/*
For Ubuntu users; do not use snap to install docker as it can create permission issues when working with minikube. */
This section describes how to build VMware Secrets Manager from source.
For a more detailed walkthrough about how to contribute to VMware Secrets Manager, see the Contributing section.
Make you have the following installed on your system:
Make sure your Go environment is set up.
Here are some important environment settings that you might want to double check:
go env
GO111MODULE=''
GOEXE=''
GONOPROXY=''
GONOSUMDB=''
GOPATH='/$USER/packages/go'
GOPRIVATE=''
GOPROXY='https://proxy.golang.org,direct'
GOROOT='/usr/local/go'
GOSUMDB='sum.golang.org'
GOTOOLCHAIN='auto'
cd $WORKSPACE
git clone https://github.com/vmware-tanzu/secrets-manager.git
cd secrets-manager
Make sure you have a running local Docker daemon and execute the following:
make build-local
You might need to generate the protocol buffers if you are working on the VSecM API. To do so, execute the following:
make generate-proto-files
If this command fails, you might need to install the protoc
compiler:
go install google.golang.org/protobuf/cmd/protoc-gen-go@latest
go install google.golang.org/grpc/cmd/protoc-gen-go-grpc@latest
After installation ensure that protoc-gen-go
and protoc-gen-go-grpc
is
in your $PATH
. If you set up your Go development enviornment, this should
already be the case.
If the project fails to build, you might need to update the vendor dependencies. To do so, execute the following on the project root:
cd $WORKSPACE/secrets-manager
go mod tidy
go mod vendor
That’s it 🎉. You now have images of VMware Secrets Manager and other related components built locally on your Docker registry.
For a more detailed guide about how you can use these local container images in your custer check out the Contributing section.