The Brigade ACR Gateway is an official extension of the Brigade project and as such follows all of the practices and policies laid out in the main Brigade Contributor Guide. Anyone interested in contributing to this gateway should familiarize themselves with that guide first.
The remainder of this document only supplements the above with things specific to this project.
As with the main Brigade repository, running make hack-kind-up
in this
repository will utilize ctlptl and
KinD to launch a local, development-grade
Kubernetes cluster that is also connected to a local Docker registry.
In contrast to the main Brigade repo, this cluster is not pre-configured for
building and running Brigade itself from source, rather it is pre-configured for
building and running this gateway from source. Because Brigade is a logical
prerequisite for this gateway to be useful in any way, make hack-kind-up
will
pre-install a recent, stable release of Brigade into the cluster.
As with the main Brigade repository, running tilt up
will build and deploy
project code (the gateway, in this case) from source.
For the gateway to successfully communicate with the Brigade instance in your
local, development-grade cluster, you will need to execute the following steps
before running tilt up
:
-
Log into Brigade:
$ brig login -k -s https://localhost:31600 --root
The root password is
F00Bar!!!
. -
Create a service account for the gateway:
$ brig service-account create --id acr-gateway --description acr-gateway
-
Copy the token returned from the previous step and export it as the
BRIGADE_API_TOKEN
environment variable:$ export BRIGADE_API_TOKEN=<token from previous step>
-
Grant the service account permission to create events:
$ brig role grant EVENT_CREATOR \ --service-account acr-gateway \ --source brigade.sh/acr
You can then run tilt up
to build and deploy this gateway from source.
⚠️ Contributions that automate the creation and configuration of the service account setup are welcome.
Making the gateway that runs in your local, development-grade Kubernetes cluster
visible to an Azure Container Registry such that it can successfully deliver
webhooks can be challenging. To help ease this process, our Tiltfile
has
built-in support for exposing your local gateway using
ngrok. To take advantage of this:
-
Sign up for a free ngrok account.
-
Follow ngrok setup & installation instructions
-
Set the environment variable
ENABLE_NGROK_EXTENSION
to a value of1
before runningtilt up
. -
After running
tilt up
, the option should become available in the Tilt UI athttp://localhost:10350/
to expose the gateway using ngrok. After going so, the applicable ngrok URL will be displayed in the gateway's logs in the Tilt UI. -
Using the URL
<ngrok URL>/events
andinsecure-dev-token
as the bearer token, complete the usual usage instructions fromREADME.md
, beginning with this this section.
⚠️ We cannot guarantee that ngrok will work in all environments, especially if you are behind a corporate firewall.