6 Commits
0.1.1 ... 0.4.0

Author SHA1 Message Date
c7249ba743 add podman
Some checks failed
ci/woodpecker/tag/woodpecker Pipeline was successful
ci/woodpecker/push/woodpecker Pipeline failed
2025-11-21 18:46:28 +01:00
b26e8d212d fix ci
Some checks failed
ci/woodpecker/push/woodpecker Pipeline failed
ci/woodpecker/tag/woodpecker Pipeline was successful
2025-10-27 15:34:22 +01:00
6155787b59 fix Dockerfile
Some checks failed
ci/woodpecker/tag/woodpecker Pipeline failed
2025-10-27 15:30:44 +01:00
b6904e4ed2 add documented decrypt script
Some checks are pending
ci/woodpecker/tag/woodpecker Pipeline is pending
2025-01-29 17:24:28 +01:00
118baa38f8 gpg fix
Some checks are pending
ci/woodpecker/tag/woodpecker Pipeline is pending
2025-01-22 16:39:00 +01:00
cab241a96e gpg-agent
Some checks failed
ci/woodpecker/tag/woodpecker Pipeline failed
2025-01-22 15:39:51 +01:00
3 changed files with 27 additions and 8 deletions

View File

@@ -13,12 +13,6 @@ steps:
dockerfile: Dockerfile
when:
- event: [push, tag]
scan_image:
image: aquasec/trivy
commands:
- trivy image $FORGE_NAME/$CI_REPO:$CI_COMMIT_SHA --quiet --exit-code 1
when:
- event: [push, tag]
build:
image: plugins/kaniko
settings:

View File

@@ -1,12 +1,16 @@
FROM alpine:latest
FROM alpine:3.22.2
ARG USER="user"
RUN apk add --no-cache kubectl gpg bash && \
RUN apk add --no-cache kubectl gpg gpg-agent bash curl helm podman && \
addgroup $USER && \
adduser -G $USER -D $USER
COPY decrypt-secrets.sh /usr/local/bin/
USER $USER
WORKDIR /home/$USER
RUN gpg -k

21
decrypt-secrets.sh Executable file
View File

@@ -0,0 +1,21 @@
#!/bin/bash
#
# Set the environment variable GPG_PASSPHRASE
# Pipe the encrypted data and
# - redirect the output into the destination file or
# - directly eval the output, in this case make sure ONLY variable definitions are in the file
#
# The second option would be
# eval "`cat secrets.asc | ./decrypt-secrets.sh`"
#
# To create the encrypted file use
# gpg --symmetric --cipher-algo AES256 --armor --output secrets.asc secrets.txt
# where secrets.txt is the cleartext file and secrets.asc will be the encrypted file.
# Make sure to use a good passphrase, make sure to store the passphrase safely.
#
# Adding the encrypted file secrets.asc to a source code repository is secure.
#
gpg --decrypt --passphrase $GPG_PASSPHRASE --yes --batch --homedir /tmp/.gnupg --output -