Keptn bridge allows to browse the Keptn events.
Note that yarn dependencies are separated into two parts. Root level package.json
contains dependencies for angular and other general requirements. Express server dependencies are located inside package.json
located in server folder.
The Keptn bridge is installed as a part of Keptn.
To deploy the current version of the bridge in your Keptn Kubernetes cluster, use the file deploy/service.yaml
from this repository and apply it:
kubectl apply -f deploy/service.yaml
ENABLE_VERSION_CHECK
- If disabled, versions.json is not loaded and the version info will not be displayed.SHOW_API_TOKEN
- If disabled, the API token will not be shown in the Bridge info.PROJECTS_PAGE_SIZE
- Determines, how many projects will be fetched for the Bridge. If not set, it defaults to 50.KEPTN_INSTALLATION_TYPE
- Can take the values:QUALITY_GATES
,CONTINUOUS_OPERATIONS
,CONTINUOUS_DELIVERY
and determines the mode in which the Bridge will be started. If onlyQUALITY_GATES
is set, only functionalities and data specific for the Quality Gates Only use case will be displayed.
Keptn Bridge comes with a very simple basic authentication feature, which can be controlled by setting the following two environment variables:
BASIC_AUTH_USERNAME
- usernameBASIC_AUTH_PASSWORD
- password
To enable it within your Kubernetes cluster, we recommend first creating a secret which holds the two variables, and then apply this secret within the Kubernetes deployment for Keptn Bridge.
-
Create the secret using
kubectl -n keptn create secret generic bridge-credentials --from-literal="BASIC_AUTH_USERNAME=<USERNAME>" --from-literal="BASIC_AUTH_PASSWORD=<PASSWORD>"
Note: Replace
<USERNAME>
and<PASSWORD>
with the desired credentials. -
In case you are using Keptn 0.6.1 or older, edit the deployment using
kubectl -n keptn edit deployment bridge
and add the secret to the
bridge
container, such that the container spec looks like this:... spec: containers: - name: bridge image: keptn/bridge2:0.6.1 imagePullPolicy: Always # EDIT STARTS HERE envFrom: - secretRef: name: bridge-credentials optional: true # EDIT ENDS HERE ports: - containerPort: 3000 ...
Note 1: To disable authentication, just delete the secret using kubectl -n keptn delete secret bridge-credentials
.
Note 2: If you delete or edit the secret, you need to restart the respective pod by executing
kubectl -n keptn scale deployment bridge --replicas=0
kubectl -n keptn scale deployment bridge --replicas=1
Per default login attempts are throttled to 10 requests within 60 minutes. This behavior can be adjusted with the following environment variables:
REQUESTS_WITHIN_TIME
- how many login attempts in which timespanREQUEST_TIME_LIMIT
(in minutes) are allowed per IP.CLEAN_BUCKET_INTERVAL
- the interval (in minutes) the saved login attempts should be checked and deleted if the last request of an IP is older thanREQUEST_TIME_LIMIT
minutes. Default is 60 minutes.
To set up a login via OpenID you have to register an application with the identity provider you want, in order to get an ID (CLIENT_ID
) and a secret (CLIENT_SECRET
).
After this is done, the following environment variables have to be set:
OAUTH_ENABLED
- Flag to enable login via OpenID. To enable it set it totrue
.OAUTH_BASE_URL
- URL of the bridge (e.g.http://localhost:3000
orhttps://myBridgeInstallation.com
).OAUTH_DISCOVERY
- Discovery URL of the identity provider (e.g. https://api.login.yahoo.com/.well-known/openid-configuration).OAUTH_CLIENT_ID
- Client ID.OAUTH_CLIENT_SECRET
(optional) - Client secret. Some identity providers require using the client secret.OAUTH_ID_TOKEN_ALG
(optional) - Algorithm that is used to verify the ID token (e.g.ES256
). Default isRS256
.OAUTH_SCOPE
(optional) - Additional scopes that should be added to the authentication flow (e.g.profile email
), separated by space.OAUTH_NAME_PROPERTY
(optional) - The property of the ID token that identifies the user. Default isname
and fallback tonickname
,preferred_username
andemail
.OAUTH_ALLOWED_LOGOUT_URLS
(optional) - Allowed URLs for the redirect of the end_session endpoint separated by space. Some browsers require to also add the URL the end_session endpoint is redirecting to.
- Make sure you add the redirect URI
https://${yourDomain}/${pathToBridge}/oauth/redirect
to your identity provider. - The identity provider has to support the grant types
authorization_code
andrefresh_token
and provide the endpointsauthorization_endpoint
,token_endpoint
andjwks_uri
. - The refresh of the token is done by the bridge server on demand.
- If the identity provider provides the endpoint
end_session_endpoint
, it will be used for the logout. - The bridge server itself is a confidential client.
You can change the Look And Feel of the Keptn Bridge by creating a zip archive with your resources and make it downloadable from an URL.
When the LOOK_AND_FEEL_URL
environment variable is set and points to a zip archive the Keptn Bridge will download that file on startup and extract its content into /assets/branding
.
