So far, we can use an instanceid as context id to select what set of configuration we want to use, nomally they are categorized by global configuration, environment group configuration and individual context instance, for example as below:
global\_
|_nonprod
|_dev
|_staging
|_prod
|_prod
You could use [ up ngo mytask -i dev ] to do deployment work aginst dev environment
However these configuration are more like server (backend) configuration. Most of time, we will have some other configurations, they are related to pipeline user input, for example:
username
password(secured)
flags for build/deployment/workflow to behave differently, eg,
create db everytime or skip
a resource id (ec2-instanceid/iam-profile-id/database name etc) as data injection for the workflow
temporary config entry for manual test
All these settings are more like a user execution profile rather static and stable server environment configuration
In this case we could classify them all together into an execution profile, for example
By using such a execution profile, the CI/CD tools does not need to handle the multiple environment variable entries and secure variable entries, all these could be handled by UPcmd. To trigger the pipeline, a code push is all needed.
This turns the audit to a precise git commit history so it is tracable to understand whose code has actually cause the problem, as the most of current CI/CD tools in the market, they are lack(weak) of this type of tracability
Propose to add this feature:
showcase https://github.com/upcmd/up/blob/master/tests/functests/c0153.yml
So far, we can use an instanceid as context id to select what set of configuration we want to use, nomally they are categorized by global configuration, environment group configuration and individual context instance, for example as below:
You could use [ up ngo mytask -i dev ] to do deployment work aginst dev environment
However these configuration are more like server (backend) configuration. Most of time, we will have some other configurations, they are related to pipeline user input, for example:
All these settings are more like a user execution profile rather static and stable server environment configuration
In this case we could classify them all together into an execution profile, for example
By using such a execution profile, the CI/CD tools does not need to handle the multiple environment variable entries and secure variable entries, all these could be handled by UPcmd. To trigger the pipeline, a code push is all needed.
This turns the audit to a precise git commit history so it is tracable to understand whose code has actually cause the problem, as the most of current CI/CD tools in the market, they are lack(weak) of this type of tracability