当前位置: 首页 > wzjs >正文

免费建站软件有哪些友情链接检索数据分析

免费建站软件有哪些,友情链接检索数据分析,移动互联网服务管理中心官网,微网站站点名称Tekton 是什么? 历史背景 Tekton 的前身是 Knative 的子项目 build-pipeline,主要用来给 Kantive 的 build 模块增加 pipeline 功能之后独立出来,Tekton的最终目标是一个通用的 CI/CD 工具。 目前,私有云市场占有率比较高的 CICD 工具对 Kub…

Tekton 是什么?

        历史背景 Tekton 的前身是 Knative 的子项目 build-pipeline,主要用来给 Kantive 的 build 模块增加 pipeline 功能之后独立出来,Tekton的最终目标是一个通用的 CI/CD 工具。

        目前,私有云市场占有率比较高的 CICD 工具对 Kubernetes 都有所支持,比如 Jenkins、GitLab CI。但是这些工具只是将 Kubernetes 作为其扩展的一个方面,Kubernetes 作为新的基础设施,需要原生的 CICD 方案。另一方面,Jenkins 的子项目 JenkinsX 也开始默认使用 Tekton 作为 CI 引擎。使用云原生 CRD (是Kubernetes内置的资源类型,即自定义资源的定义) + Controller 实现的 Tekton ,无疑有机会成为云原生的主流编排引擎。

        简单介绍 描述: Tekton 是一个开源的云原生持续集成和持续交付/部署【Cloud Native CI/CD】解决方案, 使用Golang语言进行开发,允许开发人员通过K8S云平台快速灵活定义流水线,从而更加便捷构建、测试和部署系统,目前是由CD基金会[https://cd.foundation/]管理的项目,其遵循OpenSSF最佳实践。

 

Tekton 有何用?

描述: 前面介绍到 Tekton 主要用于在云原生架构环境中完成CI、CD部分,主要是devops工程师以及开发人员使用,其侧重点应该是在云原生微服务应用以及传统应用的CI持续集成上,

除此之外使用 tekton 的好处如下

  • 可移植性: 跨平台、语言、和部署环境。它适用于 Jenkins、Jenkins X、Skaffold、 Knative 和许多其他流行的 CI/CD 工具。
  • 可定制:Tekton 实体是完全可定制的,从而具有高度的灵活性。平台工程师可以定义非常详细的构建基目录,以供开发人员在各种情况下使用
  • 可重复使用:Tekton 实体是完全可移植的,因此一旦定义,组织内的任何人都可以使用给定的管道并重用其构造块。这使开发人员可以快速构建复杂的管道,而无需“重新发明轮子”。
  • 可扩展:Tekton Catalog是Tekton社区驱动的存储库。您可以使用Tekton目录中的预制组件快速创建新的并展开现有管道。
  • 标准化:Tekton 在您的Kubernetes集群上作为扩展安装并运行,并使用成熟的 Kubernetes 资源模型, 其工作负载在 Kubernetes 容器内执行。
  • 缩放性:为了增加工作负载容量,您可以简单地将节点添加到群集, Tekton 随集群一起扩展 无需重新定义资源分配或对管道进行任何其他修改。

Tekton 组件介绍

  • Tekton Pipelines:Tekton 的基础部分,它定义了一组Kubernetes自定义资源,这些资源充当构建块,您可以从中组装CI/CD管道。
  • Tekton Triggers:允许基于 event 实例化 pipeline。例如,每次PR与GitHub存储库合并时,您都可以触发管道的实例化和执行。
  • Tekton Cli:是Tekton Pipelines的一个基于Web的图形界面,用于显示有关管道执行的信息。目前正在进行中。
  • Tekton Dashboard:是Tekton Pipelines的一个基于Web的图形界面,用于显示有关管道执行的信息。
  • Tekton Catalog:是一个由社区贡献的高质量Tekton构建块(任务、管道等)的存储库,可在您自己的管道中使用。
  • Tekton Hub:基于Web的图形界面,用于访问Tekton Catalog。
  • Tekton Operator:是一个Kubernetes Operator模式,允许您在Kubernete集群上安装、更新和删除Tekton项目。
  • Tekton Chain : 为使用Tekton Pipelines建造的文物提供生成、存储和标记出处的工具。

