Before going further, please make sure you have deployed the GitHub and Notification services since the workflow depends on them.
This is the main service of this example, it's responsible to orchestrate the services in order to verify an opened PR. The service will add labels and reviewers according to the files that have been modified.
The image below illustrates the workflow:
Once a new PR is opened or changed in a given GitHub repository, the Knative platform will generate a new CloudEvent containing the pull request context. The Broker will deliver this event to the workflow service, thus starting a new instance.
When the workflow starts, it will call the GitHub service to fetch the files changed in the PR. Then, the workflow will verify what kind of changes have been made in the PR: based on the files' path, a specific label and reviewer will be added to it.
In the end of the workflow, a new event will be created and sent to the Knative broker. This event will be consumed by the Notification service to post a new message to a given Slack channel.
Open the files src/main/resources/handle-backend.sw.json
and src/main/resources/handle-frontend.sw.json
to review the labels and reviewers you wish to add to your PRs. Modify the Inject
state
and save the workflow files.
Note: You can modify the workflow to call a function and set the labels and reviewers in the context based on a configuration file instead. Are you up to the challenge?
HEADS UP! we assume you already have the GitHub App created for this demo when you deployed the GitHub service
Go to your GitHub Apps dashboard and click on "Edit" button in the application you created when deploying the GitHub Service.
Edit the field "Webhook secret (optional)" and add the value super-kogito-demo-secret
in the text field. This secret will be used by the Knative platform to identify the incoming events.
Note: In the "Webhook" section you should have a link to the smee.io service if you chose to run the demo locally or in a cluster that is not accessible from the external world. Just make sure that the Webhook link is correct.
Install the GitHub source from eventing-contrib releases that match your Knative Eventing platform. To know the Knative eventing version run:
$ kubectl get KnativeEventing knative-eventing -n knative-eventing
NAME VERSION READY REASON
knative-eventing 0.17.3 True
Then run:
$ kubectl apply -f https://github.com/knative/eventing-contrib/releases/download/v<VERSION>/github.yaml
Note: replace <VERSION>
with the correct Knative Eventing version.
IMPORTANT!
⚠️ we assume you have read the prerequisites section in the main README file. Please follow those instructions before continuing.
Please do not proceed any further if you haven't deployed the GitHub and Notification services.
To make things easier there is a script in this directory to generate the template files, build the application and the image, and then deploy it to your Kubernetes cluster.
IMPORTANT! You must be authenticated to the target Kubernetes cluster as a cluster administrator for this script to work.
You can run the script once and all the required files will be generated in the kubernetes/base
directory,
and the image will be published to your Quay.io account.
Fill the value for the variables as shown below and run the script:
# the script accepts positional arguments as following:
QUAY_NAMESPACE=
GITHUB_REPO=
./deploy-kubernetes.sh $QUAY_NAMESPACE $GITHUB_REPO
You should see a similar output like this:
Build logs
``` ---> Building and pushing image using tag quay.io/your_namespace/pr-checker-workflow:latest STEP 1: FROM --platform=linux/amd64 registry.access.redhat.com/ubi9/openjdk-17:1.20 STEP 2: ENV RUNTIME_TYPE quarkus STEP 3: COPY target/*-runner.jar $KOGITO_HOME/bin --> 58760d128d8 STEP 4: COPY target/lib $KOGITO_HOME/bin/lib STEP 5: COMMIT quay.io/your_namespace/pr-checker-workflow:latest --> 7bea1f647bc Writing manifest to image destination Writing manifest to image destination Storing signatures ---> Applying objects to the cluster in the namespace kogito-github. secret/github-webhook-secret unchanged service/pr-checker-workflow-default-http unchanged kogitoruntime.app.kiegroup.org/pr-checker-workflow configured broker.eventing.knative.dev/default unchanged trigger.eventing.knative.dev/pr-checker-listener unchanged githubsource.sources.knative.dev/github-event-listener unchanged sinkbinding.sources.knative.dev/pr-checker-sink unchanged ```If your cluster is already ready to receive GitHub Webhooks calls, just create a new PR in your repository with a file named "backend", and you should see the PR being labeled as "backend", also your chosen friend will be notified to review the PR.
If you're running on Minikube locally, proceed to the next section before trying the demo.
Skip this section if your cluster is already publicly available and capable to receive events from GitHub Webhooks.
If you reach this point, you probably have tested and deployed the other services. Just make sure you have a terminal window opened with:
$ minikube tunnel
Now run:
$ ./expose-on-minikube.sh
This command will create a new Istio VirtualService
to access the Knative GitHub Source
from the Smee CLI tool. Since this tool adds a Host: smee.io
in the request before redirecting
it to the cluster, Istio will reply with a 404 (Not Found) status code because it uses the
HTTP header Host
to route requests within the cluster.
Our just created github-event-listener-smee
will take care of redirecting any requests
with Host: smee.io
to the right service.
Now on a new terminal window run:
$ SMEE_WEBHOOK=<YOUR_SMEE_WEBHOOK>
$ ROUTE=$(kubectl get routes -l receive-adapter=github -o jsonpath="{.items[*].status.url}" -n kogito-github)
$ smee -u $SMEE_WEBHOOK -t $ROUTE
Replace <YOUR_SMEE_WEBHOOK>
with the Smee URL generated for you while creating a new GitHub App.
The Smee CLI will capture all events coming from your repository and redirect to your local cluster, you should see the Knative pods starting on demand and in the end a message in the Slack channel. :)
Talk to the cluster administrator to understand how your cluster and Istio Ingress can be exposed to the world.
See the project root's README documentation.