title | authors | version |
---|---|---|
Gitness Workshop |
Dewan Ahmed & Jim Sheldon |
1.3 |
This workshop assumes a clean environment where Gitness hasn't been installed yet. If you already have a Gitness instance running, please check with your workshop instructor for any required changes to some of the commands.
- Docker installation (tested with Docker Desktop 4.26.1 and docker CLI 24.0.7)
- k3d installed (tested with 5.6.3)
- kubectl installed (tested with 1.28.2)
- Visual Studio Code or any other code editor
- (Optional) A slack workspace with admin access to create a webhook for notifications.
If any of the ports suggested in the following instructions are in use, feel free to use an available port and modify the subsequent commands accordingly.
Create a common network for Gitness and the local Kubernetes cluster. This allows Gitness pipeline containers to communicate with the cluster.
docker network create gitness
docker network ls
Create a k3d Docker registry to contain the built Docker image for deployment.
k3d registry create registry.localhost --port 5000
- Pull in the Gitness image
docker pull harness/gitness:3.0.0-beta.7
- Use the following Docker command to run Gitness (observe the network this container uses):
docker run -d \
-e GITNESS_PRINCIPAL_ADMIN_EMAIL=admin@example.com \
-e GITNESS_PRINCIPAL_ADMIN_PASSWORD=adminpass1 \
-e GITNESS_USER_SIGNUP_ENABLED=true \
-e GITNESS_CI_CONTAINER_NETWORKS=gitness \
-p 3000:3000 \
-v /var/run/docker.sock:/var/run/docker.sock \
-v /tmp/gitness:/data \
--network=gitness \
--name gitness \
--restart always \
harness/gitness:3.0.0-beta.7
- Once the container is running, open http://localhost:3000 in your browser.
- Select Sign Up.
- Enter a User ID (
developer
), Email (developer@example.com
), and Password (devpass1
). - Select Sign Up. (You might see a warning to change your password. You can ignore that warning.)
- Log out from the developer account. Click the profile icon from the bottom-left corner and then click Log out.
- Log in using the admin User ID (
admin
) and Password (adminpass1
).
- Select New Project.
- Enter a project Name (devdays) and optional Description (Gitness is awesome).
- Select Create Project.
Optionally, Gitness can import projects from external sources (such as GitLab groups or GitHub organizations).
Create a k3d cluster, passing the Docker network, a specific API port, and a Docker registry.
k3d cluster create --network gitness --api-port 9090 --registry-use k3d-registry.localhost:5000 devdays
kubectl cluster-info
Create the gitness namespace.
kubectl create namespace gitness
Download the service account manifest file.
curl -sLO https://raw.githubusercontent.com/harness-community/gitness-lab/main/service-account.yml
ls service-account.yml
Apply the service account manifest.
kubectl apply -f service-account.yml
Get the service account token.
kubectl get secret gitness-sa-token -n gitness -o=jsonpath='{.data.token}' | base64 -d && echo
Save this token. You’ll use this later.
(Optional) Create a Slack Webhook
This step is optional and is used to demonstrate how to send notifications from your Gitness pipeline. If you don’t have a Slack workspace set up already, you can skip this step.
- Once you have signed in to your Slack workspace, navigate to https://YOUR_SLACK_WORKSPACE_NAME.slack.com/apps and search for Incoming WebHooks under the apps.
- Click Add to Slack and either choose an existing channel or create a new one where the notifications will be sent.
- Click Add Incoming Webhook Integration.
- Copy the Webhook URL under Setup Instructions. You’ll use this later.
- In your project, select Repositories, and then select New Repository.
- Enter a repository Name and optional Description. Let’s use
gitness-is-awesome
for the repository name. - Gitness repositories are initialized with a main branch, unless you specify a different name for the base branch.
- Select your preference for visibility (Public or Private). Let’s keep the visibility Private for this example.
- Optionally, you can add a License, .gitignore, or README file to your repository. Check the box Add a README file.
- Select Create Repository.
Once the repository is created, click + New File, give the file a name app.py, and paste the following:
# app.py
def main():
print("Gitness is awesome!")
if __name__ == "__main__":
main()
- Click Commit Changes and then Commit directly to the main branch.
This is how you can create a new repository in Gitness. In the next section, you’ll import a repository from GitHub.
- Click on Repositories, click on the dropdown and then Import Repository.
- You’ll import a popular Go repository called podinfo. Use harness-community for Organization and podinfo for Repository. Click Import Repository. The repository import should happen fast. Since this repository is public, anyone with access to this Gitness instance will be able to clone it without authentication.
Once prompted, open the repository in VS code.