Tekton安装 

 在安装的时候还需要注意Kubernetes版本,如果Kubernetes的版本太低,安装高版本的Tekton是安装不了的。

yaml文件以配置好可直接复制apply

 安装tekton-pipelines

# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: Namespace
metadata:name: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:name: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
spec:privileged: falseallowPrivilegeEscalation: falsevolumes:- 'emptyDir'- 'configMap'- 'secret'hostNetwork: falsehostIPC: falsehostPID: falserunAsUser:rule: 'MustRunAsNonRoot'seLinux:rule: 'RunAsAny'supplementalGroups:rule: 'MustRunAs'ranges:- min: 1max: 65535fsGroup:rule: 'MustRunAs'ranges:- min: 1max: 65535---
# Copyright 2020 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: tekton-pipelines-controller-cluster-accesslabels:app.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
rules:- apiGroups: [""]# Namespace access is required because the controller timeout handling logic# iterates over all namespaces and times out any PipelineRuns that have expired.# Pod access is required because the taskrun controller wants to be updated when# a Pod underlying a TaskRun changes state.resources: ["namespaces", "pods"]verbs: ["list", "watch"]# Controller needs cluster access to all of the CRDs that it is responsible for# managing.- apiGroups: ["tekton.dev"]resources: ["tasks", "clustertasks", "taskruns", "pipelines", "pipelineruns", "pipelineresources", "conditions"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]- apiGroups: ["tekton.dev"]resources: ["taskruns/finalizers", "pipelineruns/finalizers"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]- apiGroups: ["tekton.dev"]resources: ["tasks/status", "clustertasks/status", "taskruns/status", "pipelines/status", "pipelineruns/status", "pipelineresources/status"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:# This is the access that the controller needs on a per-namespace basis.name: tekton-pipelines-controller-tenant-accesslabels:app.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
rules:- apiGroups: [""]resources: ["pods", "pods/log", "secrets", "events", "serviceaccounts", "configmaps", "persistentvolumeclaims", "limitranges"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]# Unclear if this access is actually required.  Simply a hold-over from the previous# incarnation of the controller's ClusterRole.- apiGroups: ["apps"]resources: ["deployments", "statefulsets"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]- apiGroups: ["apps"]resources: ["deployments/finalizers"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: tekton-pipelines-webhook-cluster-accesslabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
rules:# The webhook needs to be able to list and update customresourcedefinitions,# mainly to update the webhook certificates.- apiGroups: ["apiextensions.k8s.io"]resources: ["customresourcedefinitions", "customresourcedefinitions/status"]verbs: ["get", "list", "update", "patch", "watch"]- apiGroups: ["admissionregistration.k8s.io"]# The webhook performs a reconciliation on these two resources and continuously# updates configuration.resources: ["mutatingwebhookconfigurations", "validatingwebhookconfigurations"]# knative starts informers on these things, which is why we need get, list and watch.verbs: ["list", "watch"]- apiGroups: ["admissionregistration.k8s.io"]resources: ["mutatingwebhookconfigurations"]# This mutating webhook is responsible for applying defaults to tekton objects# as they are received.resourceNames: ["webhook.pipeline.tekton.dev"]# When there are changes to the configs or secrets, knative updates the mutatingwebhook config# with the updated certificates or the refreshed set of rules.verbs: ["get", "update"]- apiGroups: ["admissionregistration.k8s.io"]resources: ["validatingwebhookconfigurations"]# validation.webhook.pipeline.tekton.dev performs schema validation when you, for example, create TaskRuns.# config.webhook.pipeline.tekton.dev validates the logging configuration against knative's logging structureresourceNames: ["validation.webhook.pipeline.tekton.dev", "config.webhook.pipeline.tekton.dev"]# When there are changes to the configs or secrets, knative updates the validatingwebhook config# with the updated certificates or the refreshed set of rules.verbs: ["get", "update"]- apiGroups: ["policy"]resources: ["podsecuritypolicies"]resourceNames: ["tekton-pipelines"]verbs: ["use"]
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: tekton-pipelines-leader-electionlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
rules:# We uses leases for leaderelection- apiGroups: ["coordination.k8s.io"]resources: ["leases"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]---
# Copyright 2020 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: tekton-pipelines-controllernamespace: tekton-pipelineslabels:app.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
rules:- apiGroups: [""]resources: ["configmaps"]verbs: ["list", "watch"]# The controller needs access to these configmaps for logging information and runtime configuration.- apiGroups: [""]resources: ["configmaps"]verbs: ["get"]resourceNames: ["config-logging", "config-observability", "config-artifact-bucket", "config-artifact-pvc", "feature-flags", "config-leader-election", "config-registry-cert"]- apiGroups: ["policy"]resources: ["podsecuritypolicies"]resourceNames: ["tekton-pipelines"]verbs: ["use"]
---
kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: tekton-pipelines-webhooknamespace: tekton-pipelineslabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
rules:- apiGroups: [""]resources: ["configmaps"]verbs: ["list", "watch"]# The webhook needs access to these configmaps for logging information.- apiGroups: [""]resources: ["configmaps"]verbs: ["get"]resourceNames: ["config-logging", "config-observability", "config-leader-election"]- apiGroups: [""]resources: ["secrets"]verbs: ["list", "watch"]# The webhook daemon makes a reconciliation loop on webhook-certs. Whenever# the secret changes it updates the webhook configurations with the certificates# stored in the secret.- apiGroups: [""]resources: ["secrets"]verbs: ["get", "update"]resourceNames: ["webhook-certs"]- apiGroups: ["policy"]resources: ["podsecuritypolicies"]resourceNames: ["tekton-pipelines"]verbs: ["use"]---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
apiVersion: v1
kind: ServiceAccount
metadata:name: tekton-pipelines-controllernamespace: tekton-pipelineslabels:app.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
---
apiVersion: v1
kind: ServiceAccount
metadata:name: tekton-pipelines-webhooknamespace: tekton-pipelineslabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:name: tekton-pipelines-controller-cluster-accesslabels:app.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
subjects:- kind: ServiceAccountname: tekton-pipelines-controllernamespace: tekton-pipelines
roleRef:kind: ClusterRolename: tekton-pipelines-controller-cluster-accessapiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:name: tekton-pipelines-controller-leaderelectionlabels:app.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
subjects:- kind: ServiceAccountname: tekton-pipelines-controllernamespace: tekton-pipelines
roleRef:kind: ClusterRolename: tekton-pipelines-leader-electionapiGroup: rbac.authorization.k8s.io
---
# If this ClusterRoleBinding is replaced with a RoleBinding
# then the ClusterRole would be namespaced. The access described by
# the tekton-pipelines-controller-tenant-access ClusterRole would
# be scoped to individual tenant namespaces.
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:name: tekton-pipelines-controller-tenant-accesslabels:app.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
subjects:- kind: ServiceAccountname: tekton-pipelines-controllernamespace: tekton-pipelines
roleRef:kind: ClusterRolename: tekton-pipelines-controller-tenant-accessapiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:name: tekton-pipelines-webhook-cluster-accesslabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
subjects:- kind: ServiceAccountname: tekton-pipelines-webhooknamespace: tekton-pipelines
roleRef:kind: ClusterRolename: tekton-pipelines-webhook-cluster-accessapiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:name: tekton-pipelines-webhook-leaderelectionlabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
subjects:- kind: ServiceAccountname: tekton-pipelines-webhooknamespace: tekton-pipelines
roleRef:kind: ClusterRolename: tekton-pipelines-leader-electionapiGroup: rbac.authorization.k8s.io---
# Copyright 2020 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:name: tekton-pipelines-controllernamespace: tekton-pipelineslabels:app.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
subjects:- kind: ServiceAccountname: tekton-pipelines-controllernamespace: tekton-pipelines
roleRef:kind: Rolename: tekton-pipelines-controllerapiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:name: tekton-pipelines-webhooknamespace: tekton-pipelineslabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
