Compare commits

...

17 Commits

Author SHA1 Message Date
21c0bcfe77
adjust scanner
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2024-08-21 14:32:36 +02:00
343fc43db5 woodpecker script
Some checks failed
ci/woodpecker/push/woodpecker Pipeline failed
2024-08-20 19:04:41 +02:00
7d735c28ee stage 2024-08-20 14:55:03 +02:00
cabe27b484 indent 2024-08-20 14:50:54 +02:00
d30de63aa4 ci script 2024-08-20 14:46:35 +02:00
009ddcc734 add gitlabreleaseuploader.py here 2024-08-20 14:39:22 +02:00
5fa49204dc
still nothing 2021-09-30 15:02:23 +02:00
Hottgenroth
14ebc02a0c nothing 2021-09-30 15:00:28 +02:00
7368b1d9aa add cheetah 2021-08-02 17:31:11 +02:00
8849562ef2 use python 3 2021-08-02 17:20:13 +02:00
1ed81f227a add jq here too 2021-05-26 11:28:08 +02:00
e4503589e2 add ca package 2021-03-11 12:18:24 +01:00
00e348a24c fix 2021-03-08 18:33:35 +01:00
17dd6d6718 new ci 2021-03-08 18:28:00 +01:00
964ad65e27 add doxygen and procps 2021-01-28 14:51:01 +01:00
9eee846ef9
new gitlab release tool 2021-01-13 18:18:48 +01:00
9117df9ad1 drop version file, add pip and xmltodict 2020-12-02 20:13:42 +01:00
9 changed files with 497 additions and 35 deletions

1
.gitignore vendored
View File

@ -1,2 +1,3 @@
*~
.*~
__pycache__/*

View File

@ -1,4 +1,21 @@
include:
- project: dockerized/commons
ref: master
file: gitlab-ci-template.yml
stages:
- build
variables:
NEXUS_REGISTRY: devnexus.krohne.com:18079/repository/docker-krohne
NEXUS_IMAGE_NAME: $NEXUS_REGISTRY/$CI_PROJECT_NAME
build:
image: docker:stable
stage: build
tags:
- bash
- linux
- docker
only:
- tags
script:
- docker build -t $NEXUS_IMAGE_NAME:${CI_COMMIT_TAG} .
- docker login $NEXUS_REGISTRY --username $NEXUS_USER --password $NEXUS_PASSWORD
- docker push $NEXUS_IMAGE_NAME:${CI_COMMIT_TAG}

23
.woodpecker.yml Normal file
View File

@ -0,0 +1,23 @@
steps:
build:
image: plugins/kaniko
settings:
repo: ${FORGE_NAME}/${CI_REPO}
registry:
from_secret: container_registry
tags: latest,${CI_COMMIT_SHA},${CI_COMMIT_TAG}
username:
from_secret: container_registry_username
password:
from_secret: container_registry_password
dockerfile: Dockerfile
when:
- event: [push, tag]
scan_image:
image: aquasec/trivy
commands:
- trivy image $FORGE_NAME/$CI_REPO:$CI_COMMIT_SHA --ignore-unfixed --quiet --exit-code 1
when:
- event: [push, tag]

