{"id":13489903,"url":"https://github.com/arttor/helmify","last_synced_at":"2025-10-03T22:55:28.298Z","repository":{"id":38445121,"uuid":"391663444","full_name":"arttor/helmify","owner":"arttor","description":"Creates Helm chart from Kubernetes yaml","archived":false,"fork":false,"pushed_at":"2025-03-05T15:39:20.000Z","size":454,"stargazers_count":1641,"open_issues_count":38,"forks_count":148,"subscribers_count":13,"default_branch":"main","last_synced_at":"2025-07-27T00:55:43.247Z","etag":null,"topics":["golang","helm","k8s","kubebuilder","kubernetes","kubernetes-operator","kustomize","operator-sdk"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/arttor.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2021-08-01T15:21:36.000Z","updated_at":"2025-07-23T09:23:11.000Z","dependencies_parsed_at":"2023-09-28T02:19:56.123Z","dependency_job_id":"b74eddc6-00aa-4395-af10-d2864aa2bfb6","html_url":"https://github.com/arttor/helmify","commit_stats":{"total_commits":311,"total_committers":45,"mean_commits":6.911111111111111,"dds":0.652733118971061,"last_synced_commit":"98a79ff572ceb401c923f7d195f245c596a04167"},"previous_names":[],"tags_count":58,"template":false,"template_full_name":null,"purl":"pkg:github/arttor/helmify","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/arttor%2Fhelmify","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/arttor%2Fhelmify/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/arttor%2Fhelmify/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/arttor%2Fhelmify/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/arttor","download_url":"https://codeload.github.com/arttor/helmify/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/arttor%2Fhelmify/sbom","scorecard":{"id":209788,"data":{"date":"2025-08-11","repo":{"name":"github.com/arttor/helmify","commit":"fe94e7c93d8fd58783f5df00fdc74917810ccb51"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":3.6,"checks":[{"name":"Code-Review","score":6,"reason":"Found 9/15 approved changesets -- score normalized to 6","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: no topLevel permission defined: .github/workflows/ci.yml:1","Warn: no topLevel permission defined: .github/workflows/release.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Pinned-Dependencies","score":2,"reason":"dependency not pinned by hash detected -- score normalized to 2","details":["Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:14: update your workflow using https://app.stepsecurity.io/secureworkflow/arttor/helmify/ci.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/arttor/helmify/ci.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/ci.yml:43: update your workflow using https://app.stepsecurity.io/secureworkflow/arttor/helmify/ci.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/ci.yml:66: update your workflow using https://app.stepsecurity.io/secureworkflow/arttor/helmify/ci.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/arttor/helmify/release.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/arttor/helmify/release.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:17: update your workflow using https://app.stepsecurity.io/secureworkflow/arttor/helmify/release.yml/main?enable=pin","Info:   0 out of   4 GitHub-owned GitHubAction dependencies pinned","Info:   0 out of   3 third-party GitHubAction dependencies pinned","Info:   1 out of   1 goCommand dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: MIT License: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Packaging","score":10,"reason":"packaging workflow detected","details":["Info: Project packages its releases by way of GitHub Actions.: .github/workflows/release.yml:9"],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Signed-Releases","score":0,"reason":"Project has not signed or included provenance with any releases.","details":["Warn: release artifact v0.4.18 not signed: https://api.github.com/repos/arttor/helmify/releases/203895100","Warn: release artifact v0.4.17 not signed: https://api.github.com/repos/arttor/helmify/releases/191392028","Warn: release artifact v0.4.16 not signed: https://api.github.com/repos/arttor/helmify/releases/186030571","Warn: release artifact v0.4.15 not signed: https://api.github.com/repos/arttor/helmify/releases/185816596","Warn: release artifact v0.4.14 not signed: https://api.github.com/repos/arttor/helmify/releases/174750881","Warn: release artifact v0.4.18 does not have provenance: https://api.github.com/repos/arttor/helmify/releases/203895100","Warn: release artifact v0.4.17 does not have provenance: https://api.github.com/repos/arttor/helmify/releases/191392028","Warn: release artifact v0.4.16 does not have provenance: https://api.github.com/repos/arttor/helmify/releases/186030571","Warn: release artifact v0.4.15 does not have provenance: https://api.github.com/repos/arttor/helmify/releases/185816596","Warn: release artifact