subjects:- kind: ServiceAccountname: tekton-pipelines-webhooknamespace: tekton-pipelines
roleRef:kind: Rolename: tekton-pipelines-webhookapiGroup: rbac.authorization.k8s.io---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: clustertasks.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"version: "v0.18.1"
spec:group: tekton.devpreserveUnknownFields: falseversions:- &versionname: v1alpha1served: truestorage: falseschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}- !!merge <<: *versionname: v1beta1storage: truenames:kind: ClusterTaskplural: clustertaskscategories:- tekton- tekton-pipelinesscope: Clusterconversion:strategy: Webhookwebhook:conversionReviewVersions: ["v1beta1"]clientConfig:service:name: tekton-pipelines-webhooknamespace: tekton-pipelines---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: conditions.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"version: "v0.18.1"
spec:group: tekton.devversions:- name: v1alpha1served: truestorage: trueschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}names:kind: Conditionplural: conditionscategories:- tekton- tekton-pipelinesscope: Namespaced---
# Copyright 2018 The Knative Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:name: images.caching.internal.knative.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinesknative.dev/crd-install: "true"
spec:group: caching.internal.knative.devversion: v1alpha1names:kind: Imageplural: imagessingular: imagecategories:- knative-internal- cachingshortNames:- imgscope: Namespacedsubresources:status: {}---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: pipelines.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"version: "v0.18.1"
spec:group: tekton.devpreserveUnknownFields: falseversions:- &versionname: v1alpha1served: truestorage: false# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}schema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true- !!merge <<: *versionname: v1beta1storage: truenames:kind: Pipelineplural: pipelinescategories:- tekton- tekton-pipelinesscope: Namespacedconversion:strategy: Webhookwebhook:conversionReviewVersions: ["v1beta1"]clientConfig:service:name: tekton-pipelines-webhooknamespace: tekton-pipelines---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: pipelineruns.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"version: "v0.18.1"
spec:group: tekton.devpreserveUnknownFields: falseversions:- &versionname: v1alpha1served: truestorage: falseschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: trueadditionalPrinterColumns:- name: Succeededtype: stringjsonPath: ".status.conditions[?(@.type==\"Succeeded\")].status"- name: Reasontype: stringjsonPath: ".status.conditions[?(@.type==\"Succeeded\")].reason"- name: StartTimetype: datejsonPath: .status.startTime- name: CompletionTimetype: datejsonPath: .status.completionTime# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}- !!merge <<: *versionname: v1beta1storage: truenames:kind: PipelineRunplural: pipelinerunscategories:- tekton- tekton-pipelinesshortNames:- pr- prsscope: Namespacedconversion:strategy: Webhookwebhook:conversionReviewVersions: ["v1beta1"]clientConfig:service:name: tekton-pipelines-webhooknamespace: tekton-pipelines---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: pipelineresources.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"version: "v0.18.1"
spec:group: tekton.devversions:- name: v1alpha1served: truestorage: trueschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}names:kind: PipelineResourceplural: pipelineresourcescategories:- tekton- tekton-pipelinesscope: Namespaced---
# Copyright 2020 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: runs.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"version: "v0.18.1"
spec:group: tekton.devpreserveUnknownFields: falseversions:- name: v1alpha1served: truestorage: trueschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: trueadditionalPrinterColumns:- name: Succeededtype: stringjsonPath: ".status.conditions[?(@.type==\"Succeeded\")].status"- name: Reasontype: stringjsonPath: ".status.conditions[?(@.type==\"Succeeded\")].reason"- name: StartTimetype: datejsonPath: .status.startTime- name: CompletionTimetype: datejsonPath: .status.completionTime# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}names:kind: Runplural: runscategories:- tekton- tekton-pipelinesscope: Namespaced---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: tasks.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"version: "v0.18.1"
spec:group: tekton.devpreserveUnknownFields: falseversions:- &versionname: v1alpha1served: truestorage: falseschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}- !!merge <<: *versionname: v1beta1storage: truenames:kind: Taskplural: taskscategories:- tekton- tekton-pipelinesscope: Namespacedconversion:strategy: Webhookwebhook:conversionReviewVersions: ["v1beta1"]clientConfig:service:name: tekton-pipelines-webhooknamespace: tekton-pipelines---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: taskruns.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"version: "v0.18.1"
spec:group: tekton.devpreserveUnknownFields: falseversions:- &versionname: v1alpha1served: truestorage: falseschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: trueadditionalPrinterColumns:- name: Succeededtype: stringjsonPath: ".status.conditions[?(@.type==\"Succeeded\")].status"- name: Reasontype: stringjsonPath: ".status.conditions[?(@.type==\"Succeeded\")].reason"- name: StartTimetype: datejsonPath: .status.startTime- name: CompletionTimetype: datejsonPath: .status.completionTime# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}- !!merge <<: *versionname: v1beta1storage: truenames:kind: TaskRunplural: taskrunscategories:- tekton- tekton-pipelinesshortNames:- tr- trsscope: Namespacedconversion:strategy: Webhookwebhook:conversionReviewVersions: ["v1beta1"]clientConfig:service:name: tekton-pipelines-webhooknamespace: tekton-pipelines---
# Copyright 2020 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: Secret
metadata:name: webhook-certsnamespace: tekton-pipelineslabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"
# The data is populated at install time.
---
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:name: validation.webhook.pipeline.tekton.devlabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"
webhooks:- admissionReviewVersions: ["v1beta1", "v1"]clientConfig:service:name: tekton-pipelines-webhooknamespace: tekton-pipelinesfailurePolicy: FailsideEffects: Nonename: validation.webhook.pipeline.tekton.dev
---
apiVersion: admissionregistration.k8s.io/v1
kind: MutatingWebhookConfiguration
metadata:name: webhook.pipeline.tekton.devlabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"
webhooks:- admissionReviewVersions: ["v1beta1", "v1"]clientConfig:service:name: tekton-pipelines-webhooknamespace: tekton-pipelinesfailurePolicy: FailsideEffects: Nonename: webhook.pipeline.tekton.dev
---
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:name: config.webhook.pipeline.tekton.devlabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinespipeline.tekton.dev/release: "v0.18.1"
webhooks:- admissionReviewVersions: ["v1beta1", "v1"]clientConfig:service:name: tekton-pipelines-webhooknamespace: tekton-pipelinesfailurePolicy: FailsideEffects: Nonename: config.webhook.pipeline.tekton.devobjectSelector:matchLabels:app.kubernetes.io/part-of: tekton-pipelines---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:name: tekton-aggregate-editlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinesrbac.authorization.k8s.io/aggregate-to-edit: "true"rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules:- apiGroups:- tekton.devresources:- tasks- taskruns- pipelines- pipelineruns- pipelineresources- conditionsverbs:- create- delete- deletecollection- get- list- patch- update- watch---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:name: tekton-aggregate-viewlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinesrbac.authorization.k8s.io/aggregate-to-view: "true"
rules:- apiGroups:- tekton.devresources:- tasks- taskruns- pipelines- pipelineruns- pipelineresources- conditionsverbs:- get- list- watch---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ConfigMap
metadata:name: config-artifact-bucketnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
# data:
#  # location of the gcs bucket to be used for artifact storage
#  location: "gs://bucket-name"
#  # name of the secret that will contain the credentials for the service account
#  # with access to the bucket
#  bucket.service.account.secret.name:
#  # The key in the secret with the required service account json
#  bucket.service.account.secret.key:
#  # The field name that should be used for the service account
#  # Valid values: GOOGLE_APPLICATION_CREDENTIALS, BOTO_CONFIG.
#  bucket.service.account.field.name: GOOGLE_APPLICATION_CREDENTIALS---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ConfigMap
metadata:name: config-artifact-pvcnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
