Skip to content
Snippets Groups Projects

Compare revisions

Changes are shown as if the source revision was being merged into the target revision. Learn more about comparing revisions.

Source

Select target project
No results found

Target

Select target project
  • to-be-continuous/docker
  • jkowalczyk/docker
  • davidblaisonneau-orange/docker
  • ggwena/docker
  • mathieu.chauvin/docker
  • kiliandeca/docker
  • christophe_mathias/docker
  • clem69.b/docker
  • scrocquesel/docker
  • beber80/docker
  • abousselmi/docker
  • crosson.david/docker
  • clement.bois/docker
  • contrib-tbc/docker
  • bfourtanier/docker
  • kiranpatel11/tbc-docker
  • zbozzo/docker
  • sjdrc/docker
  • another15y/to-be-continuous/docker
  • miguel.pajarin/docker
  • svalabs/tbc/docker
  • marco.gilles.ext/to-be-continuous-docker
  • kobanator/docker
  • rmoreas/docker
  • cornelius.keller/docker
  • ORich1/docker
  • xavier.francois/docker
  • u631131/docker
  • csautter/to-be-continuous-docker
  • kilianpaquier/to-be-continuous-docker
  • mikeschnaufer/tbc-docker-fork
  • marconacken/docker
  • roadSurfer/tbc-docker
  • babson4/docker
  • anoopvlcy/docker
  • pytgaen-group/docker
  • abdelmonim/docker
  • adaptavist/to-be-continuous/docker
  • another15y/tbc/docker
  • l61524121/docker
  • shared6245818/tbc/docker
  • cedric3.olivier/docker
  • Drakorgaur/docker
  • espada-edalex/to-be-continuous-docker
  • yodadado/docker
45 results
Show changes
Commits on Source (6)
......@@ -12,7 +12,7 @@ include:
ref: '3.2'
file: 'templates/gitlab-ci-bash.yml'
- project: 'to-be-continuous/semantic-release'
ref: '3.4'
ref: '3.5'
file: '/templates/gitlab-ci-semrel.yml'
stages:
......
# [5.3.0](https://gitlab.com/to-be-continuous/docker/compare/5.2.2...5.3.0) (2023-08-28)
### Features
* **oidc:** OIDC authentication support now requires explicit configuration(see doc) ([521f918](https://gitlab.com/to-be-continuous/docker/commit/521f918b9f8fab2d23a021211bbdbfacff152c08))
## [5.2.2](https://gitlab.com/to-be-continuous/docker/compare/5.2.1...5.2.2) (2023-07-25)
......
......@@ -9,7 +9,7 @@ In order to include this template in your project, add the following to your `.g
```yaml
include:
- project: 'to-be-continuous/docker'
ref: '5.2.2'
ref: '5.3.0'
file: '/templates/gitlab-ci-docker.yml'
```
......@@ -473,7 +473,7 @@ Here is a `.gitlab-ci.yaml` using an external Docker registry:
```yaml
include:
- project: 'to-be-continuous/docker'
ref: '5.2.2'
ref: '5.3.0'
file: '/templates/gitlab-ci-docker.yml'
variables:
......@@ -491,7 +491,7 @@ Here is a `.gitlab-ci.yaml` that builds 2 Docker images from the same project (u
```yaml
include:
- project: 'to-be-continuous/docker'
ref: '5.2.2'
ref: '5.3.0'
file: '/templates/gitlab-ci-docker.yml'
variables:
......@@ -524,6 +524,7 @@ In order to be able to communicate with the Vault server, the variant requires t
| ----------------- | -------------------------------------- | ----------------- |
| `TBC_VAULT_IMAGE` | The [Vault Secrets Provider](https://gitlab.com/to-be-continuous/tools/vault-secrets-provider) image to use (can be overridden) | `$CI_REGISTRY/to-be-continuous/tools/vault-secrets-provider:master` |
| `VAULT_BASE_URL` | The Vault server base API url | _none_ |
| `VAULT_OIDC_AUD` | The `aud` claim for the JWT | `$CI_SERVER_URL` |
| :lock: `VAULT_ROLE_ID` | The [AppRole](https://www.vaultproject.io/docs/auth/approle) RoleID | **must be defined** |
