| 
		
			Some checks failed
		
		
	 Fixturenet-Eth-Plugeth-Arm-Test / Run an Ethereum plugeth fixturenet test (push) Failing after 1s K8s Deploy Test / Run deploy test suite on kind/k8s (push) Successful in 9m38s Fixturenet-Eth-Plugeth-Test / Run an Ethereum plugeth fixturenet test (push) Failing after 3h10m0s Database Test / Run database hosting test on kind/k8s (push) Successful in 10m11s Lint Checks / Run linter (push) Successful in 57s Publish / Build and publish (push) Successful in 1m34s Webapp Test / Run webapp test suite (push) Successful in 5m8s Deploy Test / Run deploy test suite (push) Successful in 6m20s Smoke Test / Run basic test suite (push) Successful in 5m30s Fixturenet-Laconicd-Test / Run Laconicd fixturenet and Laconic CLI tests (push) Successful in 14m49s This add a new option `--fqdn-policy` to the `deploy-webapp-from-registry`. The default policy, `prohibit` means that `ApplicationDeploymentRequests` which specify a FQDN will be rejected. The `allow` policy will cause them to be processed. The `preexisting` policy will only process them if an existing `DnsRecord` exists in the registry with the correct ownership. The latter would be useful in conjunction with a pre-checking scheme in the UI (eg, that the DNS entry is properly configured, the domain is under the control of the requestor, etc.) Only after all the checks were successful would the `DnsRecord` be created, allowing for `ApplicationDeploymentRequests` to use it. Reviewed-on: #802 Reviewed-by: David Boreham <dboreham@noreply.git.vdb.to> Co-authored-by: Thomas E Lackey <telackey@bozemanpass.com> Co-committed-by: Thomas E Lackey <telackey@bozemanpass.com> | ||
|---|---|---|
| .. | ||
| __init__.py | ||
| deploy_webapp_from_registry.py | ||
| deploy_webapp.py | ||
| run_webapp.py | ||
| undeploy_webapp_from_registry.py | ||
| util.py | ||