View File

@ -1,36 +1,50 @@
FROM debian:buster
FROM debian:bookworm
LABEL Maintainer="Wolfgang Hottgenroth <woho@hottis.de>"
LABEL ImageName="registry.hottis.de/dockerized/base-build-env"
LABEL AlternativeImageName="wollud1969/base-build-env"
ARG RELEASETOOL_URL="https://home.hottis.de/gitlab/wolutator/gitlabreleaseuploader/uploads/f840b97a0eb64d1de2a6d6d1d4d1529e/GitlabReleaseTool.zip"
RUN \
apt-get update && \
apt-get install -y make && \
apt-get install -y openssh-client && \
apt-get install -y git && \
apt-get install -y python && \
apt-get install -y python-requests && \
apt-get install -y python-pycodestyle && \
apt-get install -y python-yaml && \
apt-get install -y gpg && \
apt-get install -y apt-transport-https && \
apt-get install -y wget && \
apt-get install -y curl && \
apt-get install -y unzip && \
apt-get install -y zip && \
apt-get install -y vim.tiny && \
apt-get install -y p7zip-full && \
rm -rf /var/lib/apt/lists/* && \
cd /tmp && \
wget $RELEASETOOL_URL && \
unzip GitlabReleaseTool.zip && \
chmod 755 gitlabreleaseuploader.py && \
chmod 755 deleterelease.py && \
chmod 755 checksemver.py && \
mv gitlabreleaseuploader.py /usr/bin && \
mv deleterelease.py /usr/bin && \
mv checksemver.py /usr/bin
sed -i 's,deb.debian.org,ftp.de.debian.org,g' /etc/apt/sources.list.d/debian.sources
RUN \
apt update && \
apt upgrade -y && \
apt autoremove && \
apt install -y ca-certificates && \
apt install -y make && \
apt install -y openssh-client && \
apt install -y git && \
apt install -y python3 && \
apt install -y python3-requests && \
apt install -y python3-pycodestyle && \
apt install -y python3-yaml && \
apt install -y python3-pip && \
apt install -y python3-xmltodict && \
apt install -y python3-cheetah && \
apt install -y gpg && \
apt install -y apt-transport-https && \
apt install -y wget && \
apt install -y curl && \
apt install -y unzip && \
apt install -y zip && \
apt install -y vim-tiny && \
apt install -y p7zip-full && \
apt install -y procps && \
apt install -y doxygen && \
apt install -y jq
RUN \
ln -s /usr/bin/python3 /usr/bin/python && \
mkdir -p /tmp/gru
COPY *.py /tmp/gru
RUN \
cd /tmp/gru && \
for I in *.py; do python -m py_compile $I; done && \
for I in *.py; do python -m pycodestyle --ignore=E501 $I; done && \
chmod 755 *.py && \
cp *.py /usr/bin

View File

@ -1 +0,0 @@
0.3.0

80
checksemver.py Normal file
View File

@ -0,0 +1,80 @@
#!/usr/bin/python
import re
import argparse
import sys
parser = argparse.ArgumentParser(description='Semantic Version Validator')
parser.add_argument('--versionToValidate', '-V',
help='The version to validate against the semantic versioning rules',
required=True)
parser.add_argument('--messageToValidate', '-M',
help='A message to validate, means: it must not be empty',
default='',
required=False)
parser.add_argument('--validateMessage', '-m',
help='Consider -M',
required=False,
action='store_true',
default=False)
parser.add_argument('--printExports', '-e',
help='Print exports',
action='store_true',
default=False,
required=False)
parser.add_argument('--exportFormat', '-f',
help='Print exports in >bash< or >powershell< format, to be used in '
'backticks or with Invoke-Expression',
default='bash',
required=False)
parser.add_argument('--verbose', '-v',
help='Verbose output, overrides -q',
required=False,
action='store_true',
default=False)
args = parser.parse_args()
verbose = args.verbose
versionToValidate = args.versionToValidate
messageToValidate = args.messageToValidate
validateMessage = args.validateMessage
printExports = args.printExports
exportFormat = args.exportFormat
r = re.compile(r'^(?P<major>0|[1-9]\d*)\.(?P<minor>0|[1-9]\d*)\.(?P<patch>0|[1-9]\d*)(?:-(?P<prerelease>(?:0|[1-9]\d*|\d*[a-zA-Z-][0-9a-zA-Z-]*)(?:\.(?:0|[1-9]\d*|\d*[a-zA-Z-][0-9a-zA-Z-]*))*))?(?:\+(?P<buildmetadata>[0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?$')
if verbose:
print("Version to validate: {}".format(versionToValidate))
m = r.match(versionToValidate)
if m:
if verbose:
for i in r.groupindex:
print("Found: {}: {}".format(i, m.group(i)))
if validateMessage:
if verbose:
print("Checking message {}".format(messageToValidate))
if messageToValidate == '':
if verbose:
print("Message shall be validate and is invalid")
sys.exit(1)
else:
if printExports:
if exportFormat == "bash":
print("export MESSAGE={}".format(messageToValidate))
elif exportFormat == "powershell":
print("set MESSAGE {}".format(messageToValidate))
if printExports:
for i in r.groupindex:
if exportFormat == "bash":
print("export {}={}".format(i.upper(), '' if m.group(i) is None else m.group(i)))
elif exportFormat == "powershell":
print("set {} {}".format(i.upper(), '""' if m.group(i) is None else m.group(i)))
sys.exit(0)
else:
if verbose:
print("Version is invalid")
sys.exit(1)

