-
Updated
Nov 7, 2021 - Java
cicd
Here are 1,628 public repositories matching this topic...
-
Updated
Oct 3, 2021 - JavaScript
Spug案例征集
Spug运维平台在过去的公司里稳定运行3年以上,开源的大部分代码也是基于稳定版本之上,为了增加更多用户在企业使用的信心,如您愿意,请将您在企业中使用Spug的案例展示给我们,请在该issue页面提供您的使用案例,提交格式:企业名称 + 公司官网地址。官网地址为可选项,您可以直接提供企业名称即可。
此外,您也可以通过其他渠道如QQ、微信、邮件的方式联系项目作者提供使用案例。
征集长期有效,感谢大家支持!
Spug部分案例:
- 上海家谐网络科技有限公司
- 上海爱上慧家信息技术有限公司
- 南京白鸥网络技术有限公司
- 杭州中艺实业股份有限公司
- [北京步鼎方舟科技有限公司](http://
While struggling around with ingress (#2546) I figured out some inconsistencies. For most k8s services it is possible to override args or configs. But for ingress this doesn't work.
It should be possible to customize enable.{my-service} and {my-service}.yaml by having a local copy in:
/var/snap/microk8s/current/microk8s-resources/
But this doesn't seem to work.
SUMMARY
I just faced an embarrassed problem that command st2 action list keeps return 503.
I tried st2 --debug action list and the result in line HTTP_PROXY(uppercase) was empty. This mislead me that the proxy info was set(which is not).
I finally found that the root cause is a lowercase http_proxy env variable was set in the system.
So I think it maybe more friend
Summary
When creating docker images for Java applications in the current setup in Jenkins-X the application and all dependencies are all placed in one jar file, meaning it will be in one layer in the docker image.
This means that when new versions of the application are created the unchanged dependencies can't be reused.
It would be a great enhancement if the application code where p
CML_ env namespace
Use CML_TOKEN instead of REPO_TOKEN to
- avoid potential namespace clashes
- better reflect that it could be a project token, org token, bot token, encoded username & password, etc
- better reflect that it's mostly used to launch runners and also is used by runners
- from iterative/cml.dev#122 (comment)
- related #738, #741, #712
-
Updated
Nov 7, 2021 - TypeScript
-
Updated
Nov 7, 2021 - Shell
https://github.com/google/starlark-go/blob/master/doc/spec.md
It should satisfy our reproducibility needs (like jsonnet) and could be easier to write agola config files.
Like in #137 we should provide build context information.
-
Updated
Nov 8, 2021 - Go
-
Updated
Jan 5, 2021 - Go
-
Updated
Nov 4, 2021 - Shell
Similar but different from #991:
We have lots and lots of x86_64 AMIs and software, as I expect most people do. I also know that this module generates a Launch Template for spawning new instances.
I'd be interested in a tutorial (whenever, if ever this support exists) that explains how to set up scalable arm64 instances (assuming I/we have an arm64 AMI) so that certain jobs can specify
-
Updated
Nov 1, 2021 - Go
-
Updated
Nov 6, 2021 - Python
-
Updated
Oct 20, 2021 - Go
-
Updated
Nov 7, 2021 - Python
-
Updated
Sep 14, 2021 - Scala
Hi,
We are using terraform-aws-gitlab-runnner to spin up GitLab runners on our AWS account. As part of security auditing, there was a severe alert raised on this policy created by terraform module: https://github.com/npalm/terraform-aws-gitlab-runner/blob/develop/policies/instance-docker-machine-policy.json#L21
The problem lies with permitting IamPassrole action on all resources. As per
-
Updated
Mar 5, 2021 - Objective-C
-
Updated
Oct 26, 2021 - Python
Improve this page
Add a description, image, and links to the cicd topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cicd topic, visit your repo's landing page and select "manage topics."
Summary
Many users run Argo CD in a mode where that Argo CD instance doesn't ever need or want to deploy Applications to the same cluster Argo CD is running in (e.g. Intuit does this). For these users, the
https://kubernetes.default.svcshould be disabled and removed as an option.Motivation
The ability to disable https://kubernetes.default.svc is both a security improvement as wel