Skip to content

Instantly share code, notes, and snippets.

View Timtech4u's full-sized avatar
🎯
Focusing

Timothy Olaleke Timtech4u

🎯
Focusing
View GitHub Profile
@Timtech4u
Timtech4u / automated-pr-creation.md
Created October 1, 2025 13:46
Automated Script to Create 18 Bitnami Migration PRs Across energywebfoundation Organization

Automated Bitnami Migration PR Creation

Quick Start

I've created a comprehensive bash script that will help you create all 18 PRs for the bitnami migration across the energywebfoundation organization.

Prerequisites

  1. GitHub CLI installed and authenticated:
@Timtech4u
Timtech4u / bitnami-migration-prs.md
Created October 1, 2025 13:35
Complete PR Action Plan: 18 Pull Requests for Bitnami Migration Across energywebfoundation Organization

Bitnami Legacy Images Migration - Pull Request Action Plan

Total PRs Required: 18 across energywebfoundation organization
Migration Pattern: bitnami/[service] β†’ bitnamisecure/[service]

🚨 IMMEDIATE PRIORITY (1 PR)

PR #1: argocd-ecr-credentials-updater

Repository: energywebfoundation/argocd-ecr-credentials-updater
Branch: fix/migrate-to-bitnamisecure-kubectl

@Timtech4u
Timtech4u / energywebfoundation-complete-bitnami-audit.md
Created October 1, 2025 13:29
Complete energywebfoundation Organization Bitnami Audit - 18 Repositories, 26 Files Need Updates

Complete Bitnami Legacy Images Audit - energywebfoundation Organization

Total Files Found: 26 files containing bitnami image references
Repositories Affected: 18 repositories
Search Scope: All public and accessible private repositories in energywebfoundation org

COMPLETE REPOSITORY LIST REQUIRING UPDATES

1. argocd-ecr-credentials-updater ⚠️ CRITICAL - LIVE FIXED

  • File: templates/cronJob.yaml
@Timtech4u
Timtech4u / repositories-needing-bitnami-updates.md
Created October 1, 2025 13:05
Energy Web Foundation - 14 Repositories Requiring Bitnami Legacy Image Updates (PR Action Plan)

Repositories Requiring Bitnami Legacy Image Updates

CRITICAL - Already Applied Live Fixes (Cluster-level patches done)

1. energywebfoundation/argocd-ecr-credentials-updater

  • File: templates/cronJob.yaml
  • Line: ~23
  • Change: bitnami/kubectl:1.23 β†’ bitnamisecure/kubectl:1.23
  • Status: Live fix applied to clusters, repo update still needed

HIGH PRIORITY - Currently Used in Production

@Timtech4u
Timtech4u / bitnami-comprehensive-legacy-audit.md
Created October 1, 2025 12:13
Comprehensive Bitnami Legacy Images Audit - All EWF Clusters (47+ Namespaces Scanned)

πŸ” Comprehensive Bitnami Legacy Images Audit - Energy Web Foundation

Audit Date: $(date)
Clusters Analyzed: dev-cluster, staging-k8s-misc, staging-v2-cluster
Total Namespaces Scanned: 47+ namespaces

πŸ“Š Executive Summary

Cluster Legacy Images Found Critical Issues Status
@Timtech4u
Timtech4u / bitnami-migration-action-plan.md
Created October 1, 2025 12:06
Bitnami Image Migration Action Plan for Energy Web Foundation - Critical ECR Credentials Fix Applied

Bitnami Image Migration Action Plan for Energy Web Foundation

🚨 CRITICAL ISSUE IDENTIFIED

ArgoCD ECR credentials updater is failing due to bitnami/kubectl:1.23 image not found, causing authentication issues for pulling ECR images.

πŸ“Š Current Status Analysis

Dev Cluster (k8s-misc)

FAILING COMPONENTS:

  • ❌ argocd-ecr-credentials-updater - CronJob using bitnami/kubectl:1.23 (CRITICAL)
FROM node:8.9.4-alpine
RUN apk add --no-cache git
RUN npm install -g yo generator-hubot
RUN adduser -D hubot
USER hubot
WORKDIR /home/hubot
RUN yo hubot --owner="Tim <timothy@fireflies.ai>" --name="hubot" --description="Hubot for slack" --adapter="slack" --defaults
RUN npm install --save hubot-slack
RUN npm install --save hubot-google-images
RUN npm install --save hubot-google-translate
confirmations:
required: 4 # choose the number of confirmations you require
policyengine.simple:
fixedGasPrice: null
gasOracle:
mode: connector
@Timtech4u
Timtech4u / cloudbuild.yaml
Created January 12, 2021 07:20
Generic Cloud Build
steps:
# build and push container
- name: "gcr.io/kaniko-project/executor:latest"
args: ["--cache=true", "--cache-ttl=48h", "--destination=gcr.io/$PROJECT_ID/$REPO_NAME:$BRANCH_NAME"]
# deploy container image to Cloud Run with env vars
- name: "gcr.io/cloud-builders/gcloud"
args: ['run', 'deploy', '$REPO_NAME', '--image', 'gcr.io/$PROJECT_ID/$REPO_NAME:$BRANCH_NAME', '--region', 'europe-west4', '--allow-unauthenticated', '--platform', 'managed', '--update-env-vars', 'NODE_ENV=prod']
# set full traffic to latest revision (needed if rollback was performed)
- name: "gcr.io/cloud-builders/gcloud"
args: ['run', 'services', 'update-traffic', '$REPO_NAME', '--to-latest', '--region', 'europe-west4', '--platform', 'managed']
# File: cloudbuild.yaml
steps:
# build the container image
- name: 'gcr.io/cloud-builders/docker'
args: [ 'build', '-t', 'gcr.io/$PROJECT_ID/demo-app', '.' ]
# push the container image
- name: 'gcr.io/cloud-builders/docker'
args: [ 'push', 'gcr.io/$PROJECT_ID/demo-app']
# deploy to Cloud Run
- name: "gcr.io/cloud-builders/gcloud"