Next, you’ll clone the podinfo repository using VS Code.
- Open VS Code on your local machine and click Clone Repository.
- On the Gitness console, click Clone and copy the Git clone URL (there’s a copy to clipboard button).
- Go back to VS Code and paste the Git clone URL. Select the directory where you want the repository to be copied. This will clone the remote repository in your local machine.
You can send data to HTTP endpoints from actions in your repository, such as opened pull requests, new branches, and more. For this exercise, you’ll use webhook.site - a website that offers unique, random URLs to instantly receive and inspect all incoming HTTP requests and webhooks in real-time, facilitating testing and debugging. For free webhook.site users, the URL and its data are kept for 7 days. You can close the browser tab and still return to the same unique webhook.site URL.
-
Navigate to webhook.site and copy your unique URL.
-
On Gitness, click on Webhooks under the podinfo repository and then + New Webhook.
-
Give this webhook a name: trigger_on_branch_created.
-
Paste the unique URL you copied under Payload URL. You can leave out the Secret.
-
Choose Let me select individual events and select Branch created.
-
Click Create Webhook.
Continue to the next section to push a new branch. Once a new branch is pushed, you’ll see the trigger in action on this site.
-
For this section, let’s add developer user to the project.
-
From the left navigation, click on Members and then + Add Member. Find developer from the User dropdown, choose Contributor role, and select Add member to this project.
-
On the Gitness portal, log out from this profile by clicking the icon on the bottom-left corner and log back in using the developer credentials.
-
Back in VS Code, create a new branch named update-app-version and commit a change. For instance, this commit updates the
pkg/version/version.go
file, resulting in the application version changing from 6.6.1 to 6.6.2. -
When you commit and push changes, you’ll be prompted to enter username and password for the remote repository. On the Gitness console, click Generate Clone Credential under Git Clone URL and use the generated credentials.
Once the push is complete, you should see the remote repository reflect the changes, and a response on webhook.site for this event.
-
Navigate to the webhook.site dashboard and you should see the POST request details triggered by your PR.
You can use Gitness’ built-in Gitleaks integration to prevent hardcoded secrets like passwords, API keys, and tokens from being introduced into your Git repository during a push.
You can enable secret scanning for individual repositories. Once enabled on a repo, any push event to that repo that contains a commit matching a recognized secret pattern is denied.
Note
Gitness Secret Scanning scans only new/changed code in commits that users attempt to push after you enable Secret Scanning on a repo. Secrets in existing/unchanged code aren't detected.
- Log out from the developer account. Click the profile icon from the bottom-left corner and then click Log out.
- Log in using the admin User ID (
admin
) and Password (adminpass1
). - Go to the podinfo repository where you want to enable secret scanning and select Settings.
- Select the Security tab.
- Enable Secret Scanning.
- Select Save.
Now, from your VS Code, create a new file config
and add the following:
AWS_ACCESS_KEY="AKIAIOSFODNN7EXAMPLE"
AWS_SECRET_ACCESS_KEY="wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY"
Now try to push this commit to the remote podinfo repository. You should see the following error on the git log:
remote: Push contains secret:
remote:
remote: aws-access-token in config:1
remote: Secret: AKIAIOSFODNN7EXAMPLE
remote: Commit: 1469e0435ac535dfd552ab443248493fc4fb1192
remote: Details: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
If you already have gitleaks configured locally, you'll see a different error message, and your commits might be blocked before they reach Gitness (and good for you for being proactive! 🛡️)
The above AWS credentials are sample ones from the AWS documentation and are not valid credentials 🙂.
Pipelines in Gitness help you automate steps in your software delivery process, such as initiating code builds, running automated tests, and deploying to a staging or production environment. Gitness supports multiple pipelines per repository.
Let’s create a simple pipeline in Gitness that will print the build number and the git commit sha for the current running build using expression variables.
Under podinfo repository, select Pipelines from the left navigation menu and then + New Pipeline. Give this pipeline a name build-info-pipeline
and click Create.
Since the pipeline definition already exists in the podinfo repository, you should see the following pipeline in your editor.
kind: pipeline
spec:
stages:
- type: ci
spec:
steps:
- name: print-build-info
type: run
spec:
container: alpine
script: |-
echo "Build number: ${{ build.number }}"
echo "Build commit: ${{ build.commit }}"
Note
If you see a different pipeline definition, please verify that you have entered the pipeline name correctly.
Click Save and Run → Run Pipeline.