# data:
#   # size of the PVC volume
#   size: 5Gi
#
#   # storage class of the PVC volume
#   storageClassName: storage-class-name---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ConfigMap
metadata:name: config-defaultsnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
data:_example: |#################################                              ##    EXAMPLE CONFIGURATION     ##                              ################################## This block is not actually functional configuration,# but serves to illustrate the available configuration# options and document them in a way that is accessible# to users that `kubectl edit` this config map.## These sample configuration options may be copied out of# this example block and unindented to be in the data block# to actually change the configuration.# default-timeout-minutes contains the default number of# minutes to use for TaskRun and PipelineRun, if none is specified.default-timeout-minutes: "60"  # 60 minutes# default-service-account contains the default service account name# to use for TaskRun and PipelineRun, if none is specified.default-service-account: "default"# default-managed-by-label-value contains the default value given to the# "app.kubernetes.io/managed-by" label applied to all Pods created for# TaskRuns. If a user's requested TaskRun specifies another value for this# label, the user's request supercedes.default-managed-by-label-value: "tekton-pipelines"# default-pod-template contains the default pod template to use# TaskRun and PipelineRun, if none is specified. If a pod template# is specified, the default pod template is ignored.# default-pod-template:# default-cloud-events-sink contains the default CloudEvents sink to be# used for TaskRun and PipelineRun, when no sink is specified.# Note that right now it is still not possible to set a PipelineRun or# TaskRun specific sink, so the default is the only option available.# If no sink is specified, no CloudEvent is generated# default-cloud-events-sink:# default-task-run-workspace-binding contains the default workspace# configuration provided for any Workspaces that a Task declares# but that a TaskRun does not explicitly provide.# default-task-run-workspace-binding: |#   emptyDir: {}---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ConfigMap
metadata:name: feature-flagsnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
data:# Setting this flag to "true" will prevent Tekton to create an# Affinity Assistant for every TaskRun sharing a PVC workspace## The default behaviour is for Tekton to create Affinity Assistants## See more in the workspace documentation about Affinity Assistant# https://github.com/tektoncd/pipeline/blob/master/docs/workspaces.md#affinity-assistant-and-specifying-workspace-order-in-a-pipeline# or https://github.com/tektoncd/pipeline/pull/2630 for more info.disable-affinity-assistant: "false"# Setting this flag to "true" will prevent Tekton overriding your# Task container's $HOME environment variable.## The default behaviour currently is for Tekton to override the# $HOME environment variable but this will change in an upcoming# release.## See https://github.com/tektoncd/pipeline/issues/2013 for more# info.disable-home-env-overwrite: "false"# Setting this flag to "true" will prevent Tekton overriding your# Task container's working directory.## The default behaviour currently is for Tekton to override the# working directory if not set by the user but this will change# in an upcoming release.## See https://github.com/tektoncd/pipeline/issues/1836 for more# info.disable-working-directory-overwrite: "false"# Setting this flag to "true" will prevent Tekton scanning attached# service accounts and injecting any credentials it finds into your# Steps.## The default behaviour currently is for Tekton to search service# accounts for secrets matching a specified format and automatically# mount those into your Steps.## Note: setting this to "true" will prevent PipelineResources from# working.## See https://github.com/tektoncd/pipeline/issues/1836 for more# info.disable-creds-init: "false"# This option should be set to false when Pipelines is running in a# cluster that does not use injected sidecars such as Istio. Setting# it to false should decrease the time it takes for a TaskRun to start# running. For clusters that use injected sidecars, setting this# option to false can lead to unexpected behavior.## See https://github.com/tektoncd/pipeline/issues/2080 for more info.running-in-environment-with-injected-sidecars: "true"# Setting this flag to "true" will require that any Git SSH Secret# offered to Tekton must have known_hosts included.## See https://github.com/tektoncd/pipeline/issues/2981 for more# info.require-git-ssh-secret-known-hosts: "false"# Setting this flag to "true" enables the use of Tekton OCI bundle.# This is an experimental feature and thus should still be considered# an alpha feature.enable-tekton-oci-bundles: "false"---
# Copyright 2020 Tekton Authors LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ConfigMap
metadata:name: config-leader-electionnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
data:# An inactive but valid configuration follows; see example.resourceLock: "leases"leaseDuration: "15s"renewDeadline: "10s"retryPeriod: "2s"---
# Copyright 2019 Tekton Authors LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ConfigMap
metadata:name: config-loggingnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
data:# Common configuration for all knative codebasezap-logger-config: |{"level": "info","development": false,"sampling": {"initial": 100,"thereafter": 100},"outputPaths": ["stdout"],"errorOutputPaths": ["stderr"],"encoding": "json","encoderConfig": {"timeKey": "ts","levelKey": "level","nameKey": "logger","callerKey": "caller","messageKey": "msg","stacktraceKey": "stacktrace","lineEnding": "","levelEncoder": "","timeEncoder": "iso8601","durationEncoder": "","callerEncoder": ""}}# Log level overridesloglevel.controller: "info"loglevel.webhook: "info"---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ConfigMap
metadata:name: config-observabilitynamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
data:_example: |#################################                              ##    EXAMPLE CONFIGURATION     ##                              ################################## This block is not actually functional configuration,# but serves to illustrate the available configuration# options and document them in a way that is accessible# to users that `kubectl edit` this config map.## These sample configuration options may be copied out of# this example block and unindented to be in the data block# to actually change the configuration.# metrics.backend-destination field specifies the system metrics destination.# It supports either prometheus (the default) or stackdriver.# Note: Using Stackdriver will incur additional charges.metrics.backend-destination: prometheus# metrics.stackdriver-project-id field specifies the Stackdriver project ID. This# field is optional. When running on GCE, application default credentials will be# used and metrics will be sent to the cluster's project if this field is# not provided.metrics.stackdriver-project-id: "<your stackdriver project id>"# metrics.allow-stackdriver-custom-metrics indicates whether it is allowed# to send metrics to Stackdriver using "global" resource type and custom# metric type. Setting this flag to "true" could cause extra Stackdriver# charge.  If metrics.backend-destination is not Stackdriver, this is# ignored.metrics.allow-stackdriver-custom-metrics: "false"---
# Copyright 2020 Tekton Authors LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ConfigMap
metadata:name: config-registry-certnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines
# data:
#  # Registry's self-signed certificate
#  cert: |---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apps/v1
kind: Deployment
metadata:name: tekton-pipelines-controllernamespace: tekton-pipelineslabels:app.kubernetes.io/name: controllerapp.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.18.1"app.kubernetes.io/part-of: tekton-pipelines# tekton.dev/release value replaced with inputs.params.versionTag in pipeline/tekton/publish.yamlpipeline.tekton.dev/release: "v0.18.1"# labels below are related to istio and should not be used for resource lookupversion: "v0.18.1"