66
deleterelease.py Normal file
View File

@ -0,0 +1,66 @@
#!/usr/bin/python
import requests
import json
import argparse
import sys
parser = argparse.ArgumentParser(description='Gitlab Release Deleter')
parser.add_argument('--privateToken', '-p',
help='Private token to access Gitlab', required=True)
parser.add_argument('--projectId', '-i',
help='ProjectID of the related project', required=True)
parser.add_argument('--releaseTag', '-t',
help='Tag of the release in the repo',
required=True,
default='')
parser.add_argument('--instanceUrl', '-I',
help='URL of your gitlab instance', required=False,
default='https://gitlab.com')
parser.add_argument('--verbose', '-v',
help='verbose output',
required=False,
action='store_true',
default=False)
parser.add_argument('--caBundle', '-B',
help='File with the CA certificates to trust', required=False,
default='/etc/ssl/certs/ca-certificates.crt')
parser.add_argument('--insecure',
help='insecure ssl connect',
required=False,
action='store_true',
default=False)
args = parser.parse_args()
privateToken = args.privateToken
projectId = args.projectId
releaseTag = args.releaseTag
instanceUrl = args.instanceUrl
verbose = args.verbose
caBundle = args.caBundle
insecure = args.insecure
# --- delete release
deleteReleaseUrl = "%s/api/v4/projects/%s/releases/%s" % (instanceUrl, projectId, releaseTag)
headers = {"PRIVATE-TOKEN": privateToken, "Content-Type": "application/json"}
if verbose:
print("URL: %s" % deleteReleaseUrl)
if insecure:
caBundle = (False)
deleteReleaseResult = requests.delete(deleteReleaseUrl, headers=headers, verify=caBundle)
if deleteReleaseResult.status_code != 200:
print(deleteReleaseResult)
print(deleteReleaseResult.text)
raise Exception('Unable to delete release')
if verbose:
print(deleteReleaseResult)
print(deleteReleaseResult.text)
print('Release successfully delete')

