1405672087
The Airship vulnerability documentation has moved [0]. This change updates SECURITY.md to point to the correct location. [0] https://docs.airshipit.org/learn/vulnerabilities.html Change-Id: Iea843a3399bc7836f5645c3ca81603e2e9ca7356 Signed-off-by: Drew Walters <andrew.walters@att.com> |
||
---|---|---|
.github | ||
doc | ||
images/spyglass | ||
spyglass | ||
tests | ||
tools | ||
.dockerignore | ||
.gitignore | ||
.gitreview | ||
.style.yapf | ||
.zuul.yaml | ||
LICENSE | ||
Makefile | ||
MANIFEST.in | ||
Pipfile | ||
Pipfile.lock | ||
README.rst | ||
setup.cfg | ||
setup.py | ||
tox.ini |
What is Spyglass?
Spyglass is the data extractor tool which can interface with different input data sources to generate site manifest YAML files. The data sources will provide all the configuration data needed for a site deployment. These site manifest YAML files generated by Spyglass will be saved in a Git repository, from where Pegleg can access and aggregate them. This aggregated file can then be fed to Shipyard for site deployment/updates.
Spyglass follows a plugin model to support multiple input data sources. The currently supported plugin is the Spyglass Excel plugin (spyglass-plugin-xls).
The Spyglass Excel plugin accepts an engineering spec in the form of a spreadsheet and an index file to read the spreadsheet as inputs and generates site level manifests. As an optional step, it can generate an intermediary YAML which contains all the information that will be rendered to generate Airship site manifests. This optional step will help the deployment engineer modify any data if required.
Getting Started
For more detailed information, please refer to the Index to easily navigate the Getting Started, Developer Quickstart, and Command Line Interface guides.