ci: remove git-crypt, switch to sops

Signed-off-by: Andrea Luzzardi <aluzzardi@gmail.com>
This commit is contained in:
Andrea Luzzardi 2021-03-18 15:30:00 -07:00
parent 56ea7e3991
commit 87d576e936
5 changed files with 28 additions and 33 deletions

3
.gitattributes vendored
View File

@ -1,3 +0,0 @@
*.secret filter=git-crypt diff=git-crypt
*.key filter=git-crypt diff=git-crypt
*.secret.* filter=git-crypt diff=git-crypt

View File

@ -14,26 +14,31 @@ jobs:
- name: Check out - name: Check out
uses: actions/checkout@v2 uses: actions/checkout@v2
- name: Set up Go
uses: actions/setup-go@v1
with:
go-version: 1.16
- name: Install Dependencies - name: Install Dependencies
run: | run: |
sudo apt-get update # Cue
sudo apt-get install -y --no-install-recommends shellcheck git-crypt
export CUE_VERSION="$(grep cue ./go.mod | cut -d' ' -f2)" export CUE_VERSION="$(grep cue ./go.mod | cut -d' ' -f2)"
export CUE_TARBALL="cue_${CUE_VERSION}_linux_amd64.tar.gz" export CUE_TARBALL="cue_${CUE_VERSION}_linux_amd64.tar.gz"
echo "Installing cue version $CUE_VERSION" echo "Installing cue version $CUE_VERSION"
curl -sfL https://install.goreleaser.com/github.com/golangci/golangci-lint.sh | sudo sh -s -- -b /usr/local/bin v1.23.8
curl -L https://github.com/cuelang/cue/releases/download/${CUE_VERSION}/${CUE_TARBALL} | sudo tar zxf - -C /usr/local/bin curl -L https://github.com/cuelang/cue/releases/download/${CUE_VERSION}/${CUE_TARBALL} | sudo tar zxf - -C /usr/local/bin
- name: Unlock secrets # SOPS
sudo curl -L -o /usr/local/bin/sops https://github.com/mozilla/sops/releases/download/v3.6.1/sops-v3.6.1.linux
sudo chmod +x /usr/local/bin/sops
# golangci
curl -sfL https://install.goreleaser.com/github.com/golangci/golangci-lint.sh | sudo sh -s -- -b /usr/local/bin v1.23.8
- name: Import PGP private key
env: env:
GIT_CRYPT_KEY: ${{ secrets.GIT_CRYPT_KEY }} SOPS_PGP_KEY: ${{ secrets.SOPS_PGP_KEY }}
run: | run: |
echo "$GIT_CRYPT_KEY" | base64 -d > /tmp/git-crypt-key echo "$SOPS_PGP_KEY" | base64 -d | gpg --import
git-crypt unlock /tmp/git-crypt-key
rm -f /tmp/git-crypt-key
- name: Login to Docker Hub - name: Login to Docker Hub
uses: docker/login-action@v1 uses: docker/login-action@v1
@ -41,12 +46,6 @@ jobs:
username: ${{ secrets.DOCKERHUB_USERNAME }} username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }} password: ${{ secrets.DOCKERHUB_TOKEN }}
- name: Set up Go
uses: actions/setup-go@v1
with:
go-version: 1.16
id: go
- name: Lint - name: Lint
run: | run: |
make lint make lint

View File

@ -127,14 +127,18 @@ test::one(){
return "$ret" return "$ret"
} }
# Similar to test::one, however tests will be skipped if secrets cannot be decrypted
test::secret(){
local inputFile="$1"
shift
if sops exec-file "$inputFile" echo > /dev/null 2>&1; then
test::one "$@" --input-yaml "$inputFile"
else
logger::warning "Skip \"$1\": secrets not available"
fi
}
disable(){ disable(){
logger::warning "Test \"$2\" has been disabled." logger::warning "Test \"$2\" has been disabled."
} }
secret(){
if [ -z "${DAGGER_SECRETS_LOADED+x}" ] || [ "$DAGGER_SECRETS_LOADED" != "1" ]; then
logger::warning "Skip \"$2\": secrets not available"
else
"$@"
fi
}

Binary file not shown.

View File

@ -6,11 +6,6 @@ readonly d=$(cd "$(dirname "${BASH_SOURCE[0]:-$PWD}")" 2>/dev/null 1>&2 && pwd)
# shellcheck source=/dev/null # shellcheck source=/dev/null
. "$d/test-lib.sh" . "$d/test-lib.sh"
# shellcheck source=/dev/null
if grep -q "DAGGER_SECRETS" "$d/test.secret"; then
source "$d/test.secret"
fi
# Point this to your dagger binary # Point this to your dagger binary
readonly DAGGER_BINARY="${DAGGER_BINARY:-$d/../cmd/dagger/dagger}" readonly DAGGER_BINARY="${DAGGER_BINARY:-$d/../cmd/dagger/dagger}"
# The default arguments are a no-op, but having "anything" is a little cheat necessary for "${DAGGER_BINARY_ARGS[@]}" to not be empty down there # The default arguments are a no-op, but having "anything" is a little cheat necessary for "${DAGGER_BINARY_ARGS[@]}" to not be empty down there