260
gitlabreleaseuploader.py Executable file
View File

@ -0,0 +1,260 @@
#!/usr/bin/python
import requests
import json
import argparse
import sys
parser = argparse.ArgumentParser(description='Gitlab Release Uploader')
parser.add_argument('--privateToken', '-p',
help='Private token to access Gitlab', required=True)
parser.add_argument('--projectId', '-i',
help='ProjectID of the related project', required=True)
parser.add_argument('--projectUrl', '-u',
help='URL of the related project at Gitlab', required=True)
parser.add_argument('--file', '-f',
help='File to be released, can appear multiple times',
action='append',
required=False)
parser.add_argument('--releaseName', '-n',
help='Name of the release', required=False,
default='')
parser.add_argument('--createRelease', '-C',
help='Shall the release be created here',
required=False,
action='store_true',
default=False)
parser.add_argument('--releaseTag', '-t',
help='Tag of the release in the repo',
required=False,
default='')
parser.add_argument('--releaseTagTarget', '-T',
help='Commit or branch the tag should point to',
required=False,
default='')
parser.add_argument('--createReleaseTag', '-c',
help='Shall the release tag be created here',
required=False,
action='store_true',
default=False)
parser.add_argument('--description', '-d',
help='Description of the release', required=False,
default='')
parser.add_argument('--releaseInfoFile', '-F',
help='File containing JSON object with release info '
'(release tag, create release tag, description',
required=False,
default='')
parser.add_argument('--instanceUrl', '-I',
help='URL of your gitlab instance', required=False,
default='https://gitlab.com')
parser.add_argument('--caBundle', '-B',
help='File with the CA certificates to trust', required=False,
default='/etc/ssl/certs/ca-certificates.crt')
parser.add_argument('--insecure',
help='insecure ssl connect',
required=False,
action='store_true',
default=False)
parser.add_argument('--verbose', '-v',
help='verbose output',
required=False,
action='store_true',
default=False)
args = parser.parse_args()
privateToken = args.privateToken
projectId = args.projectId
projectUrl = args.projectUrl
filesToUpload = args.file
releaseName = args.releaseName
createRelease = args.createRelease
releaseTag = args.releaseTag
releaseTagTarget = args.releaseTagTarget
releaseDescription = args.description
instanceUrl = args.instanceUrl
createReleaseTag = args.createReleaseTag
releaseInfoFilename = args.releaseInfoFile
caBundle = args.caBundle
verbose = args.verbose
insecure = args.insecure
releaseInfo = {}
if (releaseInfoFilename):
with open(releaseInfoFilename, 'r') as releaseInfoFile:
releaseInfo = releaseInfoFile.read()
releaseInfo = json.loads(releaseInfo)
if 'releaseName' in releaseInfo:
releaseName = releaseInfo['releaseName']
if 'createRelease' in releaseInfo:
createRelease = (releaseInfo['createRelease'] in
('true', 'True'))
if 'releaseTag' in releaseInfo:
releaseTag = releaseInfo['releaseTag']
if 'releaseTagTarget' in releaseInfo:
releaseTagTarget = releaseInfo['releaseTagTarget']
if 'createReleaseTag' in releaseInfo:
createReleaseTag = (releaseInfo['createReleaseTag'] in
('true', 'True'))
if 'description' in releaseInfo:
releaseDescription = releaseInfo['description']
if releaseName == '':
raise Exception('No release name given')
if (releaseTag == '') and createRelease:
raise Exception('No release tag given but creation of release requested')
if (releaseTagTarget == '') and createReleaseTag:
raise Exception('No release tag target given but creation of tag requested')
if (releaseDescription == '') and createRelease:
raise Exception('No release description given but creation of release requested')
if insecure:
caBundle = (False)
def checkAndShowResult(result, expectedCode, errorMessage):
global verbose
if result.status_code != expectedCode:
print(result)
print(result.text)
raise Exception(errorMessage)
if verbose:
print(result)
print(result.text)
# --- upload the file
assets = [] # is required later, must be defined
if filesToUpload:
url = "%s/api/v4/projects/%s/uploads" % (instanceUrl, projectId)
headers = {"PRIVATE-TOKEN": privateToken}
for filename in filesToUpload:
with open(filename, 'rb') as filehandle:
files = {"file": filehandle}
