Generate a random password for verifying HTTP requests from GitHub to your WebHook endpoint:
openssl rand -hex 20 > /path/to/hook_secretDecide the GitHub repository named for the demo:
ORG=mumoshu # Replace with your org name!| apiVersion: apps/v1 | |
| kind: Deployment | |
| metadata: | |
| labels: | |
| app: testapp | |
| name: testapp | |
| spec: | |
| replicas: 1 | |
| selector: | |
| matchLabels: |
| apiVersion: appmesh.k8s.aws/v1alpha1 | |
| kind: VirtualNode | |
| metadata: | |
| # Matches APPMESH_VIRTUAL_NODE_NAME=mesh/global/virtualNode/podinfo-demo envvar injected to pods by appmesh-inject | |
| # so that appmesh-controller can locate this virtual node from the pod | |
| name: podinfo | |
| namespace: demo | |
| spec: | |
| meshName: global | |
| listeners: |
| #!/usr/bin/env bash | |
| set -e | |
| if eksctl get cluster -f $FILE >/dev/null 2>&1; then | |
| # See https://github.com/weaveworks/eksctl/blob/33ec1ed967c1ad03c985bf18774ea970d85c86f1/site/content/usage/03-cluster-upgrade.md#L41 | |
| eksctl update cluster -f $FILE | |
| eksctl utils update-kube-proxy | |
| eksctl utils update-aws-node | |
| eksctl utils update-coredns |
| #!/bin/bash | |
| set -e | |
| if [ ! -z "$DEBUG" ]; then | |
| set -vx | |
| fi | |
| kubectl get po -a --all-namespaces | grep -v ^NAME | fzf | awk '{ print $1, $2 }' > ns-pod |
| name: 'VariantRun' | |
| description: 'Run Variant task defined in your Variantfile https://github.com/mumoshu/variant' | |
| inputs: | |
| image: | |
| description: 'Docker image for Variant containers' | |
| required: false | |
| default: 'Dockerfile' | |
| runs: | |
| using: 'docker' | |
| image: '${{ inputs.image }}' |
| $ HELM_HOME=$HOME/Library/helm make install | |
| scripts/update-gofmt.sh | |
| scripts/verify-gofmt.sh | |
| scripts/verify-golint.sh | |
| scripts/verify-govet.sh | |
| + go vet ./pkg/... | |
| go: warning: "./pkg/..." matched no packages | |
| no packages to vet | |
| + go vet ./cmd/... | |
| # github.com/databus23/helm-diff/vendor/github.com/deislabs/oras/pkg/context |
Generate a random password for verifying HTTP requests from GitHub to your WebHook endpoint:
openssl rand -hex 20 > /path/to/hook_secretDecide the GitHub repository named for the demo:
ORG=mumoshu # Replace with your org name!| $ goweight ./ | |
| 5.7 MB github.com/aws/aws-sdk-go/service/s3 | |
| 3.8 MB net/http | |
| 3.3 MB runtime | |
| 1.9 MB golang.org/x/net/http2 | |
| 1.8 MB github.com/golang/protobuf/proto | |
| 1.8 MB net | |
| 1.8 MB crypto/tls | |
| 1.7 MB google.golang.org/api/storage/v1 | |
| 1.5 MB github.com/aws/aws-sdk-go/aws/endpoints |
| #!/usr/bin/env variant | |
| mixins: | |
| cluster: &cluster | |
| type: object | |
| properties: | |
| vpc-private-subnets: | |
| type: array | |
| vpc-public-subnets: | |
| type: array |
I'm doing GitOps(https://www.weave.works/blog/gitops-operations-by-pull-request). Personally I've been using brigade and atlantis for their respective sweet-spots.
However, all the existing solutions had required me to maintain machines to host them. Something that works in long term without my hand is always appreciated.
I'd like it a lot if Codefresh added "Slack" or more generically "Webhook" as pipeline triggers.