Skip to content
This repository has been archived by the owner on May 31, 2022. It is now read-only.

Latest commit

 

History

History
46 lines (29 loc) · 3.36 KB

CI_CD.md

File metadata and controls

46 lines (29 loc) · 3.36 KB

CI/CD Process

This page describes the Continuous Integration/Continuous Delivery configuration for this project. It is implemented using Github Actions (stored in .github/workflows). It is composed of two workflows:

  • Build, Lint and Test. This is run for every pull request that is merged into master. It is described in build.yml. It performs the following steps on the "cross product" of Go versions (1.14, 1.15) and target OS (Linux, MacOS):

    1. Setup Go (for the specific version)
    2. Get all of the Go source code for this repository
    3. Collect all of the dependent Go modules
    4. Build the project
    5. Run Lint
    6. Run the automated unit test suite

    If any step fails, the overall process fails.

  • Release. This is run whenever a new tag is pushed. This indicates the completion of a phase of development which can be shared as a specific version. It is described in release.yml. This workflow is executed on a MacOS runner and performs the following steps:

    1. Setup Go (currently: 1.15)
    2. Get all of the Go source code for this repository
    3. Collect all of the dependent Go modules
    4. Import the Code Signing Certificates into the Keychain (for details, see the section on "Code Signing and Notarization")
    5. Install the gon tool via HomeBrew. This does the actual signing and notarization. The configuration file for gon is gon.hcl.
    6. Invoke goreleaser to construct the binary and invoke gon. The configuration file for goreleaser is .goreleaser.yml.

    Of course, if any step fails, the overall workflow fails.

Code Signing and Notarization

The MacOS operating system (starting with Catalina) is much more strict as it relates to allowing binaries from the Internet to be downloaded and run. To allow the cloud-resource-counter binary to be run on customer's machine, the customer must allow binaries from "identified developers" and our binary needs to be "signed and notarized".

The process of code signing involves Apple Services to complete (along with an Apple ID account and an Apple Developer ID Application certificate).

For details, see Notarizing macOS Software Before Distribution.

Here is how we implement this process in our Release workflow:

  1. We use an open source tool called gon (Github) which is a command line tool for MacOS signing and notarization.

  2. This tool is invoked as part of an open source tool called goreleaser (website). This tool has the ability to compile Go source code for a number of different target operating systems.

  3. Rather than put any sensitive data in our open source files, we store all this information as Github Secrets, which are only accessible to administrators of this repository. There are currently four relevant secrets:

    • AC_USERNAME and AC_PASSWORD: These are the user name and password to be used in the signing process. These credentials refer to a register Apple ID account.
    • APPLE_DEVELOPER_CERTIFICATE_P12_BASE64 and APPLE_DEVELOPER_CERTIFICATE_PASSWORD: These are the base64 certificate and password for the associated Apple Developer ID Application certificate.
  4. The SHA-1 hash for the Apple Developer ID Application certificate is stored in the gon.hcl file as part of the application_identity object.