if verbose:
print("POST to {}".format(url))
result = requests.post(url, files=files, headers=headers, verify=caBundle)
checkAndShowResult(result, 201, 'Unable to upload file to Gitlab')
assetUrl = projectUrl + json.loads(result.text)['url']
assets.append({'name': filename, 'url': assetUrl, 'id': "new-link-{}".format(len(assets))})
print('File {} successfully uploaded, url is {}'.format(filename, assetUrl))
# --- create release tag
if createReleaseTag:
url = ("%s/api/v4//projects/%s/repository/tags" % (instanceUrl, projectId))
headers = {"PRIVATE-TOKEN": privateToken, "Content-Type": "application/json"}
payload = {
"tag_name": releaseTag,
"id": projectId,
"ref": releaseTagTarget,
"message": "Tag for release %s" % releaseName
}
if verbose:
print("POST to {}".format(url))
result = requests.post(url, headers=headers, data=json.dumps(payload), verify=caBundle)
checkAndShowResult(result, 201, 'Unable to create release tag')
print('Tag successfully created')
# --- create release
if createRelease:
url = "%s/api/v4/projects/%s/releases" % (instanceUrl, projectId)
headers = {"PRIVATE-TOKEN": privateToken, "Content-Type": "application/json"}
payload = {
"name": releaseName,
"tag_name": releaseTag,
"description": releaseDescription
}
if verbose:
print("POST to {}".format(url))
result = requests.post(url, headers=headers, data=json.dumps(payload), verify=caBundle)
checkAndShowResult(result, 201, 'Unable to create release')
print('Release successfully created')
# --- update release in case of additional description
if not createRelease and releaseDescription:
# --- get release to fetch existing description
url = "%s/api/v4/projects/%s/releases/%s" % (instanceUrl, projectId, releaseName)
headers = {"PRIVATE-TOKEN": privateToken}
if verbose:
print("GET to {}".format(url))
result = requests.get(url, headers=headers, verify=caBundle)
checkAndShowResult(result, 200, 'Unable to get release')
existingDescription = json.loads(result.text)['description']
print("Existing description is {}".format(existingDescription))
releaseDescription += "\n\n---------------------------------------------\n\n"
releaseDescription += existingDescription
# --- update release
url = "%s/api/v4/projects/%s/releases/%s" % (instanceUrl, projectId, releaseName)
headers = {"PRIVATE-TOKEN": privateToken, "Content-Type": "application/json"}
payload = {
"name": releaseName,
"tag_name": releaseTag,
"description": releaseDescription
}
if verbose:
print("PUT to {}".format(url))
result = requests.put(url, headers=headers, data=json.dumps(payload), verify=caBundle)
checkAndShowResult(result, 200, 'Unable to update release')
print('Release successfully update')
# --- add assets
# get existing assets
headers = {"PRIVATE-TOKEN": privateToken}
url = "%s/api/v4/projects/%s/releases/%s" % (instanceUrl, projectId, releaseName)
if verbose:
print("GET to {}".format(url))
result = requests.get(url, headers=headers, verify=caBundle)
checkAndShowResult(result, 200, 'Unable to get release information')
# add existing assets to list of assets
links = json.loads(result.text)['assets']['links']
assets.extend(links)
# delete existing assets
headers = {"PRIVATE-TOKEN": privateToken}
for link in links:
assetId = link['id']
url = "%s/api/v4/projects/%s/releases/%s/assets/links/%s" % (instanceUrl, projectId, releaseName, assetId)
if verbose:
print("DELETE to {}".format(url))
result = requests.delete(url, headers=headers, verify=caBundle)
checkAndShowResult(result, 200, 'Unable to delete asset')
print("Asset {} successfully deleted".format(assetId))
# create all assets ("existing" and new)
headers = {"PRIVATE-TOKEN": privateToken, "Content-Type": "application/json"}
url = "%s/api/v4/projects/%s/releases/%s/assets/links" % (instanceUrl, projectId, releaseName)
for asset in assets:
if verbose:
print("POST to {}".format(url))
result = requests.post(url, headers=headers, data=json.dumps(asset), verify=caBundle)
checkAndShowResult(result, 201, "Unable to create asset")
print("Asset {} successfully created".format(asset))

View File

@ -14,3 +14,5 @@ Contains additionally:
* vim.tiny
* GitLab release tool: https://home.hottis.de/gitlab/wolutator/gitlabreleaseuploader including validator for semantic version according to https://semver.org/