devops-cicd — community devops-cicd, EUCORA, community, ide skills

v1.0.0

About this Skill

Ideal for Automated Deployment Agents requiring standardized CI/CD pipelines with GitHub Actions and container orchestration using Docker Compose and Kubernetes. DevOps and CI/CD patterns for EUCORA including GitHub Actions workflows, Docker Compose orchestration, quality gates, and pre-commit hooks. Use when creating pipelines, configuring containers, or impl

buildworksai buildworksai
[0]
[0]
Updated: 3/6/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 7/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Locale and body language aligned
Review Score
7/11
Quality Score
36
Canonical Locale
en
Detected Body Locale
en

Ideal for Automated Deployment Agents requiring standardized CI/CD pipelines with GitHub Actions and container orchestration using Docker Compose and Kubernetes. DevOps and CI/CD patterns for EUCORA including GitHub Actions workflows, Docker Compose orchestration, quality gates, and pre-commit hooks. Use when creating pipelines, configuring containers, or impl

Core Value

Empowers agents to enforce code quality gates with pre-commit hooks, CI enforcement, and zero warnings tolerance, ensuring ≥90% code coverage and streamlined DevOps workflows using EUCORA.

Ideal Agent Persona

Ideal for Automated Deployment Agents requiring standardized CI/CD pipelines with GitHub Actions and container orchestration using Docker Compose and Kubernetes.

Capabilities Granted for devops-cicd

Automating code quality checks with GitHub Actions workflows
Deploying containerized applications using Docker Compose and Kubernetes
Enforcing consistent coding standards with linting and pre-commit hooks

! Prerequisites & Limits

  • Requires GitHub Actions setup
  • Limited to EUCORA platform
  • Dependent on Docker Compose and Kubernetes for container orchestration

Why this page is reference-only

  • - The underlying skill quality score is below the review floor.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is devops-cicd?

Ideal for Automated Deployment Agents requiring standardized CI/CD pipelines with GitHub Actions and container orchestration using Docker Compose and Kubernetes. DevOps and CI/CD patterns for EUCORA including GitHub Actions workflows, Docker Compose orchestration, quality gates, and pre-commit hooks. Use when creating pipelines, configuring containers, or impl

How do I install devops-cicd?

Run the command: npx killer-skills add buildworksai/EUCORA/devops-cicd. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for devops-cicd?

Key use cases include: Automating code quality checks with GitHub Actions workflows, Deploying containerized applications using Docker Compose and Kubernetes, Enforcing consistent coding standards with linting and pre-commit hooks.

Which IDEs are compatible with devops-cicd?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for devops-cicd?

Requires GitHub Actions setup. Limited to EUCORA platform. Dependent on Docker Compose and Kubernetes for container orchestration.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add buildworksai/EUCORA/devops-cicd. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use devops-cicd immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

devops-cicd

Install devops-cicd, an AI agent skill for AI agent workflows and automation. Review the use cases, limitations, and setup path before rollout.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

DevOps & CI/CD Patterns

CI/CD and container orchestration patterns for the EUCORA platform.


Quick Reference

TechnologyPattern
CI/CDGitHub Actions
ContainersDocker Compose (dev), Kubernetes (prod)
Quality GatesPre-commit hooks + CI enforcement
Coverage≥90% enforced
LintingZero warnings tolerance

GitHub Actions Workflows

Workflow Structure

yaml
1# .github/workflows/code-quality.yml 2name: Code Quality 3 4on: 5 push: 6 branches: [main, develop] 7 pull_request: 8 branches: [main] 9 10jobs: 11 backend-tests: 12 runs-on: ubuntu-latest 13 14 services: 15 postgres: 16 image: postgres:16 17 env: 18 POSTGRES_DB: test_db 19 POSTGRES_USER: test 20 POSTGRES_PASSWORD: test 21 ports: 22 - 5432:5432 23 options: >- 24 --health-cmd pg_isready 25 --health-interval 10s 26 --health-timeout 5s 27 --health-retries 5 28 29 steps: 30 - uses: actions/checkout@v4 31 32 - name: Set up Python 33 uses: actions/setup-python@v5 34 with: 35 python-version: '3.12' 36 cache: 'pip' 37 38 - name: Install dependencies 39 run: pip install -r requirements.txt 40 41 - name: Run tests with coverage 42 run: pytest --cov --cov-fail-under=90 --cov-report=xml 43 env: 44 DATABASE_URL: postgres://test:test@localhost:5432/test_db 45 46 - name: Upload coverage 47 uses: codecov/codecov-action@v4 48 with: 49 files: coverage.xml 50 fail_ci_if_error: true 51 52 frontend-tests: 53 runs-on: ubuntu-latest 54 55 steps: 56 - uses: actions/checkout@v4 57 58 - name: Set up Node 59 uses: actions/setup-node@v4 60 with: 61 node-version: '20' 62 cache: 'npm' 63 cache-dependency-path: frontend/package-lock.json 64 65 - name: Install dependencies 66 run: npm ci 67 working-directory: frontend 68 69 - name: TypeScript check 70 run: npx tsc --noEmit 71 working-directory: frontend 72 73 - name: ESLint (zero warnings) 74 run: npm run lint -- --max-warnings 0 75 working-directory: frontend 76 77 - name: Run tests 78 run: npm test -- --coverage 79 working-directory: frontend

