v1.22.0-0`
| auth-server-key-rotation.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
| auth-server-key-rotation.image.pullSecrets | list | `[]` | Image Pull Secrets |
| auth-server-key-rotation.image.repository | string | `"ghcr.io/janssenproject/jans/certmanager"` | Image to use for deploying. |
| auth-server-key-rotation.image.tag | string | `"1.2.0-1"` | Image tag to use for deploying. |
| auth-server-key-rotation.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. |
| auth-server-key-rotation.initKeysLife | int | `48` | The initial auth server key rotation keys life in hours |
| auth-server-key-rotation.keysLife | int | `48` | Auth server key rotation keys life in hours |
| auth-server-key-rotation.keysPushDelay | int | `0` | Delay (in seconds) before pushing private keys to Auth server |
Expand Down Expand Up @@ -262,7 +262,7 @@ Kubernetes: `>=v1.22.0-0`
| image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
| image.pullSecrets | list | `[]` | Image Pull Secrets |
| image.repository | string | `"ghcr.io/janssenproject/jans/all-in-one"` | Image to use for deploying. |
| image.tag | string | `"1.2.0-1"` | Image tag to use for deploying. |
| image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. |
| isFqdnRegistered | bool | `false` | Boolean flag to enable mapping lbIp to fqdn inside pods on clouds that provide static ip for load balancers. On cloud that provide only addresses to the LB this flag will enable a script to actively scan config.configmap.lbAddr and update the hosts file inside the pods automatically. |
| istio.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} |
| istio.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} |
Expand All @@ -271,7 +271,7 @@ Kubernetes: `>=v1.22.0-0`
| istio.ingress | bool | `false` | Boolean flag that enables using istio gateway for Janssen. This assumes istio ingress is installed and hence the LB is available. |
| istio.namespace | string | `"istio-system"` | The namespace istio is deployed in. The is normally istio-system. |
| istio.tlsSecretName | string | `"istio-tls-certificate"` | |
| kc-scheduler | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","enabled":false,"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/kc-scheduler","tag":"1.2.0-1"},"interval":10,"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for synchronizing Keycloak SAML clients |
| kc-scheduler | object | `{"additionalAnnotations":{},"additionalLabels":{},"customCommand":[],"customScripts":[],"dnsConfig":{},"dnsPolicy":"","enabled":false,"image":{"pullPolicy":"IfNotPresent","pullSecrets":[],"repository":"ghcr.io/janssenproject/jans/kc-scheduler","tag":"0.0.0-nightly"},"interval":10,"lifecycle":{},"resources":{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}},"usrEnvs":{"normal":{},"secret":{}},"volumeMounts":[],"volumes":[]}` | Responsible for synchronizing Keycloak SAML clients |
| kc-scheduler.additionalAnnotations | object | `{}` | Additional annotations that will be added across the gateway in the format of {cert-manager.io/issuer: "letsencrypt-prod"} |
| kc-scheduler.additionalLabels | object | `{}` | Additional labels that will be added across the gateway in the format of {mylabel: "myapp"} |
| kc-scheduler.customCommand | list | `[]` | Add custom job's command. If passed, it will override the default conditional command. |
Expand All @@ -282,7 +282,7 @@ Kubernetes: `>=v1.22.0-0`
| kc-scheduler.image.pullPolicy | string | `"IfNotPresent"` | Image pullPolicy to use for deploying. |
| kc-scheduler.image.pullSecrets | list | `[]` | Image Pull Secrets |
| kc-scheduler.image.repository | string | `"ghcr.io/janssenproject/jans/kc-scheduler"` | Image to use for deploying. |
| kc-scheduler.image.tag | string | `"1.2.0-1"` | Image tag to use for deploying. |
| kc-scheduler.image.tag | string | `"0.0.0-nightly"` | Image tag to use for deploying. |
| kc-scheduler.interval | int | `10` | Interval of running the scheduler (in minutes) |
| kc-scheduler.resources | object | `{"limits":{"cpu":"300m","memory":"300Mi"},"requests":{"cpu":"300m","memory":"300Mi"}}` | Resource specs. |
| kc-scheduler.resources.limits.cpu | string | `"300m"` | CPU limit. |
Expand Down
6 changes: 3 additions & 3 deletions charts/janssen-all-in-one/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -300,7 +300,7 @@ auth-server-key-rotation:
# -- Image to use for deploying.
repository: ghcr.io/janssenproject/jans/certmanager
# -- Image tag to use for deploying.
tag: 1.2.0-1
tag: 0.0.0-nightly
# -- Image Pull Secrets
pullSecrets: [ ]
# -- Auth server key rotation keys life in hours
Expand Down Expand Up @@ -681,7 +681,7 @@ image:
# -- Image to use for deploying.
repository: ghcr.io/janssenproject/jans/all-in-one
# -- Image tag to use for deploying.
tag: 1.2.0-1
tag: 0.0.0-nightly
# -- Image Pull Secrets
pullSecrets: [ ]
# -- Service replica number.
Expand Down Expand Up @@ -761,7 +761,7 @@ kc-scheduler:
# -- Image to use for deploying.
repository: ghcr.io/janssenproject/jans/kc-scheduler
# -- Image tag to use for deploying.
tag: 1.2.0-1
tag: 0.0.0-nightly
# -- Image Pull Secrets
pullSecrets: [ ]
# -- Resource specs.
Expand Down
54 changes: 27 additions & 27 deletions charts/janssen/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,34 +3,34 @@ annotations:
artifacthub.io/containsSecurityUpdates: 'true'
artifacthub.io/images: |
- name: auth-server
image: ghcr.io/janssenproject/jans/auth-server:1.2.0-1
image: ghcr.io/janssenproject/jans/auth-server:0.0.0-nightly
- name: auth-server-key-rotation
image: ghcr.io/janssenproject/jans/certmanager:1.2.0-1
image: ghcr.io/janssenproject/jans/certmanager:0.0.0-nightly
- name: configuration-manager
image: ghcr.io/janssenproject/jans/configurator:1.2.0-1
image: ghcr.io/janssenproject/jans/configurator:0.0.0-nightly
- name: config-api
image: ghcr.io/janssenproject/jans/config-api:1.2.0-1
image: ghcr.io/janssenproject/jans/config-api:0.0.0-nightly
- name: fido2
image: ghcr.io/janssenproject/jans/fido2:1.2.0-1
image: ghcr.io/janssenproject/jans/fido2:0.0.0-nightly
- name: persistence
image: ghcr.io/janssenproject/jans/persistence-loader:1.2.0-1
image: ghcr.io/janssenproject/jans/persistence-loader:0.0.0-nightly
- name: casa
image: ghcr.io/janssenproject/jans/casa:1.2.0-1
image: ghcr.io/janssenproject/jans/casa:0.0.0-nightly
- name: scim
image: ghcr.io/janssenproject/jans/scim:1.2.0-1
image: ghcr.io/janssenproject/jans/scim:0.0.0-nightly
- name: link
image: ghcr.io/janssenproject/jans/link:1.2.0-1
image: ghcr.io/janssenproject/jans/link:0.0.0-nightly
- name: saml
image: ghcr.io/janssenproject/jans/saml:1.2.0-1
image: ghcr.io/janssenproject/jans/saml:0.0.0-nightly
- name: kc-scheduler
image: ghcr.io/janssenproject/jans/kc-scheduler:1.2.0-1
image: ghcr.io/janssenproject/jans/kc-scheduler:0.0.0-nightly
artifacthub.io/license: Apache-2.0
artifacthub.io/prerelease: 'false'
artifacthub.io/prerelease: 'true'
catalog.cattle.io/certified: partner
catalog.cattle.io/release-name: janssen
catalog.cattle.io/display-name: Janssen Cloud Identity and Access Management Microservices
apiVersion: v2
appVersion: "1.2.0"
appVersion: "0.0.0-nightly"
icon: >-
https://raw.githubusercontent.com/JanssenProject/jans/main/docs/assets/logo/janssen_project_favicon_transparent_50px_50px.png
home: https://jans.io
Expand All @@ -42,56 +42,56 @@ maintainers:
email: [email protected]
description: Janssen Access and Identity Management Microservices Chart. This chart deploys each janssen microservice as a separate deployment.
name: janssen
version: 1.2.0
version: 0.0.0-nightly
dependencies:
- name: casa
version: 1.2.0
version: 0.0.0-nightly
condition: global.casa.enabled