spec:replicas: 1selector:matchLabels:app.kubernetes.io/name: controllerapp.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinestemplate:metadata:annotations:cluster-autoscaler.kubernetes.io/safe-to-evict: "false"labels:app.kubernetes.io/name: controllerapp.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.18.1"app.kubernetes.io/part-of: tekton-pipelines# tekton.dev/release value replaced with inputs.params.versionTag in pipeline/tekton/publish.yamlpipeline.tekton.dev/release: "v0.18.1"# labels below are related to istio and should not be used for resource lookupapp: tekton-pipelines-controllerversion: "v0.18.1"spec:serviceAccountName: tekton-pipelines-controllercontainers:- name: tekton-pipelines-controllerimage: registry.cn-hangzhou.aliyuncs.com/coolops/tekton-controller:v0.18.1args: [# Version, to be replace at release time"-version", "v0.18.1",# These images are built on-demand by `ko resolve` and are replaced# by image references by digest."-kubeconfig-writer-image", "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-kubeconfigwriter:v0.18.1", "-creds-image", "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-creds-init:v0.18.1", "-git-image", "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-git-init:v0.18.1", "-entrypoint-image", "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-entrypoint:v0.18.1", "-nop-image", "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-nop:v0.18.1", "-imagedigest-exporter-image", "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-imagedigestexporter:v0.18.1", "-pr-image", "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-pullrequest-init:v0.18.1", "-build-gcs-fetcher-image", "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-gcs-fetcher:v0.18.1",# This is gcr.io/google.com/cloudsdktool/cloud-sdk:302.0.0-slim"-gsutil-image", "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-cloud-sdk:v0.18.1",# The shell image must be root in order to create directories and copy files to PVCs.# gcr.io/distroless/base:debug as of October 16, 2020"-shell-image", "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-base:v0.18.1"]volumeMounts:- name: config-loggingmountPath: /etc/config-logging- name: config-registry-certmountPath: /etc/config-registry-certenv:- name: SYSTEM_NAMESPACEvalueFrom:fieldRef:fieldPath: metadata.namespace# If you are changing these names, you will also need to update# the controller's Role in 200-role.yaml to include the new# values in the "configmaps" "get" rule.- name: CONFIG_DEFAULTS_NAMEvalue: config-defaults- name: CONFIG_LOGGING_NAMEvalue: config-logging- name: CONFIG_OBSERVABILITY_NAMEvalue: config-observability- name: CONFIG_ARTIFACT_BUCKET_NAMEvalue: config-artifact-bucket- name: CONFIG_ARTIFACT_PVC_NAMEvalue: config-artifact-pvc- name: CONFIG_FEATURE_FLAGS_NAMEvalue: feature-flags- name: CONFIG_LEADERELECTION_NAMEvalue: config-leader-election- name: SSL_CERT_FILEvalue: /etc/config-registry-cert/cert- name: SSL_CERT_DIRvalue: /etc/ssl/certs- name: METRICS_DOMAINvalue: tekton.dev/pipelinesecurityContext:allowPrivilegeEscalation: false# User 65532 is the distroless nonroot user IDrunAsUser: 65532ports:- name: probescontainerPort: 8080livenessProbe:httpGet:path: /healthport: probesscheme: HTTPinitialDelaySeconds: 5periodSeconds: 10timeoutSeconds: 5readinessProbe:httpGet:path: /readinessport: probesscheme: HTTPinitialDelaySeconds: 5periodSeconds: 10timeoutSeconds: 5volumes:- name: config-loggingconfigMap:name: config-logging- name: config-registry-certconfigMap:name: config-registry-cert
---
apiVersion: v1
kind: Service
metadata:labels:app.kubernetes.io/name: controllerapp.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.18.1"app.kubernetes.io/part-of: tekton-pipelines# tekton.dev/release value replaced with inputs.params.versionTag in pipeline/tekton/publish.yamlpipeline.tekton.dev/release: "v0.18.1"# labels below are related to istio and should not be used for resource lookupapp: tekton-pipelines-controllerversion: "v0.18.1"name: tekton-pipelines-controllernamespace: tekton-pipelines
spec:ports:- name: http-metricsport: 9090protocol: TCPtargetPort: 9090- name: probesport: 8080selector:app.kubernetes.io/name: controllerapp.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines---
# Copyright 2020 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: autoscaling/v2beta1
kind: HorizontalPodAutoscaler
metadata:name: tekton-pipelines-webhooknamespace: tekton-pipelineslabels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.18.1"app.kubernetes.io/part-of: tekton-pipelines# tekton.dev/release value replaced with inputs.params.versionTag in pipeline/tekton/publish.yamlpipeline.tekton.dev/release: "v0.18.1"# labels below are related to istio and should not be used for resource lookupversion: "v0.18.1"
spec:minReplicas: 1maxReplicas: 5scaleTargetRef:apiVersion: apps/v1kind: Deploymentname: tekton-pipelines-webhookmetrics:- type: Resourceresource:name: cputargetAverageUtilization: 100
---
apiVersion: policy/v1beta1
kind: PodDisruptionBudget
metadata:name: tekton-pipelines-webhooknamespace: tekton-pipelineslabels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.18.1"app.kubernetes.io/part-of: tekton-pipelines# tekton.dev/release value replaced with inputs.params.versionTag in pipeline/tekton/publish.yamlpipeline.tekton.dev/release: "v0.18.1"# labels below are related to istio and should not be used for resource lookupversion: "v0.18.1"
spec:minAvailable: 80%selector:matchLabels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines---
# Copyright 2020 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apps/v1
kind: Deployment
metadata:# Note: the Deployment name must be the same as the Service name specified in# config/400-webhook-service.yaml. If you change this name, you must also# change the value of WEBHOOK_SERVICE_NAME below.name: tekton-pipelines-webhooknamespace: tekton-pipelineslabels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.18.1"app.kubernetes.io/part-of: tekton-pipelines# tekton.dev/release value replaced with inputs.params.versionTag in pipeline/tekton/publish.yamlpipeline.tekton.dev/release: "v0.18.1"# labels below are related to istio and should not be used for resource lookupversion: "v0.18.1"
spec:replicas: 1selector:matchLabels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinestemplate:metadata:annotations:cluster-autoscaler.kubernetes.io/safe-to-evict: "false"labels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.18.1"app.kubernetes.io/part-of: tekton-pipelines# tekton.dev/release value replaced with inputs.params.versionTag in pipeline/tekton/publish.yamlpipeline.tekton.dev/release: "v0.18.1"# labels below are related to istio and should not be used for resource lookupapp: tekton-pipelines-webhookversion: "v0.18.1"spec:affinity:podAntiAffinity:preferredDuringSchedulingIgnoredDuringExecution:- podAffinityTerm:labelSelector:matchLabels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelinestopologyKey: kubernetes.io/hostnameweight: 100serviceAccountName: tekton-pipelines-webhookcontainers:- name: webhook# This is the Go import path for the binary that is containerized# and substituted here.image: registry.cn-hangzhou.aliyuncs.com/coolops/tekton-webhook:v0.18.1# Resource request required for autoscaler to take any action for a metricresources:requests:cpu: 100mmemory: 100Milimits:cpu: 500mmemory: 500Mienv:- name: SYSTEM_NAMESPACEvalueFrom:fieldRef:fieldPath: metadata.namespace# If you are changing these names, you will also need to update# the webhook's Role in 200-role.yaml to include the new# values in the "configmaps" "get" rule.- name: CONFIG_LOGGING_NAMEvalue: config-logging- name: CONFIG_OBSERVABILITY_NAMEvalue: config-observability- name: CONFIG_LEADERELECTION_NAMEvalue: config-leader-election- name: WEBHOOK_SERVICE_NAMEvalue: tekton-pipelines-webhook- name: WEBHOOK_SECRET_NAMEvalue: webhook-certs- name: METRICS_DOMAINvalue: tekton.dev/pipelinesecurityContext:allowPrivilegeEscalation: false# User 65532 is the distroless nonroot user IDrunAsUser: 65532ports:- name: metricscontainerPort: 9090- name: profilingcontainerPort: 8008- name: https-webhookcontainerPort: 8443- name: probescontainerPort: 8080livenessProbe:httpGet:path: /healthport: probesscheme: HTTPinitialDelaySeconds: 5periodSeconds: 10timeoutSeconds: 5readinessProbe:httpGet:path: /readinessport: probesscheme: HTTPinitialDelaySeconds: 5periodSeconds: 10timeoutSeconds: 5
---
apiVersion: v1
kind: Service
metadata:labels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.18.1"app.kubernetes.io/part-of: tekton-pipelines# tekton.dev/release value replaced with inputs.params.versionTag in pipeline/tekton/publish.yamlpipeline.tekton.dev/release: "v0.18.1"# labels below are related to istio and should not be used for resource lookupapp: tekton-pipelines-webhookversion: "v0.18.1"name: tekton-pipelines-webhooknamespace: tekton-pipelines
spec:ports:# Define metrics and profiling for them to be accessible within service meshes.- name: http-metricsport: 9090targetPort: 9090- name: http-profilingport: 8008targetPort: 8008- name: https-webhookport: 443targetPort: 8443- name: probesport: 8080selector:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-pipelines---