You’ll see something like this for the print-build-info
stage execution:
latest: Pulling from alpine
Digest: sha256:c15c54221625d866fb6a98e74dcb1c6c4a24ab7c6585632db07f45219ea17efd
Status: Image is up to date for alpine:latest
+ echo "Build number: 1"\necho "Build commit: 5369dca9d8365a2b3540d6581ab52b4744387aef"
Build number: 1
Build commit: 5369dca9d8365a2b3540d6581ab52b4744387aef
Let's trigger this pipeline from a pull request. Log out from the admin account. Click the profile icon from the bottom-left corner and then click Log out.
Log in using the developer User ID (developer
) and Password (devpass1
).
-
Click on Pull Requests from the left navigation menu and then click + New Pull Request. Select your feature branch as the source branch, add add description. You can view your commit in the Commits tab, view your changes in the Changes tab.
Click Create Pull Request, which will trigger the pull request pipeline in the Checks tab.
-
Click Add + under Reviewers and find Administrator from the list.
Caution
Don't merge the PR yet. You’ll do it later at the CI/CD section.
The developer account doesn't have enough privilege to delete a pipeline. Log out from the developer account and log in using the admin User ID (admin
) and Password (adminpass1
).
- Delete this pipeline by selecting Pipelines from the left navigation menu, then click the menu (â‹®) icon for the build-info-pipeline pipeline on the right and select Delete. When prompted, select Delete.
Gitness offers a built-in secret manager to store and manage sensitive information, such as passwords, tokens, and ssh keys. In Gitness, secrets are managed at the project level.
For this lab, kube_token
and webhook_url
are considered secrets. Let’s add these two to Gitness secret manager.
- From the left hand navigation, click Secrets → + New Secret.
- Name this secret
kube_token
and paste the service account token of the Kubernetes cluster from a previous step as the value. - Repeat this process to create another secret
webhook_url
and use the webhook URL from webhook.site. (Optional) If you have a Slack webhook, you can use that value instead.
Conditions limit pipeline step execution at runtime. Gitness sets variables that can be used in conditions.
Tip
Gitness supports multiple pipelines per repository. Creating a pipeline per trigger (push, pull request, tag) can reduce the need for conditions. We will cover triggers more in the next section.
Let's create a new pipeline. Select Repositories --> podinfo, then Pipelines from the left navigation menu, and then + New Pipeline. Give this pipeline a name webhook-pipeline
and click Create.
Replace the existing pipeline with the following and click Run:
kind: pipeline
spec:
stages:
- name: build
type: ci
spec:
steps:
- name: test
type: run
spec:
container: alpine
script: |-
go test -v ./...
- name: webhook
type: plugin
when: failure()
spec:
name: webhook
inputs:
content_type: application/json
urls: ${{ secrets.get("webhook_url") }}
template: |-
Name: Gitness Notification
Repo Name: {{ repo.name }}
Build Number {{ build.number }}
Build Event: {{ build.event }}
Build Status: {{ build.status }}
The test step fails because go is not installed in the alpine docker image by default, which causes the notify step to run. Check the webhook.site dashboard to ensure that a notification is sent.
(Optional) Using a Slack Webhook
Alternatively, if you configured a Slack webhook, replace the webhook pipeline with the slack plugin. Update the pipeline as below:
kind: pipeline
spec:
stages:
- type: ci
spec:
steps:
- name: test
type: run
spec:
container: alpine
script: |-
go test -v ./...
- name: notify
type: plugin
when: failure()
spec:
name: slack
inputs:
webhook: ${{ secrets.get("webhook_url") }}
template: |
Name: Gitness Notification
Repo Name: {{ repo.name }}
Build Number {{ build.number }}
Build Event: {{ build.event }}
Build Status: {{ build.status }}
Now, re-run the pipeline and check your slack workspace and channel to ensure that a notification is sent.
Now update the pipeline to replace the alpine image with the golang image. Run the pipeline again, this time it will pass, and the notify step will not run.
kind: pipeline
spec:
stages:
- name: build
type: ci
spec:
steps:
- name: test
type: run
spec:
container: golang
script: |-
go test -v ./...
- name: webhook
type: plugin
when: failure()
spec:
name: webhook
inputs:
content_type: application/json
urls: ${{ secrets.get("webhook_url") }}
template: |
Name: Gitness Notification
Repo Name: {{ repo.name }}
Build Number {{ build.number }}
Build Event: {{ build.event }}
Build Status: {{ build.status }}
Delete this pipeline by selecting Pipelines from the left navigation menu, then click the menu (â‹®) icon for the webhook-pipeline pipeline on the right and select Delete. When prompted, select Delete.
Let’s create a new pipeline for the CI/CD workflow. Under podinfo repository, select Pipelines from the left navigation menu and then + New Pipeline. Give this pipeline a name build-deploy-pipeline
and click Create.