Quality Gate Enforcement

yaml
1# Quality gate job - blocks merge if failed 2quality-gate: 3 runs-on: ubuntu-latest 4 needs: [backend-tests, frontend-tests, security-scan] 5 6 steps: 7 - name: Check all jobs passed 8 run: | 9 echo "All quality gates passed ✅" 10 echo "- Backend tests: ${{ needs.backend-tests.result }}" 11 echo "- Frontend tests: ${{ needs.frontend-tests.result }}" 12 echo "- Security scan: ${{ needs.security-scan.result }}"

Docker Compose

Development Configuration

yaml
1# docker-compose.dev.yml 2version: '3.8' 3 4services: 5 web: 6 build: 7 context: . 8 dockerfile: Dockerfile.dev 9 ports: 10 - "8000:8000" 11 volumes: 12 - ./backend:/app 13 - static_volume:/app/staticfiles 14 environment: 15 - DEBUG=True 16 - DATABASE_URL=postgres://user:pass@db:5432/eucora 17 - REDIS_URL=redis://redis:6379/0 18 depends_on: 19 db: 20 condition: service_healthy 21 redis: 22 condition: service_healthy 23 healthcheck: 24 test: ["CMD", "curl", "-f", "http://localhost:8000/health/"] 25 interval: 30s 26 timeout: 10s 27 retries: 3 28 29 db: 30 image: postgres:16 31 volumes: 32 - postgres_data:/var/lib/postgresql/data 33 environment: 34 POSTGRES_DB: eucora 35 POSTGRES_USER: user 36 POSTGRES_PASSWORD: pass 37 healthcheck: 38 test: ["CMD-SHELL", "pg_isready -U user -d eucora"] 39 interval: 10s 40 timeout: 5s 41 retries: 5 42 43 redis: 44 image: redis:7-alpine 45 healthcheck: 46 test: ["CMD", "redis-cli", "ping"] 47 interval: 10s 48 timeout: 5s 49 retries: 3 50 51 celery-worker: 52 build: 53 context: . 54 dockerfile: Dockerfile.dev 55 command: celery -A config worker -l info 56 volumes: 57 - ./backend:/app 58 environment: 59 - DATABASE_URL=postgres://user:pass@db:5432/eucora 60 - REDIS_URL=redis://redis:6379/0 61 depends_on: 62 - web 63 - redis 64 65 celery-beat: 66 build: 67 context: . 68 dockerfile: Dockerfile.dev 69 command: celery -A config beat -l info 70 volumes: 71 - ./backend:/app 72 depends_on: 73 - celery-worker 74 deploy: 75 replicas: 1 # Singleton pattern 76 77volumes: 78 postgres_data: 79 static_volume:

Production Configuration

yaml
1# docker-compose.prod.yml 2version: '3.8' 3 4services: 5 web: 6 image: eucora/backend:${TAG:-latest} 7 deploy: 8 replicas: 3 9 resources: 10 limits: 11 cpus: '1' 12 memory: 1G 13 reservations: 14 cpus: '0.5' 15 memory: 512M 16 update_config: 17 parallelism: 1 18 delay: 10s 19 failure_action: rollback 20 healthcheck: 21 test: ["CMD", "curl", "-f", "http://localhost:8000/health/"] 22 interval: 30s 23 timeout: 10s 24 retries: 3 25 start_period: 40s

Pre-Commit Hooks

Configuration

yaml
1# .pre-commit-config.yaml 2repos: 3 # Python 4 - repo: https://github.com/astral-sh/ruff-pre-commit 5 rev: v0.3.0 6 hooks: 7 - id: ruff 8 args: [--fix] 9 - id: ruff-format 10 11 - repo: https://github.com/pre-commit/mirrors-mypy 12 rev: v1.8.0 13 hooks: 14 - id: mypy 15 additional_dependencies: [types-all] 16 17 # JavaScript/TypeScript 18 - repo: https://github.com/pre-commit/mirrors-eslint 19 rev: v8.56.0 20 hooks: 21 - id: eslint 22 args: [--max-warnings, '0'] 23 files: \.[jt]sx?$ 24 25 # Security 26 - repo: https://github.com/Yelp/detect-secrets 27 rev: v1.4.0 28 hooks: 29 - id: detect-secrets 30 args: ['--baseline', '.secrets.baseline'] 31 32 # General 33 - repo: https://github.com/pre-commit/pre-commit-hooks 34 rev: v4.5.0 35 hooks: 36 - id: trailing-whitespace 37 - id: end-of-file-fixer 38 - id: check-yaml 39 - id: check-json 40 - id: check-merge-conflict 41 - id: no-commit-to-branch 42 args: [--branch, main]

