File tree Expand file tree Collapse file tree 4 files changed +10
-10
lines changed Expand file tree Collapse file tree 4 files changed +10
-10
lines changed Original file line number Diff line number Diff line change 1
1
#! /bin/bash
2
2
set -o errexit -o nounset -o pipefail
3
3
4
- kubectl -n rhtap get secret rhtap -github-integration -o json | jq --raw-output '
4
+ kubectl -n rhtap get secret tssc -github-integration -o json | jq --raw-output '
5
5
.data |
6
6
{
7
7
GITHUB__APP__ID: .id,
Original file line number Diff line number Diff line change @@ -7,16 +7,16 @@ set -o errexit -o nounset -o pipefail
7
7
# - Set the generated env vars before running the promotion pipeline
8
8
# - e.g. with `eval "$(hack/get-trustification-env.sh)"`
9
9
10
- TPA_NAMESPACE=${TPA_NAMESPACE:- ' rhtap -tpa' }
11
- KEYCLOAK_NAMESPACE=${KEYCLOAK_NAMESPACE:- ' rhtap -keycloak' }
10
+ TPA_NAMESPACE=${TPA_NAMESPACE:- ' tssc -tpa' }
11
+ KEYCLOAK_NAMESPACE=${KEYCLOAK_NAMESPACE:- ' tssc -keycloak' }
12
12
13
13
declare -A trustification_env
14
14
15
15
trustification_env=(
16
16
[BOMBASTIC_API_URL]=" https://$( oc -n " $TPA_NAMESPACE " get route --selector app.kubernetes.io/name=bombastic-api -o jsonpath=' {.items[].spec.host}' ) "
17
17
[OIDC_ISSUER_URL]=" https://$( oc -n " $KEYCLOAK_NAMESPACE " get route --selector app=keycloak -o jsonpath=' {.items[].spec.host}' ) /realms/chicken"
18
18
[OIDC_CLIENT_ID]=walker
19
- [OIDC_CLIENT_SECRET]=$( oc -n rhtap -tpa get secret tpa-realm-chicken-clients -o go-template=' {{.data.walker | base64decode}}' )
19
+ [OIDC_CLIENT_SECRET]=$( oc -n tssc -tpa get secret tpa-realm-chicken-clients -o go-template=' {{.data.walker | base64decode}}' )
20
20
[SUPPORTED_CYCLONEDX_VERSION]=1.4
21
21
)
22
22
Original file line number Diff line number Diff line change 4
4
echo " Checking for REKOR and TUF"
5
5
6
6
# get hosts, if errors occur or cannot find routes, set to none
7
- RT=$( oc get routes -n rhtap -tas -o name 2> /dev/null | grep rekor-server)
7
+ RT=$( oc get routes -n tssc -tas -o name 2> /dev/null | grep rekor-server)
8
8
if [[ $RT == " " ]]; then
9
9
export REKOR_HOST=' '
10
10
export IGNORE_REKOR=true
11
11
else
12
- HOST=$( oc get -n rhtap -tas $RT -o jsonpath={.spec.host})
12
+ HOST=$( oc get -n tssc -tas $RT -o jsonpath={.spec.host})
13
13
export REKOR_HOST=https://$HOST
14
14
export IGNORE_REKOR=false
15
15
fi
16
16
17
- RT=$( oc get routes -n rhtap -tas -o name 2> /dev/null | grep tuf)
17
+ RT=$( oc get routes -n tssc -tas -o name 2> /dev/null | grep tuf)
18
18
if [[ $RT == " " ]]; then
19
19
export TUF_MIRROR=' '
20
20
else
21
- HOST=$( oc get -n rhtap -tas $RT -o jsonpath={.spec.host})
21
+ HOST=$( oc get -n tssc -tas $RT -o jsonpath={.spec.host})
22
22
export TUF_MIRROR=https://$HOST
23
23
fi
24
24
Original file line number Diff line number Diff line change @@ -41,13 +41,13 @@ export TARGET_BRANCH=${TARGET_BRANCH-""}
41
41
# enterprise contract
42
42
export POLICY_CONFIGURATION=${POLICY_CONFIGURATION-" github.com/enterprise-contract/config//rhtap-v0.6" }
43
43
# internal, assumes jenkins is local openshift
44
- export REKOR_HOST=${REKOR_HOST-http:// rekor-server.rhtap -tas.svc}
44
+ export REKOR_HOST=${REKOR_HOST-http:// rekor-server.tssc -tas.svc}
45
45
export IGNORE_REKOR=${IGNORE_REKOR-false}
46
46
export INFO=${INFO-true}
47
47
export STRICT=${STRICT-true}
48
48
export EFFECTIVE_TIME=${EFFECTIVE_TIME-now}
49
49
export HOMEDIR=${HOMEDIR-$(pwd)}
50
- export TUF_MIRROR=${TUF_MIRROR-http:// tuf.rhtap -tas.svc}
50
+ export TUF_MIRROR=${TUF_MIRROR-http:// tuf.tssc -tas.svc}
51
51
52
52
# Allow PR to succeed even if TAS vars not configured
53
53
export FAIL_IF_TRUSTIFICATION_NOT_CONFIGURED=false
You can’t perform that action at this time.
0 commit comments