Replace the auto-generated pipeline with the following and click Save and Run --> Run Pipeline.
kind: pipeline
spec:
stages:
- type: ci
spec:
steps:
- name: test
type: run
spec:
container: golang
script: |-
go test -v ./...
- name: build
type: plugin
spec:
name: docker
inputs:
insecure: true
repo: k3d-registry.localhost:5000/podinfo
registry: k3d-registry.localhost:5000
tags: ${{ build.number }}
- name: deploy
type: plugin
spec:
name: helm3
inputs:
add_repos: "podinfo=https://stefanprodan.github.io/podinfo"
chart: podinfo/podinfo
kube_api_server: "https://host.docker.internal:9090"
kube_service_account: gitness-sa
kube_token: ${{ secrets.get('kube_token') }}
mode: upgrade
namespace: gitness
release: my-project
skip_tls_verify: true
values: image.repository=k3d-registry.localhost:5000/podinfo,image.tag=${{ build.number }},ui.message=Hello đź‘‹ from build ${{ build.number }}
when:
build.event == "manual" and build.branch == "master"
Notice that the deploy step uses the helm3 plugin. The deploy step also uses conditions to ensure it only runs for manual events where the branch is master.
When the pipeline completes, query the local Docker API to see the image and tags.
curl http://localhost:5000/v2/_catalog
curl http://localhost:5000/v2/podinfo/tags/list
Inspect the running pod.
kubectl -n gitness get deploy/my-project-podinfo -o wide
This output shows that the k3d-registry.localhost:5000/podinfo:1
image is running.
Use port-forwarding to access the service.
kubectl -n gitness port-forward svc/my-project-podinfo 8080:9898
Open http://localhost:8080/ to view the running service.
When code is pushed to a repository, a pull request is opened, or a tag is created, Gitness can automatically trigger pipeline execution.
When creating a pipeline, Gitness automatically creates a default trigger for you. You can customize this trigger, or create additional triggers. The default trigger will have Pull Request Created, Pull Request Reopened and Pull Request Updated conditions.
Let's view the default trigger for our pipeline. Select Pipelines from the left navigation menu, select build-deploy-pipeline, select Pipeline Settings, then select the Triggers tab.
Now it is time to merge the pull request created earlier.
Go to Pull Requests and Squash and Merge the open PR (there should only be one).
Select Pipelines from the left navigation menu, select build-deploy-pipeline, click Run, then select Run Pipeline. The pipeline will run and deploy a new version of the image.
Execute the port-forwarding command again to see the running podinfo app with the new version.
kubectl -n gitness port-forward svc/my-project-podinfo 8080:9898
Let's introduce a failure by deleting the gitness
namespace.
kubectl delete namespace gitness
Let’s update the build-deploy-pipeline to include a notification step which gets executed when a previous step fails. From Pipelines --> build-deploy-pipeline, click Edit and replace the existing pipeline YAML as follows. Click Save, click Run, then click Run Pipeline.
kind: pipeline
spec:
stages:
- type: ci
spec:
steps:
- name: test
type: run
spec:
container: golang
script: |-
go test -v ./...
- name: build
type: plugin
spec:
name: docker
inputs:
insecure: true
repo: k3d-registry.localhost:5000/podinfo
registry: k3d-registry.localhost:5000
tags: ${{ build.number }}
- name: deploy
type: plugin
spec:
name: helm3
inputs:
add_repos: "podinfo=https://stefanprodan.github.io/podinfo"
chart: podinfo/podinfo
kube_api_server: "https://host.docker.internal:9090"
kube_service_account: gitness-sa
kube_token: ${{ secrets.get('kube_token') }}
mode: upgrade
namespace: gitness
release: my-project
skip_tls_verify: true
values: image.repository=k3d-registry.localhost:5000/podinfo,image.tag=${{ build.number }},ui.message=Hello đź‘‹ from build ${{ build.number }}
when:
build.event == "manual" and build.branch == "master"
- name: notify
type: plugin
when: failure()
spec:
name: webhook
inputs:
content_type: application/json
urls: ${{ secrets.get("webhook_url") }}
template: |
Name: Gitness Notification
Repo Name: {{ repo.name }}
Build Number {{ build.number }}
Build Event: {{ build.event }}
Build Status: {{ build.status }}
Observe a failure for the deploy step. This will make the notify step execute and you'll see the following notification on webhook.site.
You can find the complete pipeline YAML here.
Delete the cluster.
k3d cluster delete devdays
Delete the registry.
k3d registry delete registry.localhost
Stop the Gitness Docker container.
docker stop gitness
Delete the Gitness Docker network.
docker network rm gitness