The zip archive must contain an app-config.json
and can have optionally a logo and a stylesheet. The app-config.json
must define an appTitle
, logoUrl
and logoInvertedUrl
and can have optionally a stylesheetUrl
. The logoUrl
will be used as logo in the app header, logoInvertedUrl
will be used as app favicon and as placeholder in some empty state messages. If a stylesheetUrl
is provided, the stylesheet
will be injected in the app header on page load.
{
"appTitle": "custom title",
"logoUrl": "assets/branding/logo.svg",
"logoInvertedUrl": "assets/branding/logo.svg",
"stylesheetUrl": "assets/branding/style.css"
}
If no LOOK_AND_FEEL_URL
was provided, the Bridge will use the default logo.png
, logo_inverted.png
and an app-config.json
.
To delete a deployed bridge, use the file deploy/service.yaml
from this repository and delete the Kubernetes resources:
kubectl delete -f deploy/service.yaml
- Run
yarn install
from bridge root level. - Run
yarn install
from server folder. - Set
API_URL
andAPI_TOKEN
environment variables, depending on your Keptn installation and operating system: Linux/MacOSWindowsexport API_URL=http://keptn.127.0.0.1.nip.io/api export API_TOKEN=1234-exam-ple
set API_URL=http://keptn.127.0.0.1.nip.io/api set API_TOKEN=1234-exam-ple
- Run
yarn start:dev
from bridge root level to start the express server and the Angular app. - Access the web through the url shown on the console (e.g., http://localhost:3000/ ).
UI tests in Keptn Bridge must not require any API call. When writing tests, please make sure to mock every outgoing request to /api
with cy.intercept
Cypress Intercept Reference
To test your UI tests locally, use following commands:
yarn cypress:open
(Linux, macOS),yarn cypress:open:win32
(Windows) - Used for the local development of tests.
This opens a browser, where you can run your tests and inspect them. The tests will re-run automatically on every code change made on the*.spec.ts
files.- or
yarn test:ui
(Linux, macOS),yarn test:ui:win32
(Windows) - This starts the headless browser mode that is also used in CI.
This will just run the tests on a headless browser without the possibility to inspect them.
Both commands serve Angular on port 3000 with no live reload - this will also ensure that no API connection is made.
- Currently, our UI tests are flaky because of some bugs in Cypress. You can find more information in Known Issues.
- One UI test will fail if you are on Windows and in a different time zone than Europe/Berlin due to a bug in Cypress.
Before creating the workspace, make sure that you already cloned the keptn/keptn repository to your local file system. For IntelliJ we would recommend cloning the entire repository to the Idea Projects
folder as it is easier to import modules.
- In the menu make sure that
Projects
is selected - Click on the button
New Project
- Select
Empty Project
(the last entry in the list) and clickNext
- Type in the project name (e.g. keptn-bridge) and select the location where you cloned the source to.
Select the bridge folder in the keptn source - Click on
Finish
- Close the Project Structure dialog that pops up after project creation by clicking
Cancel
File > New > Module from Existing Sources...
- Select the bridge folder
- Select
Create module from existing sources
- On the next screen make sure that the bridge folder is checked and click
Next
- On the next screen click
Finish
- (optional) You can also remove the keptn-bridge module by right-clicking on it and selecting
Remove Module
from the context menu.
If the imported module doesn't show up immediately, close the IDE and re-open it. The bridge module should now be visible in the project.
- Select
File > New > Project from Existing Sources...
- Follow steps 3 and onward from the description above
File > Open Folder...
- Select the bridge folder in the keptn source
File > Settings... > Editor > Code Style > TypeScript
- Select
Project
as scheme - Click on the cogwheel next to Scheme. A dropdown menu opens.
- In the opened menu click on
Import Scheme > IntellJ IDEA code style XML
- Open the provided
IntelliJ.xml
file - the code styles get applied on project scope - Apply the changes
In the opened folder:
- If there is no
.vscode
directory create one - Copy the
settings.json
to the.vscode
directory
File > Settings... > Tools > Actions on Save
Make sure that following items are checked:
- Optimize Imports
- Run eslint --fix
The save actions are handled within the settings.json
file. Please follow the guide for importing the file to enable the feature.
We use \n
for line-endings and this is also configured in ESLint. To tell Git to use the right line-ending, execute the command git config --global core.autocrlf input
Editor -> Inspections -> JavaScript and TypeScript -> Code quality tools
Enable ESLint
and disable TSLint
if enabled
The automatic ESLint configuration detects automatically the .eslintrc.json
file in the bridge directory and applies the set rules.
- Install the ESLint extension
- Run
yarn add eslint
- Close and re-open VSCode for ESLint to work properly
- Disable Checkbox:
File > Settings... > Editor > Inspections > JavaScript and TypeScript > General > Method can be static
- Snyk Vulnerability Scanner
- SonarLint
- Conventional Commit For our commit guidelines please consult our Contributing Guide for making pull requests and commit types and scopes
- ESLint
- Angular Language Service
- Jest
- Jest Runner
- Snyk Vulnerability Scanner
- SonarLint
- Conventional Commit
Conventional Commit settings are also already defined insettings.json
See Dockerfile for the latest instructions. By default, the process will listen on port 3000.