 安装tekton-triggers

# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:name: tekton-triggerslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
spec:privileged: falseallowPrivilegeEscalation: falsevolumes:- 'emptyDir'- 'configMap'- 'secret'hostNetwork: falsehostIPC: falsehostPID: falserunAsUser:rule: 'MustRunAsNonRoot'seLinux:rule: 'RunAsAny'supplementalGroups:rule: 'MustRunAs'ranges:- min: 1max: 65535fsGroup:rule: 'MustRunAs'ranges:- min: 1max: 65535---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: tekton-triggers-adminlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
rules:- apiGroups: [""]resources: ["configmaps", "services", "events"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]- apiGroups: ["apps"]resources: ["deployments", "deployments/finalizers"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]- apiGroups: ["admissionregistration.k8s.io"]resources: ["mutatingwebhookconfigurations", "validatingwebhookconfigurations"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]- apiGroups: ["triggers.tekton.dev"]resources: ["clustertriggerbindings", "clusterinterceptors", "eventlisteners", "triggerbindings", "triggertemplates", "triggers", "eventlisteners/finalizers"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]- apiGroups: ["triggers.tekton.dev"]resources: ["clustertriggerbindings/status", "clusterinterceptors/status", "eventlisteners/status", "triggerbindings/status", "triggertemplates/status", "triggers/status"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]# We uses leases for leaderelection- apiGroups: ["coordination.k8s.io"]resources: ["leases"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]- apiGroups: ["serving.knative.dev"]resources: ["*", "*/status", "*/finalizers"]verbs: ["get", "list", "create", "update", "delete", "deletecollection", "patch", "watch"]
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: tekton-triggers-core-interceptorslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
rules:- apiGroups: [""]resources: ["secrets"]verbs: ["get", "list", "watch"]---
# Copyright 2020 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.# NOTE:  when multi-tenant EventListener progresses, moving this Role
# to a ClusterRole is not the advisable path.  Additional Roles that
# adds access to Secrets to the Namespaces managed by the multi-tenant
# EventListener is what should be done.  While not as simple, it avoids
# giving access to K8S system level, cluster admin privileged level Secretskind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: tekton-triggers-adminnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
rules:- apiGroups: ["policy"]resources: ["podsecuritypolicies"]resourceNames: ["tekton-triggers"]verbs: ["use"]
---
kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: tekton-triggers-admin-webhooknamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
rules:- apiGroups: ["policy"]resources: ["podsecuritypolicies"]resourceNames: ["tekton-triggers"]verbs: ["use"]- apiGroups: [""]resources: ["secrets"]verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
---
kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: tekton-triggers-core-interceptorsnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
rules:- apiGroups: ["policy"]resources: ["podsecuritypolicies"]resourceNames: ["tekton-triggers"]verbs: ["use"]- apiGroups: [""]resources: ["configmaps"]verbs: ["get", "list", "watch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:name: tekton-triggers-infonamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
rules:# All system:authenticated users needs to have access# of the triggers-info ConfigMap even if they don't# have access to the other resources present in the# installed namespace.- apiGroups: [""]resources: ["configmaps"]resourceNames: ["triggers-info"]verbs: ["get"]---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ServiceAccount
metadata:name: tekton-triggers-controllernamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
---
apiVersion: v1
kind: ServiceAccount
metadata:name: tekton-triggers-webhooknamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
---
apiVersion: v1
kind: ServiceAccount
metadata:name: tekton-triggers-core-interceptorsnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:name: tekton-triggers-controller-adminlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
subjects:- kind: ServiceAccountname: tekton-triggers-controllernamespace: tekton-pipelines
roleRef:kind: ClusterRolename: tekton-triggers-adminapiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:name: tekton-triggers-webhook-adminlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
subjects:- kind: ServiceAccountname: tekton-triggers-webhooknamespace: tekton-pipelines
roleRef:kind: ClusterRolename: tekton-triggers-adminapiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:name: tekton-triggers-core-interceptorslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
subjects:- kind: ServiceAccountname: tekton-triggers-core-interceptorsnamespace: tekton-pipelines
roleRef:kind: ClusterRolename: tekton-triggers-core-interceptorsapiGroup: rbac.authorization.k8s.io---
# Copyright 2020 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:name: tekton-triggers-controller-adminnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
subjects:- kind: ServiceAccountname: tekton-triggers-controllernamespace: tekton-pipelines
roleRef:kind: Rolename: tekton-triggers-adminapiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:name: tekton-triggers-webhook-adminnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
subjects:- kind: ServiceAccountname: tekton-triggers-webhooknamespace: tekton-pipelines
roleRef:kind: Rolename: tekton-triggers-admin-webhookapiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:name: tekton-triggers-core-interceptorsnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
subjects:- kind: ServiceAccountname: tekton-triggers-core-interceptorsnamespace: tekton-pipelines
roleRef:kind: Rolename: tekton-triggers-core-interceptorsapiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:name: tekton-triggers-infonamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
subjects:# Giving all system:authenticated users the access of the# ConfigMap which contains version information.- kind: Groupname: system:authenticatedapiGroup: rbac.authorization.k8s.io
roleRef:apiGroup: rbac.authorization.k8s.iokind: Rolename: tekton-triggers-info---
# Copyright 2021 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: clusterinterceptors.triggers.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"version: "v0.15.0"
spec:group: triggers.tekton.devscope: Clusternames:kind: ClusterInterceptorplural: clusterinterceptorssingular: clusterinterceptorshortNames:- cicategories:- tekton- tekton-triggersversions:- name: v1alpha1served: truestorage: trueschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: clustertriggerbindings.triggers.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"version: "v0.15.0"
spec:group: triggers.tekton.devscope: Clusternames:kind: ClusterTriggerBindingplural: clustertriggerbindingssingular: clustertriggerbindingshortNames:- ctbcategories:- tekton- tekton-triggersversions:- name: v1beta1served: truestorage: trueschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: truesubresources:status: {}- name: v1alpha1served: truestorage: falseschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: truesubresources:status: {}---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: eventlisteners.triggers.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"version: "v0.15.0"
spec:group: triggers.tekton.devscope: Namespacednames:kind: EventListenerplural: eventlistenerssingular: eventlistenershortNames:- elcategories:- tekton- tekton-triggersversions:- name: v1beta1served: truestorage: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}schema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: trueadditionalPrinterColumns:- name: Addresstype: stringjsonPath: .status.address.url- name: Availabletype: stringjsonPath: ".status.conditions[?(@.type=='Available')].status"- name: Reasontype: stringjsonPath: ".status.conditions[?(@.type=='Available')].reason"- name: Readytype: stringjsonPath: ".status.conditions[?(@.type=='Ready')].status"- name: Reasontype: stringjsonPath: ".status.conditions[?(@.type=='Ready')].reason"- name: v1alpha1served: truestorage: falseschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}additionalPrinterColumns:- name: Addresstype: stringjsonPath: .status.address.url- name: Availabletype: stringjsonPath: ".status.conditions[?(@.type=='Available')].status"- name: Reasontype: stringjsonPath: ".status.conditions[?(@.type=='Available')].reason"- name: Readytype: stringjsonPath: ".status.conditions[?(@.type=='Ready')].status"- name: Reasontype: stringjsonPath: ".status.conditions[?(@.type=='Ready')].reason"---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: triggers.triggers.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"version: "v0.15.0"
spec:group: triggers.tekton.devscope: Namespacednames:kind: Triggerplural: triggerssingular: triggershortNames:- tricategories:- tekton- tekton-triggersversions:- name: v1beta1served: truestorage: trueschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: truesubresources:status: {}- name: v1alpha1served: truestorage: falseschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: triggerbindings.triggers.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"version: "v0.15.0"
spec:group: triggers.tekton.devscope: Namespacednames:kind: TriggerBindingplural: triggerbindingssingular: triggerbindingshortNames:- tbcategories:- tekton- tekton-triggersversions:- name: v1beta1served: truestorage: trueschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}- name: v1alpha1served: truestorage: falseschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:name: triggertemplates.triggers.tekton.devlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"version: "v0.15.0"
spec:group: triggers.tekton.devscope: Namespacednames:kind: TriggerTemplateplural: triggertemplatessingular: triggertemplateshortNames:- ttcategories:- tekton- tekton-triggersversions:- name: v1beta1served: truestorage: trueschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}- name: v1alpha1served: truestorage: falseschema:openAPIV3Schema:type: object# One can use x-kubernetes-preserve-unknown-fields: true# at the root of the schema (and inside any properties, additionalProperties)# to get the traditional CRD behaviour that nothing is pruned, despite# setting spec.preserveUnknownProperties: false.## See https://kubernetes.io/blog/2019/06/20/crd-structural-schema/# See issue: https://github.com/knative/serving/issues/912x-kubernetes-preserve-unknown-fields: true# Opt into the status subresource so metadata.generation# starts to incrementsubresources:status: {}---
# Copyright 2020 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: Secret
metadata:name: triggers-webhook-certsnamespace: tekton-pipelineslabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"
# The data is populated at install time.
---
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:name: validation.webhook.triggers.tekton.devlabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"
webhooks:- admissionReviewVersions:- v1beta1- v1clientConfig:service:name: tekton-triggers-webhooknamespace: tekton-pipelinesfailurePolicy: FailsideEffects: Nonename: validation.webhook.triggers.tekton.dev
---
apiVersion: admissionregistration.k8s.io/v1
kind: MutatingWebhookConfiguration
metadata:name: webhook.triggers.tekton.devlabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"
webhooks:- admissionReviewVersions:- v1beta1- v1clientConfig:service:name: tekton-triggers-webhooknamespace: tekton-pipelinesfailurePolicy: FailsideEffects: Nonename: webhook.triggers.tekton.dev
---
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:name: config.webhook.triggers.tekton.devlabels:app.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"