v0.4.14 does not have provenance: https://api.github.com/repos/arttor/helmify/releases/174750881"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 26 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Vulnerabilities","score":0,"reason":"30 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GO-2023-1573 / GHSA-259w-8hf6-59c2","Warn: Project is vulnerable to: GO-2023-1574 / GHSA-hmfx-3pcx-653p","Warn: Project is vulnerable to: GO-2023-2412 / GHSA-7ww5-4wqc-m92c","Warn: Project is vulnerable to: GO-2025-3528 / GHSA-265r-hfxg-fhmg","Warn: Project is vulnerable to: GO-2023-2048 / GHSA-6xv5-86q9-7xr8","Warn: Project is vulnerable to: GHSA-hqxw-f8mx-cpmw","Warn: Project is vulnerable to: GO-2023-1699 / GHSA-232p-vwff-86mp","Warn: Project is vulnerable to: GO-2023-1700 / GHSA-33pg-m6jh-5237","Warn: Project is vulnerable to: GO-2023-1701 / GHSA-6wrf-mxfj-pf5p","Warn: Project is vulnerable to: GHSA-jq35-85cj-fj4p","Warn: Project is vulnerable to: GHSA-mq39-4gv4-mvpx","Warn: Project is vulnerable to: GO-2024-3005 / GHSA-v23v-6jw2-98fq","Warn: Project is vulnerable to: GO-2024-2512 / GHSA-xw73-rw38-6vjc","Warn: Project is vulnerable to: GO-2025-3829 / GHSA-4vq8-7jfc-9cvp","Warn: Project is vulnerable to: GO-2023-2402 / GHSA-45x7-px36-x8w8","Warn: Project is vulnerable to: GO-2024-3321 / GHSA-v778-237x-gjrc","Warn: Project is vulnerable to: GO-2025-3487 / GHSA-hcg3-q754-cr77","Warn: Project is vulnerable to: GO-2023-2102 / GHSA-4374-p667-p6c8","Warn: Project is vulnerable to: GO-2023-2153 / GHSA-m425-mq94-257g / GHSA-qppj-fm5r-hxr3","Warn: Project is vulnerable to: GO-2024-2687 / GHSA-4v7x-pqxf-cx7m","Warn: Project is vulnerable to: GO-2024-3333","Warn: Project is vulnerable to: GO-2025-3503 / GHSA-qxp5-gwg8-xv66","Warn: Project is vulnerable to: GO-2025-3595 / GHSA-vvgc-356p-c3xw","Warn: Project is vulnerable to: GO-2025-3488 / GHSA-6v2p-p543-phr9","Warn: Project is vulnerable to: GO-2024-2611 / GHSA-8r3f-844c-mc37","Warn: Project is vulnerable to: GO-2024-2554 / GHSA-v53g-5gjp-272r","Warn: Project is vulnerable to: GO-2024-2575 / GHSA-r53h-jv2g-vpx6","Warn: Project is vulnerable to: GO-2025-3601 / GHSA-4hfp-h4cw-hj8p","Warn: Project is vulnerable to: GO-2025-3602 / GHSA-5xqw-8hwv-wg92","Warn: Project is vulnerable to: GO-2025-3802 / GHSA-557j-xg8c-q2mm"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-17T00:34:42.289Z","repository_id":38445121,"created_at":"2025-08-17T00:34:42.289Z","updated_at":"2025-08-17T00:34:42.289Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":278239967,"owners_count":25954097,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-03T02:00:06.070Z","response_time":53,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["golang","helm","k8s","kubebuilder","kubernetes","kubernetes-operator","kustomize","operator-sdk"],"created_at":"2024-07-31T19:00:37.477Z","updated_at":"2025-10-03T22:55:28.281Z","avatar_url":"https://github.com/arttor.png","language":"Go","readme":"# Helmify\n[![CI](https://github.com/arttor/helmify/actions/workflows/ci.yml/badge.svg)](https://github.com/arttor/helmify/actions/workflows/ci.yml)\n![GitHub go.mod Go version](https://img.shields.io/github/go-mod/go-version/arttor/helmify)\n![GitHub](https://img.shields.io/github/license/arttor/helmify)\n![GitHub release (latest by date)](https://img.shields.io/github/v/release/arttor/helmify)\n[![Go Report Card](https://goreportcard.com/badge/github.com/arttor/helmify)](https://goreportcard.com/report/github.com/arttor/helmify)\n[![GoDoc](https://godoc.org/github.com/arttor/helmify?status.svg)](https://pkg.go.dev/github.com/arttor/helmify?tab=doc)\n![GitHub total downloads](https://img.shields.io/github/downloads/arttor/helmify/total)\n\nCLI that creates [Helm](https://github.com/helm/helm) charts from kubernetes manifests.\n\nHelmify reads a list of [supported k8s objects](#status) from stdin and converts it to a helm chart. \nDesigned to generate charts for [k8s operators](#integrate-to-your-operator-sdkkubebuilder-project) but not limited to.\nSee [examples](https://github.com/arttor/helmify/tree/main/examples) of charts generated by helmify.\n\nSupports `Helm \u003e=v3.6.0`\n\nSubmit issue if some features missing for your use-case.\n\n## Usage\n\n1) As pipe:\n\n    ```shell\n    cat my-app.yaml | helmify mychart\n    ```\n   Will create 'mychart' directory with Helm chart from yaml file with k8s objects.\n\n    ```shell\n    awk 'FNR==1 \u0026\u0026 NR!=1  {print \"---\"}{print}' /\u003cmy_directory\u003e/*.yaml | helmify mychart\n    ```\n   Will create 'mychart' directory with Helm chart from all yaml files in `\u003cmy_directory\u003e `directory.\n\n2) From filesystem:\n    ```shell\n    helmify -f /my_directory/my-app.yaml mychart\n    ```\n    Will create 'mychart' directory with Helm chart from `my_directory/my-app.yaml`.\n    ```shell\n    helmify -f /my_directory mychart\n    ```\n    Will create 'mychart' directory with Helm chart from all yaml files in `\u003cmy_directory\u003e `directory.