Installation

bash
1# Install pre-commit 2pip install pre-commit 3 4# Install hooks 5pre-commit install 6 7# Run on all files 8pre-commit run --all-files

Dockerfile Patterns

Multi-Stage Build

dockerfile
1# Dockerfile 2# Stage 1: Build 3FROM python:3.12-slim as builder 4 5WORKDIR /app 6 7COPY requirements.txt . 8RUN pip wheel --no-cache-dir --no-deps --wheel-dir /wheels -r requirements.txt 9 10# Stage 2: Production 11FROM python:3.12-slim 12 13ENV PYTHONDONTWRITEBYTECODE=1 \ 14 PYTHONUNBUFFERED=1 15 16WORKDIR /app 17 18# Install system deps 19RUN apt-get update && apt-get install -y --no-install-recommends \ 20 libpq5 \ 21 && rm -rf /var/lib/apt/lists/* 22 23# Install Python deps 24COPY --from=builder /wheels /wheels 25RUN pip install --no-cache /wheels/* 26 27# Copy app 28COPY backend/ . 29 30# Create non-root user 31RUN adduser --disabled-password --gecos '' appuser 32USER appuser 33 34EXPOSE 8000 35 36CMD ["gunicorn", "config.wsgi:application", "--bind", "0.0.0.0:8000", "--workers", "4"]

Development Dockerfile

dockerfile
1# Dockerfile.dev 2FROM python:3.12-slim 3 4ENV PYTHONDONTWRITEBYTECODE=1 \ 5 PYTHONUNBUFFERED=1 6 7WORKDIR /app 8 9# Install system deps 10RUN apt-get update && apt-get install -y --no-install-recommends \ 11 libpq-dev gcc curl \ 12 && rm -rf /var/lib/apt/lists/* 13 14COPY requirements.txt requirements-dev.txt ./ 15RUN pip install -r requirements-dev.txt 16 17EXPOSE 8000 18 19CMD ["python", "manage.py", "runserver", "0.0.0.0:8000"]

Quality Gates Checklist

CI Pipeline Must Enforce

☐ Backend tests pass (pytest)
☐ Frontend tests pass (vitest)
☐ Coverage ≥90% (pytest-cov, vitest --coverage)
☐ TypeScript check passes (tsc --noEmit)
☐ ESLint zero warnings (--max-warnings 0)
☐ Python linting passes (ruff)
☐ Security scan passes (trivy, detect-secrets)
☐ SPDX compliance check passes

Pre-Commit Must Block

☐ Trailing whitespace
☐ Merge conflicts
☐ Invalid YAML/JSON
☐ Secrets in code
☐ Direct commits to main
☐ Type errors (mypy)
☐ Linting errors (ruff, eslint)

Commands Reference

bash
1# Docker Compose 2docker compose -f docker-compose.dev.yml up -d 3docker compose -f docker-compose.dev.yml logs -f web 4docker compose -f docker-compose.dev.yml exec web python manage.py migrate 5docker compose -f docker-compose.dev.yml down -v 6 7# Pre-commit 8pre-commit install 9pre-commit run --all-files 10pre-commit autoupdate 11 12# Testing with coverage 13pytest --cov --cov-fail-under=90 --cov-report=html 14npm test -- --coverage 15 16# Build and push 17docker build -t eucora/backend:latest . 18docker push eucora/backend:latest

Anti-Patterns

❌ FORBIDDEN✅ CORRECT
Skipping CI checksAll checks must pass
Coverage < 90%Enforce ≥90% in CI
--no-verify commitsPre-commit hooks mandatory
Secrets in DockerfileUse build args or vault
Root user in containerCreate non-root user
No health checksAlways define health checks

Related Skills

Looking for an alternative to devops-cicd or another community skill for your workflow? Explore these related open-source skills.

View All

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
AI

widget-generator

Logo of f
f

Generate customizable widget plugins for the prompts.chat feed system

149.6k
0
AI

flags

Logo of vercel
vercel

The React Framework

138.4k
0
Browser

pr-review

Logo of pytorch
pytorch

Tensors and Dynamic neural networks in Python with strong GPU acceleration

98.6k
0
Developer