- name: config
condition: global.config.enabled
version: 1.2.0
version: 0.0.0-nightly

- name: config-api
condition: global.config-api.enabled
version: 1.2.0
version: 0.0.0-nightly

- name: auth-server
condition: global.auth-server.enabled
version: 1.2.0
version: 0.0.0-nightly

- name: fido2
condition: global.fido2.enabled
version: 1.2.0
version: 0.0.0-nightly

- name: scim
condition: global.scim.enabled
version: 1.2.0
version: 0.0.0-nightly

- name: nginx-ingress
condition: global.nginx-ingress.enabled
version: 1.2.0
version: 0.0.0-nightly

- name: auth-server-key-rotation
condition: global.auth-server-key-rotation.enabled
version: 1.2.0
version: 0.0.0-nightly

- name: persistence
condition: global.persistence.enabled
version: 1.2.0
version: 0.0.0-nightly

- name: link
condition: global.link.enabled
version: 1.2.0
version: 0.0.0-nightly

- name: saml
condition: global.saml.enabled
version: 1.2.0
version: 0.0.0-nightly

- name: cn-istio-ingress
condition: global.istio.ingress
version: 1.2.0
version: 0.0.0-nightly

- name: kc-scheduler
condition: global.kc-scheduler.enabled
version: 1.2.0
version: 0.0.0-nightly
Loading

0 comments on commit ef085e6

Please sign in to comment.