webhooks:- admissionReviewVersions:- v1beta1- v1clientConfig:service:name: tekton-triggers-webhooknamespace: tekton-pipelinesfailurePolicy: FailsideEffects: Nonename: config.webhook.triggers.tekton.devnamespaceSelector:matchExpressions:- key: triggers.tekton.dev/releaseoperator: Exists---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:name: tekton-triggers-aggregate-editlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggersrbac.authorization.k8s.io/aggregate-to-edit: "true"rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules:- apiGroups:- triggers.tekton.devresources:- clustertriggerbindings- clusterinterceptors- eventlisteners- triggers- triggerbindings- triggertemplatesverbs:- create- delete- deletecollection- get- list- patch- update- watch---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:name: tekton-triggers-aggregate-viewlabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggersrbac.authorization.k8s.io/aggregate-to-view: "true"
rules:- apiGroups:- triggers.tekton.devresources:- clustertriggerbindings- clusterinterceptors- eventlisteners- triggers- triggerbindings- triggertemplatesverbs:- get- list- watch---
# Copyright 2021 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ConfigMap
metadata:name: triggers-infonamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
data:# Contains triggers version which can be queried by external# tools such as CLI. Elevated permissions are already given to# this ConfigMap such that even if we don't have access to# other resources in the namespace we still can have access to# this ConfigMap.version: "v0.15.0"---
# Copyright 2019 Tekton Authors LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ConfigMap
metadata:name: config-logging-triggersnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
data:# Common configuration for all knative codebasezap-logger-config: |{"level": "info","development": false,"sampling": {"initial": 100,"thereafter": 100},"outputPaths": ["stdout"],"errorOutputPaths": ["stderr"],"encoding": "json","encoderConfig": {"timeKey": "ts","levelKey": "level","nameKey": "logger","callerKey": "caller","messageKey": "msg","stacktraceKey": "stacktrace","lineEnding": "","levelEncoder": "","timeEncoder": "iso8601","durationEncoder": "","callerEncoder": ""}}# Log level overridesloglevel.controller: "info"loglevel.webhook: "info"loglevel.eventlistener: "info"---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: ConfigMap
metadata:name: config-observability-triggersnamespace: tekton-pipelineslabels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers
data:_example: |#################################                              ##    EXAMPLE CONFIGURATION     ##                              ################################## This block is not actually functional configuration,# but serves to illustrate the available configuration# options and document them in a way that is accessible# to users that `kubectl edit` this config map.## These sample configuration options may be copied out of# this example block and unindented to be in the data block# to actually change the configuration.# metrics.backend-destination field specifies the system metrics destination.# It supports either prometheus (the default) or stackdriver.# Note: Using stackdriver will incur additional chargesmetrics.backend-destination: prometheus# metrics.stackdriver-project-id field specifies the stackdriver project ID. This# field is optional. When running on GCE, application default credentials will be# used if this field is not provided.metrics.stackdriver-project-id: "<your stackdriver project id>"# metrics.allow-stackdriver-custom-metrics indicates whether it is allowed to send metrics to# Stackdriver using "global" resource type and custom metric type if the# metrics are not supported by "knative_revision" resource type. Setting this# flag to "true" could cause extra Stackdriver charge.# If metrics.backend-destination is not Stackdriver, this is ignored.metrics.allow-stackdriver-custom-metrics: "false"---
# Copyright 2019 Tekton Authors LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: Service
metadata:labels:app.kubernetes.io/name: controllerapp.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.15.0"app.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"app: tekton-triggers-controllerversion: "v0.15.0"name: tekton-triggers-controllernamespace: tekton-pipelines
spec:ports:- name: http-metricsport: 9000protocol: TCPtargetPort: 9000selector:app.kubernetes.io/name: controllerapp.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apps/v1
kind: Deployment
metadata:name: tekton-triggers-controllernamespace: tekton-pipelineslabels:app.kubernetes.io/name: controllerapp.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.15.0"app.kubernetes.io/part-of: tekton-triggers# tekton.dev/release value replaced with inputs.params.versionTag in triggers/tekton/publish.yamltriggers.tekton.dev/release: "v0.15.0"
spec:replicas: 1selector:matchLabels:app.kubernetes.io/name: controllerapp.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstemplate:metadata:annotations:cluster-autoscaler.kubernetes.io/safe-to-evict: "false"labels:app.kubernetes.io/name: controllerapp.kubernetes.io/component: controllerapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.15.0"app.kubernetes.io/part-of: tekton-triggersapp: tekton-triggers-controllertriggers.tekton.dev/release: "v0.15.0"# version value replaced with inputs.params.versionTag in triggers/tekton/publish.yamlversion: "v0.15.0"spec:serviceAccountName: tekton-triggers-controllercontainers:- name: tekton-triggers-controllerimage: "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-triggers-controller:v0.15.0"args: ["-logtostderr", "-stderrthreshold", "INFO", "-el-image", "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-triggers-eventlistenersink:v0.15.0", "-el-port", "8080", "-el-readtimeout", "5", "-el-writetimeout", "40", "-el-idletimeout", "120", "-el-timeouthandler", "30", "-period-seconds", "10", "-failure-threshold", "1"]env:- name: SYSTEM_NAMESPACEvalueFrom:fieldRef:fieldPath: metadata.namespace- name: CONFIG_LOGGING_NAMEvalue: config-logging-triggers- name: CONFIG_OBSERVABILITY_NAMEvalue: config-observability-triggers- name: METRICS_DOMAINvalue: tekton.dev/triggers- name: METRICS_PROMETHEUS_PORTvalue: "9000"securityContext:allowPrivilegeEscalation: false# User 65532 is the distroless nonroot user IDrunAsUser: 65532---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: v1
kind: Service
metadata:name: tekton-triggers-webhooknamespace: tekton-pipelineslabels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.15.0"app.kubernetes.io/part-of: tekton-triggersapp: tekton-triggers-webhookversion: "v0.15.0"triggers.tekton.dev/release: "v0.15.0"
spec:ports:- name: https-webhookport: 443targetPort: 8443selector:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers---
# Copyright 2019 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apps/v1
kind: Deployment
metadata:name: tekton-triggers-webhooknamespace: tekton-pipelineslabels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.15.0"app.kubernetes.io/part-of: tekton-triggers# tekton.dev/release value replaced with inputs.params.versionTag in triggers/tekton/publish.yamltriggers.tekton.dev/release: "v0.15.0"
spec:replicas: 1selector:matchLabels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstemplate:metadata:annotations:cluster-autoscaler.kubernetes.io/safe-to-evict: "false"labels:app.kubernetes.io/name: webhookapp.kubernetes.io/component: webhookapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.15.0"app.kubernetes.io/part-of: tekton-triggersapp: tekton-triggers-webhooktriggers.tekton.dev/release: "v0.15.0"# version value replaced with inputs.params.versionTag in triggers/tekton/publish.yamlversion: "v0.15.0"spec:serviceAccountName: tekton-triggers-webhookcontainers:- name: webhook# This is the Go import path for the binary that is containerized# and substituted here.image: "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-triggers-webhook:v0.15.0"env:- name: SYSTEM_NAMESPACEvalueFrom:fieldRef:fieldPath: metadata.namespace- name: CONFIG_LOGGING_NAMEvalue: config-logging-triggers- name: WEBHOOK_SERVICE_NAMEvalue: tekton-triggers-webhook- name: WEBHOOK_SECRET_NAMEvalue: triggers-webhook-certs- name: METRICS_DOMAINvalue: tekton.dev/triggersports:- name: metricscontainerPort: 9000- name: profilingcontainerPort: 8008- name: https-webhookcontainerPort: 8443securityContext:allowPrivilegeEscalation: false# User 65532 is the distroless nonroot user IDrunAsUser: 65532---
# Copyright 2020 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: apps/v1
kind: Deployment
metadata:name: tekton-triggers-core-interceptorsnamespace: tekton-pipelineslabels:app.kubernetes.io/name: core-interceptorsapp.kubernetes.io/component: interceptorsapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.15.0"app.kubernetes.io/part-of: tekton-triggers# tekton.dev/release value replaced with inputs.params.versionTag in triggers/tekton/publish.yamltriggers.tekton.dev/release: "v0.15.0"
spec:replicas: 1selector:matchLabels:app.kubernetes.io/name: core-interceptorsapp.kubernetes.io/component: interceptorsapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggerstemplate:metadata:labels:app.kubernetes.io/name: core-interceptorsapp.kubernetes.io/component: interceptorsapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.15.0"app.kubernetes.io/part-of: tekton-triggersapp: tekton-triggers-core-interceptorstriggers.tekton.dev/release: "v0.15.0"# version value replaced with inputs.params.versionTag in triggers/tekton/publish.yamlversion: "v0.15.0"spec:serviceAccountName: tekton-triggers-core-interceptorscontainers:- name: tekton-triggers-core-interceptorsimage: "registry.cn-hangzhou.aliyuncs.com/coolops/tekton-triggers-interceptors:v0.15.0"args: ["-logtostderr", "-stderrthreshold", "INFO"]env:- name: SYSTEM_NAMESPACEvalueFrom:fieldRef:fieldPath: metadata.namespace- name: CONFIG_LOGGING_NAMEvalue: config-logging-triggers- name: CONFIG_OBSERVABILITY_NAMEvalue: config-observability-triggers- name: METRICS_DOMAINvalue: tekton.dev/triggersreadinessProbe:httpGet:path: /readyport: 8082scheme: HTTPinitialDelaySeconds: 5periodSeconds: 10timeoutSeconds: 5securityContext:allowPrivilegeEscalation: false# User 65532 is the distroless nonroot user IDrunAsUser: 65532runAsGroup: 65532capabilities:drop:- all
---
apiVersion: v1
kind: Service
metadata:labels:app.kubernetes.io/name: tekton-triggers-core-interceptorsapp.kubernetes.io/component: interceptorsapp.kubernetes.io/instance: defaultapp.kubernetes.io/version: "v0.15.0"app.kubernetes.io/part-of: tekton-triggerstriggers.tekton.dev/release: "v0.15.0"app: tekton-triggers-core-interceptorsversion: "v0.15.0"name: tekton-triggers-core-interceptorsnamespace: tekton-pipelines
spec:ports:- name: "http"port: 80targetPort: 8082selector:app.kubernetes.io/name: core-interceptorsapp.kubernetes.io/component: interceptorsapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-triggers---
# Copyright 2021 The Tekton Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.apiVersion: triggers.tekton.dev/v1alpha1
kind: ClusterInterceptor
metadata:name: cel
spec:clientConfig:service:name: tekton-triggers-core-interceptorsnamespace: tekton-pipelinespath: "cel"
---
apiVersion: triggers.tekton.dev/v1alpha1
kind: ClusterInterceptor
metadata:name: bitbucket
spec:clientConfig:service:name: tekton-triggers-core-interceptorsnamespace: tekton-pipelinespath: "bitbucket"
---
apiVersion: triggers.tekton.dev/v1alpha1
kind: ClusterInterceptor
metadata:name: github
spec:clientConfig:service:name: tekton-triggers-core-interceptorsnamespace: tekton-pipelinespath: "github"
---
apiVersion: triggers.tekton.dev/v1alpha1
kind: ClusterInterceptor
metadata:name: gitlab
spec:clientConfig:service:name: tekton-triggers-core-interceptorsnamespace: tekton-pipelinespath: "gitlab"---