| :lock: `VAULT_SECRET_ID` | The [AppRole](https://www.vaultproject.io/docs/auth/approle) SecretID | **must be defined** |
......@@ -548,14 +549,16 @@ With:
include:
# main template
- project: 'to-be-continuous/docker'
ref: '5.2.2'
ref: '5.3.0'
file: '/templates/gitlab-ci-docker.yml'
# Vault variant
- project: 'to-be-continuous/docker'
ref: '5.2.2'
ref: '5.3.0'
file: '/templates/gitlab-ci-docker-vault.yml'
variables:
# audience claim for JWT
VAULT_OIDC_AUD: "https://vault.acme.host"
# Secrets managed by Vault
DOCKER_REGISTRY_SNAPSHOT_USER: "@url@http://vault-secrets-provider/api/secrets/b7ecb6ebabc231/artifactory/snapshot/credentials?field=user"
DOCKER_REGISTRY_SNAPSHOT_PASSWORD: "@url@http://vault-secrets-provider/api/secrets/b7ecb6ebabc231/artifactory/snapshot/credentials?field=token"
......
......@@ -10,6 +10,12 @@
"gitlab-tags"
],
"versioning": "docker"
},
{
"matchPackagePatterns": ["to-be-continuous/*"],
"automerge": true,
"automergeType": "pr",
"platformAutomerge": true
}
]
}
......@@ -2,15 +2,22 @@
# === GCP Auth template variant
# =====================================================================================================================
variables:
TBC_GCP_AUTH_PROVIDER: "$CI_REGISTRY/to-be-continuous/tools/gcp-auth-provider:main"
CI_JOB_JWT_V2: $CI_JOB_JWT_V2 # For the gitlab runner authentication in TBC_GCP_AUTH_PROVIDER
DOCKER_REGISTRY_SNAPSHOT_USER: oauth2accesstoken
DOCKER_REGISTRY_RELEASE_USER: oauth2accesstoken
DOCKER_REGISTRY_SNAPSHOT_PASSWORD: '@url@http://gcp-auth-provider/token?envType=snapshot'
DOCKER_REGISTRY_RELEASE_PASSWORD: '@url@http://gcp-auth-provider/token?envType=release'
TBC_GCP_AUTH_PROVIDER: "$CI_REGISTRY/to-be-continuous/tools/gcp-auth-provider:main"
GCP_OIDC_AUD: "$CI_SERVER_URL"
.docker-base:
services:
- name: "$TBC_TRACKING_IMAGE"
command: ["--service", "docker", "5.2.2"]
command: ["--service", "docker", "5.3.0"]
- name: "$TBC_GCP_AUTH_PROVIDER"
alias: "gcp-auth-provider"
variables:
# have to be explicitly declared in the YAML to be exported to the service
GCP_JWT: $GCP_JWT
DOCKER_REGISTRY_SNAPSHOT_USER: oauth2accesstoken
DOCKER_REGISTRY_RELEASE_USER: oauth2accesstoken
DOCKER_REGISTRY_SNAPSHOT_PASSWORD: '@url@http://gcp-auth-provider/token?envType=snapshot'
DOCKER_REGISTRY_RELEASE_PASSWORD: '@url@http://gcp-auth-provider/token?envType=release'
id_tokens:
GCP_JWT:
aud: "$GCP_OIDC_AUD"
......@@ -7,10 +7,16 @@ variables:
# variables have to be explicitly declared in the YAML to be exported to the service
VAULT_ROLE_ID: "$VAULT_ROLE_ID"
VAULT_SECRET_ID: "$VAULT_SECRET_ID"
VAULT_OIDC_AUD: "$CI_SERVER_URL"
.docker-base:
services:
- name: "$TBC_TRACKING_IMAGE"
command: ["--service", "docker", "5.2.2"]
command: ["--service", "docker", "5.3.0"]
- name: "$TBC_VAULT_IMAGE"
alias: "vault-secrets-provider"
variables:
VAULT_JWT_TOKEN: "$VAULT_JWT_TOKEN"
id_tokens:
VAULT_JWT_TOKEN:
aud: "$VAULT_OIDC_AUD"
......@@ -447,7 +447,7 @@ stages:
.docker-base:
services:
- name: "$TBC_TRACKING_IMAGE"
command: ["--service", "docker", "5.2.2"]
command: ["--service", "docker", "5.3.0"]
before_script:
- *docker-scripts
......@@ -476,7 +476,7 @@ stages:
_TRACE: "${TRACE}"
services:
- name: "$TBC_TRACKING_IMAGE"
command: ["--service", "docker", "5.2.2"]
command: ["--service", "docker", "5.3.0"]
- name: $DOCKER_DIND_IMAGE
alias: docker
command:
......