-
Updated
Nov 15, 2021 - Java
cicd
Here are 1,635 public repositories matching this topic...
-
Updated
Oct 3, 2021 - JavaScript
Spug案例征集
Spug运维平台在过去的公司里稳定运行3年以上,开源的大部分代码也是基于稳定版本之上,为了增加更多用户在企业使用的信心,如您愿意,请将您在企业中使用Spug的案例展示给我们,请在该issue页面提供您的使用案例,提交格式:企业名称 + 公司官网地址。官网地址为可选项,您可以直接提供企业名称即可。
此外,您也可以通过其他渠道如QQ、微信、邮件的方式联系项目作者提供使用案例。
征集长期有效,感谢大家支持!
Spug部分案例:
- 上海家谐网络科技有限公司
- 上海爱上慧家信息技术有限公司
- 南京白鸥网络技术有限公司
- 杭州中艺实业股份有限公司
- [北京步鼎方舟科技有限公司](http://
While struggling around with ingress (#2546) I figured out some inconsistencies. For most k8s services it is possible to override args or configs. But for ingress this doesn't work.
It should be possible to customize enable.{my-service} and {my-service}.yaml by having a local copy in:
/var/snap/microk8s/current/microk8s-resources/
But this doesn't seem to work.
SUMMARY
I just faced an embarrassed problem that command st2 action list keeps return 503.
I tried st2 --debug action list and the result in line HTTP_PROXY(uppercase) was empty. This mislead me that the proxy info was set(which is not).
I finally found that the root cause is a lowercase http_proxy env variable was set in the system.
So I think it maybe more friend
Summary
When creating docker images for Java applications in the current setup in Jenkins-X the application and all dependencies are all placed in one jar file, meaning it will be in one layer in the docker image.
This means that when new versions of the application are created the unchanged dependencies can't be reused.
It would be a great enhancement if the application code where p
CML_ env namespace
Use CML_TOKEN instead of REPO_TOKEN to
- avoid potential namespace clashes
- better reflect that it could be a project token, org token, bot token, encoded username & password, etc
- better reflect that it's mostly used to launch runners and also is used by runners
- from iterative/cml.dev#122 (comment)
- related #738, #741, #712
-
Updated
Nov 15, 2021 - TypeScript
-
Updated
Nov 9, 2021 - Shell
https://github.com/google/starlark-go/blob/master/doc/spec.md
It should satisfy our reproducibility needs (like jsonnet) and could be easier to write agola config files.
Like in #137 we should provide build context information.
-
Updated
Nov 15, 2021 - Go
-
Updated
Jan 5, 2021 - Go
-
Updated
Nov 4, 2021 - Shell
Currently the lambda in charge of scaling up nodes (including Spot configurations), uses the RunInstance API to create a Spot instance. Spot instances as spare capacity might be limited. Best approach when using Spot instance is to diversify across a set of instances that qualify for the workload and use one of the API that allows for that diversification.
The suggestion here is to change the `
-
Updated
Nov 1, 2021 - Go
-
Updated
Nov 12, 2021 - Python
-
Updated
Oct 20, 2021 - Go
-
Updated
Nov 15, 2021 - Python
-
Updated
Sep 14, 2021 - Scala
Hi,
We are using terraform-aws-gitlab-runnner to spin up GitLab runners on our AWS account. As part of security auditing, there was a severe alert raised on this policy created by terraform module: https://github.com/npalm/terraform-aws-gitlab-runner/blob/develop/policies/instance-docker-machine-policy.json#L21
The problem lies with permitting IamPassrole action on all resources. As per
-
Updated
Mar 5, 2021 - Objective-C
-
Updated
Nov 13, 2021 - Python
Improve this page
Add a description, image, and links to the cicd topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cicd topic, visit your repo's landing page and select "manage topics."
If you are trying to resolve an environment-specific issue or have a one-off question about the edge case that does not require a feature then please consider asking a question in argocd slack channel.
Checklist: