#atlantis (2020-07)
Discuss the Atlantis (<http://runatlantis.io | runatlantis.io>) |
**Archive: ** https://archive.sweetops.com/atlantis/
2020-07-02
2020-07-03
2020-07-21
whats an easy way to see the version of atlantis? is this exposed on an api call ?
On the server, you can run the atlantis version
command: https://github.com/runatlantis/atlantis/blob/master/cmd/version.go
Terraform Pull Request Automation. Contribute to runatlantis/atlantis development by creating an account on GitHub.
ah but i cannot do this since im using a fargate task
I think the easiest way then is to check however you built the docker image running in the fargate task and see if you specify a version.
Otherwise, you can always pull down the image running in your task by SHA, start a shell in it, and run atlantis version
well, yes that’s what im doing too. i ran into an issue today where i built a new image, updated terraform, and realized that fargate had not deployed a new instance when i was trying to use a 1.4.0 feature
i looked around for an easy way to get the version and couldn’t unless i used a custom workflow script which is pretty hackish
i did a force deployment on the ecs service and viola, new 0.14.0 feaeture was now available
doesn’t seem possible, so created this ticket https://github.com/runatlantis/atlantis/issues/1119
It would be convenient if we can get the current version of atlantis when hitting /healthz endpoint and perhaps it could show it in the beginning of its output on any alantis commands This would co…
bottom right
oh man, thank you. that’s just wonderful
I do not use the UI but one day I was trying to find the same and someone pointed that at me
and even then trying to find the faded version on the ui took few seconds
perfect.
✗ curl -s <https://atlantis.internal.company.com> | grep -Po '^v.*'
v0.14.0
I saw your PR
he wants it in the /status endpoint but im struggling with figuring out how to access the server information in that endpoint
What is the best way to protect PRs so atlantis accepts “atlantis apply” only from certain users, or only users with “write” access to the repo? I’ve noticed that cloudposse’s atlantis fork had this change https://github.com/cloudposse/atlantis/pull/7/files . Has anyone done this using a service side custom workflow?
what Add gh-team-whitelist command line argument why Comma separated list of key-value pairs representing the GitHub teams and the operations that the members of a particular team are allowed to…
I use this script:
/**
* This script is sets up protections over who can run `atlantis apply`
* commands on our Infra related PRs to update our infra.
*
* It is mounted onto the Docker image, and updates to this file can
* only be pushed to the remote repository by admins.
*/
const { ADMINS } = process.env;
const APPLY_USER = process.env.USER_NAME;
if (!ADMINS) {
throw Error(
'Could not find admin user list for determining if this "Apply" command is allowed',
);
}
if (!APPLY_USER) {
throw Error('Could not find user running the Apply command');
}
if (!ADMINS.split(',').includes(APPLY_USER)) {
throw Error(
`User ${APPLY_USER} is not an admin, and cannot run Atlantis Apply commands`,
);
}
console.log(`Validated that ${APPLY_USER} is an admin`);
what Add gh-team-whitelist command line argument why Comma separated list of key-value pairs representing the GitHub teams and the operations that the members of a particular team are allowed to…
Not sure if that is the best way, but it works until that PR is merged
I forked atlantis and added cloudposse gh-team-whitelist
and I can update and get the new features
we have our own fork of atlantis that let’s us specify that atlantis config to use so that we can have multiple atlantis services work on the same repo
I added that too!!! pretty useful
we have been using the cloudposse feature and it works perfectly
do you think atlantis maintainers would accept the team whitelist feature?
nope
it has been outstanding for a long time
there is a very long discussion about it
they added one feature that is not nearly as complete
i used thi smethod https://github.com/nitrocode/atlantis-terraform-module
Basic terraform cicd setup using atlantis. Contribute to nitrocode/atlantis-terraform-module development by creating an account on GitHub.
basically i have a users
file containing github users. if your username is not in it, then you cannot apply.
Basic terraform cicd setup using atlantis. Contribute to nitrocode/atlantis-terraform-module development by creating an account on GitHub.
yes that is one way I have seen, if Atlantis run exposed more Variables you could do more stuff
by using the cloudposse fork, how often does cloudposse resync with the upstream fork ?
cloudposse/default-backend:0.12
ok this is the fork https://github.com/cloudposse/atlantis
looks like it hasn’t been updated in about 10 months tho
that is why I created my own fork
Terraform Pull Request Automation. Contribute to sonatype/atlantis development by creating an account on GitHub.
oofah, so many forks
so your fork is up to date with lkysow’s repo and has the cloudposse additions ?
yes
and one more addition
for use with multiple atlantis-XXXX.yaml files
so you can use it with multiple servers
amazing
you should put that in your README.md
but right now is 0.13
then we can all start using it xD
I need to pull the latest
if you can automate the sync and merge, that would be even better
I was about to pull the new version to use github apps aythentication
we will
and we are going to security test it
since that is what we do
A tool to check for vulnerabilities in your Golang dependencies, powered by Sonatype OSS Index - sonatype-nexus-community/nancy
oh nice