-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Switch AWS staging hub to GitHub Actions #754
Switch AWS staging hub to GitHub Actions #754
Conversation
production hub parts are commented out for now
I put in the
The command that uses it is:
|
This allows us to let image building happen on PRs AND pushes, but keep building only on pushes
Also changed tabbing
Changed tabbing
I don't think we need to install some of the pieces that are in the CircleCI setup, |
My main confusion now is how I was getting everything installed on the hackweek hubs. Here is the OceanHackWeek GitHub Action: https://github.com/oceanhackweek/jupyterhub/blob/staging/.github/workflows/deploy.yaml
Nevermind about |
Looking into the commit range detection, I see in Within the I will take out the |
Seems OK to me, but I don't know github actions too well :) Have you verified that this works on your fork? I think it won't run here till it's actually merged, right? |
Most of this is from the GitHub actions that I used for OHW and IceSat-2 hackweek, so there's a rough verification that this works. Definitely is not all the same code though. I have not tested this on my fork, but I could try to set that up.
I think that's right. |
I'll try to set up some actions on my fork to verify that things work. |
.github/workflows/build-aws-hub.yaml
Outdated
runs-on: ubuntu-latest | ||
steps: | ||
- uses: actions/checkout@v1 | ||
- uses: $HUBPLOY_IMAGE |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i wonder what it would take to package hubploy as an action to use the standard pattern like -uses: hubploy/hubploy@v1
(https://docs.github.com/en/free-pro-team@latest/actions/creating-actions/creating-a-docker-container-action).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@yuvipanda , do you have interest in this? I'm wondering if that would make it easier to use / manage hubploy
for people. Currently, some pieces of the action feel a bit hacky, see things like this from IP whitelisting:
with:
entrypoint: /bin/bash
args: >
-c "code &&
more code &&
end of code"
I will squash some commits when everything is ready. For now, I've gotten the The
It gets into the Is that error associated with anything besides running Helm 2? |
I inserted a Errored out with:
So I can see that it is using Helm 2, so now I know I need to figure out how to stop that. |
So the Working |
bd9c129
to
dbab31b
Compare
I'm seeing some funny business in the |
Also wondering if overall we can change some of the syntax from things like this in IP whitelisting:
to something more intuitive like how the
I'll try it out and see if I really need the |
So that immediately failed with
So if we wanted to make the command more intuitive, we would need to install |
I was hoping that the paths_ignore of the image/ folder would override accepting anything in the icesat2/ folder, but that didn't work. Now I am more specific to exclude the image/ folder.
It got deleted in deleting the image build blocks
2d6c44f
to
a6b75e8
Compare
I had a thought to make the Turns out this is not the case and we need to either invoke Anyhow, I think this is almost ready to actually be merged. |
thanks for detailing all this @salvis2! Let's plan to merge next week, this shouldn't impact the other hubs, so we can see how things work and migrate the others / iterate on the workflow in follow-up PRs |
Agreed, feel free to merge this whenever you're ready.
…On Fri, Oct 2, 2020 at 4:27 PM Scott Henderson ***@***.***> wrote:
@scottyhq <https://github.com/scottyhq> @TomAugspurger
<https://github.com/TomAugspurger> let me know if there is anything else
you want tested or modified. I will have one last commit to enable the
action for AWS's prod hub (if you want) and to disable the action on this
temp branch for the PR.
thanks for detailing all this @salvis2 <https://github.com/salvis2>!
Let's plan to merge next week, this shouldn't impact the other hubs, so we
can see how things work and migrate the others / iterate on the workflow in
follow-up PRs
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#754 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAKAOIQPHIFUIODMY5HNKNTSIZATFANCNFSM4RYTIZMQ>
.
|
So the
This step completes correctly in my fork. I updated both secrets by inputting a value for the secret, copying the value, saving the first secret, then pasting the value in for the second secret, so I'm fairly confident that they are the same on both forks. Anyone have any ideas as to why this might happen? |
@salvis2 - I'm pretty sure this is one of those confusing points of permissions and secrets access when GitHub Actions running from a PR https://stackoverflow.com/questions/58737785/github-actions-empty-env-secrets The action running on your fork has access to your fork's secrets, you can see they are encrypted in the log (note asterisks):
If you look at the log in this repo, GIT_CRYPT_KEY is blank suggesting the value couldn't be read
The secrets should be read properly once merged, so go ahead! |
Right, that makes sense. Thanks @scottyhq ! |
closes #699
Current setup should only affect the AWS
staging
hub. Covers:git-crypt
secret decryptingI've made an educated guess on what multi-line yaml is supposed to look like, Let me know if this is wrong.
To-Do:
GIT_CRYPT_KEY
secret to this repo's secretsAWS_IP_WHITELIST
secret to this repo's secretsInput the step to use--commit-range
flag