|
1 | 1 | package:
|
2 | 2 | name: cert-manager-webhook-pdns
|
3 | 3 | version: "2.5.2"
|
4 |
| - epoch: 7 |
| 4 | + epoch: 8 |
5 | 5 | description: A PowerDNS webhook for cert-manager
|
6 | 6 | copyright:
|
7 | 7 | - license: MIT
|
@@ -38,11 +38,46 @@ update:
|
38 | 38 | ignore-regex-patterns:
|
39 | 39 | - 'cert-manager-webhook-pdns-'
|
40 | 40 |
|
41 |
| -# https://github.com/zachomedia/cert-manager-webhook-pdns/blob/bf4d525dca7345538aaad8840f6315a73c27f38b/README.md?plain=1#L45 |
42 | 41 | test:
|
43 | 42 | environment:
|
44 | 43 | environment:
|
45 | 44 | GROUP_NAME: "acme.zacharyseguin.ca"
|
| 45 | + KUBERNETES_SERVICE_HOST: "127.0.0.1" |
| 46 | + KUBERNETES_SERVICE_PORT: 32764 |
| 47 | + contents: |
| 48 | + packages: |
| 49 | + - mkcert |
46 | 50 | pipeline:
|
| 51 | + - uses: test/kwok/cluster |
47 | 52 | - runs: |
|
48 |
| - webhook -h |
| 53 | + # wait until you have a serviceaccount default |
| 54 | + while ! kubectl get serviceaccount default -n kube-system; do |
| 55 | + echo "Waiting for serviceaccount default in kube-system namespace..." |
| 56 | + sleep 1 |
| 57 | + done |
| 58 | + mkdir -p /var/run/secrets/kubernetes.io/serviceaccount |
| 59 | + kubectl create token default > /var/run/secrets/kubernetes.io/serviceaccount/token |
| 60 | + CA=$(kubectl config view --raw -o jsonpath='{.clusters[0].cluster.certificate-authority}') |
| 61 | + cp $CA /var/run/secrets/kubernetes.io/serviceaccount/ca.crt |
| 62 | +
|
| 63 | + kubectl create rolebinding default-get-configmap \ |
| 64 | + --clusterrole=view \ |
| 65 | + --serviceaccount=default:default \ |
| 66 | + --namespace=kube-system |
| 67 | +
|
| 68 | + mkcert example.com |
| 69 | + export CA_OTHER="$(cat ~/.local/share/mkcert/rootCA.pem)" |
| 70 | + kubectl create configmap extension-apiserver-authentication \ |
| 71 | + --from-literal=client-ca-file="$CA_OTHER" \ |
| 72 | + --from-literal=requestheader-client-ca-file="$CA_OTHER" \ |
| 73 | + -n kube-system \ |
| 74 | + --dry-run=client -o yaml | kubectl apply -f - |
| 75 | +
|
| 76 | + webhook > /tmp/webhook.log 2>&1 & |
| 77 | + sleep 5 |
| 78 | + if ! grep -q "Starting controller" /tmp/webhook.log; then |
| 79 | + echo "Webhook server did not start correctly" |
| 80 | + exit 1 |
| 81 | + fi |
| 82 | +
|
| 83 | + echo "Webhook server started successfully" |
0 commit comments