Mockery
argocd-image-updater
Mockery | argocd-image-updater | |
---|---|---|
3 | 21 | |
10,565 | 1,114 | |
0.1% | 1.6% | |
9.4 | 5.9 | |
7 days ago | 6 days ago | |
PHP | Go | |
BSD 3-clause "New" or "Revised" License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Mockery
-
I share my authentication server.
Continuous Integration - Testify, sqlmock, Mockery, Github Actions
-
Test doubles
Mockery is another framework for creating test doubles. It can be used with PHPUnit, phpspec, Behat, or any other testing framework. I find it especially powerful when working with legacy code, due to its support for creating partial mocks or mocking hard dependencies.
-
Testing with immutable PSR-7 objects and Prophecy
This works great if a method is tested that modifies and returns an object; we'll get an instance of that object and we are able to run all sorts of assertions on it. But what if this is not the case. What if we have a situation where a value object is passed as a parameter, some modifications are done and the value object is passed to another object. Something like the middleware from the example earlier. Some testing frameworks like Mockery offer spies to test these situations. When using Prophecy this situation can be handled using Argument::that():
argocd-image-updater
- Helm or Kustomize for my situation?
-
How do you produce your images for argcd deployment
Use the ArgoCD image updater
-
What tool are you using to edit yaml graphically?
We already have software agents in GitOps ecosystem that modify the state in git. Ie, the image updater in ArgoCD. It watches the docker registry. When it sees a new image, it updates git on a user's behalf.
-
Is there a CD solution that can be (painlessly) fully automated between stages?
If you are using ArgoCD you might be able to use this: https://argocd-image-updater.readthedocs.io/en/stable/
-
How to keep track of 3d party applications helm chart on K8S?
I just found this in my travels, I have only gone so far as reading the introduction but seems to be a fit? https://github.com/argoproj-labs/argocd-image-updater
-
Is it possible that k8s updates image version on pod relaunch?
I've used Keel and more recently ArgoCD Image Updater (Using ArgoCD to manage deployments).
-
What do you use to update image tags?
https://argocd-image-updater.readthedocs.io/en/stable/ maybe?
-
Quite happy with my first 6 hour journey with ArgoCD
Use the image updater
-
How do you handle change management for a self-hosted CI/CD solution?
To answer your question you should promote docker images between environments. There are many ways to do this. Check https://argocd-image-updater.readthedocs.io/en/stable/ if you haven't seen it already.
-
What are you using for the CI part of GitOps?
For ArgoCD there’s argocd-image-updated, https://argocd-image-updater.readthedocs.io/en/stable/
What are some alternatives?
Prophecy - Highly opinionated mocking framework for PHP 5.3+
keel - Kubernetes Operator to automate Helm, DaemonSet, StatefulSet & Deployment updates
PHPUnit - The PHP Unit Testing framework.
Pulumi - Pulumi - Infrastructure as Code in any programming language. Build infrastructure intuitively on any cloud using familiar languages 🚀
Faker
helmfile - Deploy Kubernetes Helm Charts
AspectMock - The most powerful and flexible mocking framework for PHPUnit / Codeception.
updatecli - A Declarative Dependency Management tool
Phake - PHP Mocking Framework
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Codeception - Full-stack testing PHP framework
applicationset - The ApplicationSet controller manages multiple Argo CD Applications as a single ApplicationSet unit, supporting deployments to large numbers of clusters, deployments of large monorepos, and enabling secure Application self-service.