\n    ```shell\n    helmify -f /my_directory -r mychart\n    ```\n    Will create 'mychart' directory with Helm chart from all yaml files in `\u003cmy_directory\u003e `directory recursively.\n    ```shell\n    helmify -f ./first_dir -f ./second_dir/my_deployment.yaml -f ./third_dir  mychart\n    ```\n    Will create 'mychart' directory with Helm chart from multiple directories and files.\n\n\n3) From [kustomize](https://kustomize.io/) output:\n    ```shell\n    kustomize build \u003ckustomize_dir\u003e | helmify mychart\n    ```\n    Will create 'mychart' directory with Helm chart from kustomize output.\n\n### Integrate to your Operator-SDK/Kubebuilder project\n\n1. Open `Makefile` in your operator project generated by \n   [Operator-SDK](https://github.com/operator-framework/operator-sdk) or [Kubebuilder](https://github.com/kubernetes-sigs/kubebuilder).\n2. Add these lines to `Makefile`:\n- With operator-sdk version \u003c v1.23.0 \n    ```makefile\n    HELMIFY = $(shell pwd)/bin/helmify\n    helmify:\n    \t$(call go-get-tool,$(HELMIFY),github.com/arttor/helmify/cmd/helmify@v0.3.7)\n    \n    helm: manifests kustomize helmify\n    \t$(KUSTOMIZE) build config/default | $(HELMIFY)\n    ```\n- With operator-sdk version \u003e= v1.23.0\n    ```makefile\n    HELMIFY ?= $(LOCALBIN)/helmify\n    \n    .PHONY: helmify\n    helmify: $(HELMIFY) ## Download helmify locally if necessary.\n    $(HELMIFY): $(LOCALBIN)\n    \ttest -s $(LOCALBIN)/helmify || GOBIN=$(LOCALBIN) go install github.com/arttor/helmify/cmd/helmify@latest\n        \n    helm: manifests kustomize helmify\n    \t$(KUSTOMIZE) build config/default | $(HELMIFY)\n    ```\n3. Run `make helm` in project root. It will generate helm chart with name 'chart' in 'chart' directory.\n\n## Install\n\nWith [Homebrew](https://brew.sh/) (for MacOS or Linux): `brew install arttor/tap/helmify`\n\nOr download suitable for your system binary from [the Releases page](https://github.com/arttor/helmify/releases/latest).\nUnpack the helmify binary and add it to your PATH and you are good to go!\n\n## Available options\nHelmify takes a chart name for an argument.\nUsage:\n\n```helmify [flags] CHART_NAME```  -  `CHART_NAME` is optional. Default is 'chart'. Can be a directory, e.g. 'deploy/charts/mychart'.\n\n| flag                      | description                                                                                                                                                                                                 | sample                              |\n|---------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------|\n| -h -help                  | Prints help                                                                                                                                                                                                 | `helmify -h`                        |\n| -f                        | File source for k8s manifests (directory or file), multiple sources supported                                                                                                                               | `helmify -f ./test_data`            |\n| -r                        | Scan file directory recursively. Used only if -f provided                                                                                                                                                   | `helmify -f ./test_data -r`         |\n| -v                        | Enable verbose output. Prints WARN and INFO.                                                                                                                                                                | `helmify -v`                        |\n| -vv                       | Enable very verbose output. Also prints DEBUG.                                                                                                                                                              | `helmify -vv`                       |\n| -version                  | Print helmify version.                                                                                                                                                                                      | `helmify -version`                  |\n| -crd-dir                  | Place crds in their own folder per Helm 3 [docs](https://helm.sh/docs/chart_best_practices/custom_resource_definitions/#method-1-let-helm-do-it-for-you). Caveat: CRDs templating is not supported by Helm. | `helmify -crd-dir`                  |\n| -image-pull-secrets       | Allows the user to use existing secrets as imagePullSecrets                                                                                                                                                 | `helmify -image-pull-secrets`       |\n| -original-name            | Use the object's original name instead of adding the chart's release name as the common prefix.                                                                                                             | `helmify -original-name`            |\n| -cert-manager-as-subchart | Allows the user to install cert-manager as a subchart                                                                                                                                                       | `helmify -cert-manager-as-subchart` |\n| -cert-manager-version     | Allows the user to specify cert-manager subchart version. Only useful with cert-manager-as-subchart. (default \"v1.12.2\")                                                                                    | `helmify -cert-manager-version=v1.12.2`    |\n| -cert-manager-install-crd     | Allows the user to install cert-manager CRD as part of the cert-manager subchart.(default \"true\")                                                                                                           | `helmify -cert-manager-install-crd` |\n| -preserve-ns              | Allows users to use the object's original namespace instead of adding all the resources to a common namespace. (default \"false\")                                                                            | `helmify -preserve-ns`              |\n| -add-webhook-option | Adds an option to enable/disable webhook installation  | `helmify -add-webhook-option`|\n## Status\nSupported k8s resources:\n- Deployment, DaemonSet, StatefulSet\n- Job, CronJob\n- Service, Ingress\n- PersistentVolumeClaim\n- RBAC (ServiceAccount, (cluster-)role, (cluster-)roleBinding)\n- configs (ConfigMap, Secret)\n- webhooks (cert, issuer, ValidatingWebhookConfiguration)\n- custom resource definitions (CRD)\n\n### Known issues\n- Helmify will not overwrite `Chart.yaml` file if presented. Done on purpose.\n- Helmify will not delete existing template files, only overwrite.\n- Helmify overwrites templates and values files on every run. \n  This means that all your manual changes in helm template files will be lost on the next run.\n- if switching between the using the `-crd-dir` flag it is better to delete and regenerate the from scratch to ensure crds are not accidentally spliced/formatted into the same chart. Bear in mind you will want to update your `Chart.yaml` thereafter.\n  \n## Develop\nTo support a new type of k8s object template:\n1. Implement `helmify.Processor` interface. Place implementation in `pkg/processor`. The package contains \nexamples for most k8s objects.\n2. Register your processor in the `pkg/app/app.go`\n3. Add relevant input sample to `test_data/kustomize.output`.\n\n\n### Run\nClone repo and execute command:\n\n```shell\ncat test_data/k8s-operator-kustomize.output | go run ./cmd/helmify mychart\n```\n\nWill generate `mychart` Helm chart form file `test_data/k8s-operator-kustomize.output` representing typical operator\n[kustomize](https://github.com/kubernetes-sigs/kustomize) output.\n\n### Test\nFor manual testing, run program with debug output:\n```shell\ncat test_data/k8s-operator-kustomize.output | go run ./cmd/helmify -vv mychart\n```\nThen inspect logs and generated chart in `./mychart` directory.\n\nTo execute tests, run:\n```shell\ngo test ./...\n```\nBeside unit-tests, project contains e2e test `pkg/app/app_e2e_test.go`.\nIt's a go test, which uses `test_data/*` to generate a chart in temporary directory. \nThen runs `helm lint --strict` to check if generated chart is valid.\n\n## Contribute\n\nFollowing rules will help changes to be accepted faster:\n- For more than one-line bugfixes consider creating an issue with bug description or feature request\n- For feature request try to think about and cover following topics (when applicable):\n  - Motivation: why feature is needed? Which problem does it solve? What is current workaround?\n  - Backward-compatibility: existing users expect that after upgrading helmify version their existing generated charts wont be changed without consent.\n- For bugfix PR consider adding example to [/test_data](./test_data/) source yamls reproducing bug.\n\n### Contribution flow\n\nCheck list before submitting PR:\n1. Run `go fmt ./...`\n2. Run tests `go test ./...`\n3. Update chart examples:\n   ```shell\n   cat test_data/sample-app.yaml | go run ./cmd/helmify examples/app\n   ```\n   ```shell\n   cat test_data/k8s-operator-kustomize.output | go run ./cmd/helmify examples/operator\n   ```\n4. In case of long commit history (more than 3) squash local commits into one\n","funding_links":[],"categories":["Go","kubernetes","\u003ca name=\"Go\"\u003e\u003c/a\u003eGo"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Farttor%2Fhelmify","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Farttor%2Fhelmify","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Farttor%2Fhelmify/lists"}