安装DASHBORD

apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:labels:app.kubernetes.io/component: dashboardapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-dashboardname: extensions.dashboard.tekton.dev
spec:group: dashboard.tekton.devnames:categories:- tekton- tekton-dashboardkind: Extensionplural: extensionsshortNames:- ext- extspreserveUnknownFields: falsescope: Namespacedversions:- additionalPrinterColumns:- jsonPath: .spec.apiVersionname: API versiontype: string- jsonPath: .spec.namename: Kindtype: string- jsonPath: .spec.displaynamename: Display nametype: string- jsonPath: .metadata.creationTimestampname: Agetype: datename: v1alpha1schema:openAPIV3Schema:type: objectx-kubernetes-preserve-unknown-fields: trueserved: truestorage: truesubresources:status: {}
---
apiVersion: v1
kind: ServiceAccount
metadata:labels:app.kubernetes.io/component: dashboardapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-dashboardname: tekton-dashboardnamespace: tekton-pipelines
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:labels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-dashboardname: tekton-dashboard-infonamespace: tekton-pipelines
rules:- apiGroups:- ""resourceNames:- dashboard-inforesources:- configmapsverbs:- get
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:labels:app.kubernetes.io/component: dashboardapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-dashboardname: tekton-dashboard-backend
rules:- apiGroups:- apiextensions.k8s.ioresources:- customresourcedefinitionsverbs:- get- list- apiGroups:- security.openshift.ioresources:- securitycontextconstraintsverbs:- use- apiGroups:- tekton.devresources:- clustertasks- clustertasks/statusverbs:- get- list- watch- apiGroups:- triggers.tekton.devresources:- clusterinterceptors- clustertriggerbindingsverbs:- get- list- watch- apiGroups:- ""resources:- serviceaccountsverbs:- get- list- watch- apiGroups:- dashboard.tekton.devresources:- extensionsverbs:- create- update- delete- patch- apiGroups:- tekton.devresources:- clustertasks- clustertasks/statusverbs:- create- update- delete- patch- apiGroups:- triggers.tekton.devresources:- clusterinterceptors- clustertriggerbindingsverbs:- create- update- delete- patch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:labels:app.kubernetes.io/component: dashboardapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-dashboardname: tekton-dashboard-tenant
rules:- apiGroups:- dashboard.tekton.devresources:- extensionsverbs:- get- list- watch- apiGroups:- ""resources:- events- namespaces- pods- pods/logverbs:- get- list- watch- apiGroups:- tekton.devresources:- tasks- taskruns- pipelines- pipelineruns- pipelineresources- conditions- tasks/status- taskruns/status- pipelines/status- pipelineruns/status- taskruns/finalizers- pipelineruns/finalizersverbs:- get- list- watch- apiGroups:- triggers.tekton.devresources:- eventlisteners- triggerbindings- triggers- triggertemplatesverbs:- get- list- watch- apiGroups:- tekton.devresources:- tasks- taskruns- pipelines- pipelineruns- pipelineresources- conditions- taskruns/finalizers- pipelineruns/finalizers- tasks/status- taskruns/status- pipelines/status- pipelineruns/statusverbs:- create- update- delete- patch- apiGroups:- triggers.tekton.devresources:- eventlisteners- triggerbindings- triggers- triggertemplatesverbs:- create- update- delete- patch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:labels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-dashboardname: tekton-dashboard-infonamespace: tekton-pipelines
roleRef:apiGroup: rbac.authorization.k8s.iokind: Rolename: tekton-dashboard-info
subjects:- apiGroup: rbac.authorization.k8s.iokind: Groupname: system:authenticated
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:labels:app.kubernetes.io/component: dashboardapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-dashboardname: tekton-dashboard-backend
roleRef:apiGroup: rbac.authorization.k8s.iokind: ClusterRolename: tekton-dashboard-backend
subjects:- kind: ServiceAccountname: tekton-dashboardnamespace: tekton-pipelines
---
apiVersion: v1
data:version: v0.24.1
kind: ConfigMap
metadata:labels:app.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-dashboardname: dashboard-infonamespace: tekton-pipelines
---
apiVersion: v1
kind: Service
metadata:labels:app: tekton-dashboardapp.kubernetes.io/component: dashboardapp.kubernetes.io/instance: defaultapp.kubernetes.io/name: dashboardapp.kubernetes.io/part-of: tekton-dashboardapp.kubernetes.io/version: v0.24.1dashboard.tekton.dev/release: v0.24.1version: v0.24.1name: tekton-dashboardnamespace: tekton-pipelines
spec:ports:- name: httpport: 9097protocol: TCPtargetPort: 9097selector:app.kubernetes.io/component: dashboardapp.kubernetes.io/instance: defaultapp.kubernetes.io/name: dashboardapp.kubernetes.io/part-of: tekton-dashboard
---
apiVersion: apps/v1
kind: Deployment
metadata:labels:app: tekton-dashboardapp.kubernetes.io/component: dashboardapp.kubernetes.io/instance: defaultapp.kubernetes.io/name: dashboardapp.kubernetes.io/part-of: tekton-dashboardapp.kubernetes.io/version: v0.24.1dashboard.tekton.dev/release: v0.24.1version: v0.24.1name: tekton-dashboardnamespace: tekton-pipelines
spec:replicas: 1selector:matchLabels:app.kubernetes.io/component: dashboardapp.kubernetes.io/instance: defaultapp.kubernetes.io/name: dashboardapp.kubernetes.io/part-of: tekton-dashboardtemplate:metadata:labels:app: tekton-dashboardapp.kubernetes.io/component: dashboardapp.kubernetes.io/instance: defaultapp.kubernetes.io/name: dashboardapp.kubernetes.io/part-of: tekton-dashboardapp.kubernetes.io/version: v0.24.1name: tekton-dashboardspec:containers:- args:- --port=9097- --logout-url=- --pipelines-namespace=tekton-pipelines- --triggers-namespace=tekton-pipelines- --read-only=false- --log-level=info- --log-format=json- --namespace=- --stream-logs=true- --external-logs=env:- name: INSTALLED_NAMESPACEvalueFrom:fieldRef:fieldPath: metadata.namespaceimage: registry.cn-hangzhou.aliyuncs.com/coolops/tekton-dashboard:v0.24.1livenessProbe:httpGet:path: /healthport: 9097name: tekton-dashboardports:- containerPort: 9097readinessProbe:httpGet:path: /readinessport: 9097nodeSelector:kubernetes.io/os: linuxsecurityContext:runAsNonRoot: truerunAsUser: 65532serviceAccountName: tekton-dashboardvolumes: []---
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:labels:app.kubernetes.io/component: dashboardapp.kubernetes.io/instance: defaultapp.kubernetes.io/part-of: tekton-dashboardname: tekton-dashboard-tenant
roleRef:apiGroup: rbac.authorization.k8s.iokind: ClusterRolename: tekton-dashboard-tenant
subjects:- kind: ServiceAccountname: tekton-dashboardnamespace: tekton-pipelines

查看pod是否启动

[root@k8s-master v0.18.1]# kubectl get pod,svc,deployment -n tekton-pipelines
NAME                                                     READY   STATUS    RESTARTS   AGE
pod/tekton-dashboard-5cc6fbd6f8-cr624                    1/1     Running   0          37m
pod/tekton-pipelines-controller-6fff69f45d-5lc8c         1/1     Running   0          43m
pod/tekton-pipelines-webhook-6748d8d578-whr59            1/1     Running   0          43m
pod/tekton-triggers-controller-686c6c8f79-gvj5n          1/1     Running   0          41m
pod/tekton-triggers-core-interceptors-6874547db8-bktk7   1/1     Running   0          41m
pod/tekton-triggers-webhook-76c55d6799-25m2g             1/1     Running   0          41mNAME                                        TYPE        CLUSTER-IP      EXTERNAL-IP   PORT(S)                              AGE
service/tekton-dashboard                    NodePort    10.96.254.157   <none>        9097:30416/TCP                       37m
service/tekton-pipelines-controller         ClusterIP   10.96.119.34    <none>        9090/TCP,8080/TCP                    43m
service/tekton-pipelines-webhook            ClusterIP   10.96.44.32     <none>        9090/TCP,8008/TCP,443/TCP,8080/TCP   43m
service/tekton-triggers-controller          ClusterIP   10.96.193.24    <none>        9000/TCP                             41m
service/tekton-triggers-core-interceptors   ClusterIP   10.96.227.160   <none>        80/TCP                               41m
service/tekton-triggers-webhook             ClusterIP   10.96.50.245    <none>        443/TCP                              41mNAME                                                READY   UP-TO-DATE   AVAILABLE   AGE
deployment.apps/tekton-dashboard                    1/1     1            1           37m
deployment.apps/tekton-pipelines-controller         1/1     1            1           43m
deployment.apps/tekton-pipelines-webhook            1/1     1            1           43m
deployment.apps/tekton-triggers-controller          1/1     1            1           41m
deployment.apps/tekton-triggers-core-interceptors   1/1     1            1           41m
deployment.apps/tekton-triggers-webhook             1/1     1            1           41m

 浏览器访问dashbord

http://www.dtcms.com/wzjs/184730.html

相关文章:

  • 关于协会网站建设的几点思考河南郑州网站推广优化
  • 网站建设的费用是多少钱哪里有软件培训班
  • wordpress显示评论者地理位置 浏览器株洲seo优化
  • delphi intraweb做网站seodao cn
  • 常州网站制作价格俄罗斯搜索引擎推广
  • 做网站费用上海上海发布微信公众号
  • 网站建设公司湖南搜索指数的数据来源是什么
  • 蚌埠网站建设公司cztv新榜数据平台
  • 自助做网站哪家好seo推广软件代理
  • 代做网站多少钱兰蔻搜索引擎营销案例
  • 深圳网站改版公司怎么样引流顾客到店方法
  • 如何看到网站做哪些关键字seo培训网的优点是
  • 怎么用手机做网站服务器空间刷赞网站推广
  • 免费 企业网站管理系统百度竞价关键词优化
  • 昆明做网站做的好的公司网络软文营销
  • 河南怎样做网站推广百度客服人工
  • php构建网站如何开始渠道推广平台
  • 浩方网络网站建设app如何推广
  • 国际网站如何做seoseo项目
  • 480元做网站网站设计与制作
  • 深圳网页设计师公司优化网站的目的
  • 中国商务网官网重庆排名seo公司
  • 塘下网站建设公司在百度怎么推广
  • 大众点评如何做团购网站郑州做网站推广
  • 手机在线建网站百度快照如何优化
  • 农业科技公司网站案例网站多少钱
  • 0元可以注册公司吗广州网站优化外包
  • 做粉丝网站会侵权吗新站点seo联系方式
  • 博客网站主页代码html线上营销渠道
  • 鸿蒙app开发工具seo搜索优化招聘