Merge pull request #4 from MealCraft/feature/traefik_who_am_i

Feature/traefik who am i
This commit is contained in:
Jun-te Kim 2025-12-06 20:37:08 +00:00 committed by GitHub
commit 6cd1267fb7
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
3 changed files with 133 additions and 1 deletions

View file

@ -0,0 +1,130 @@
name: K8s Bootstrap Setup
on:
workflow_dispatch:
jobs:
bootstrap:
runs-on: mealcraft-runners
container: ubuntu:22.04
steps:
# -----------------------------------------------------
# Checkout
# -----------------------------------------------------
- uses: actions/checkout@v4
# -----------------------------------------------------
# Install kubectl
# -----------------------------------------------------
- name: Install kubectl
run: |
apt-get update
apt-get install -y ca-certificates curl
curl -LO "https://dl.k8s.io/release/$(curl -sL https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl"
install -m 0755 kubectl /usr/local/bin/kubectl
# -----------------------------------------------------
# Configure kubeconfig using the ARC pod token
# -----------------------------------------------------
- name: Configure kubeconfig
run: |
KUBE_HOST="https://$KUBERNETES_SERVICE_HOST:$KUBERNETES_SERVICE_PORT"
SA_TOKEN=$(cat /var/run/secrets/kubernetes.io/serviceaccount/token)
CA_CERT=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
NAMESPACE=$(cat /var/run/secrets/kubernetes.io/serviceaccount/namespace)
kubectl config set-cluster microk8s --server="$KUBE_HOST" --certificate-authority="$CA_CERT"
kubectl config set-credentials runner --token="$SA_TOKEN"
kubectl config set-context runner-context --cluster=microk8s --user=runner --namespace="$NAMESPACE"
kubectl config use-context runner-context
# -----------------------------------------------------
# Docker Login
# -----------------------------------------------------
- name: Docker Login
uses: ./.github/actions/docker-login
with:
username: ${{ secrets.DOCKER_HUB_USERNAME }}
password: ${{ secrets.DOCKER_HUB_TOKEN }}
# -----------------------------------------------------
# Build & Push the Docker Image (idempotent)
# -----------------------------------------------------
- name: Build Traefik Image
run: |
docker build traefik \
--file traefik/Dockerfile \
--tag docker.io/kimjunte/edge_router:$GITHUB_SHA
- name: Push Traefik Image
run: |
docker push docker.io/kimjunte/edge_router:$GITHUB_SHA
# -----------------------------------------------------
# Apply Storage Classes + PVCs — idempotent with apply
# -----------------------------------------------------
- name: Apply StorageClass + PV
run: |
kubectl apply -f traefik/storageclass/storageclass.yaml
kubectl apply -f traefik/storageclass/certs-pv.yaml
kubectl get storageclass
# -----------------------------------------------------
# Apply Traefik CRDs only if missing
# -----------------------------------------------------
- name: Install Traefik CRDs (idempotent)
run: |
if ! kubectl get crd ingressroutes.traefik.containo.us >/dev/null 2>&1; then
echo "Traefik CRDs not found — installing..."
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-definition-v1.yml
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-rbac.yml
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/user-guides/crd-acme/05-tlsoption.yml
else
echo "Traefik CRDs already installed — skipping."
fi
# -----------------------------------------------------
# Deploy Traefik — idempotent with kubectl apply
# -----------------------------------------------------
- name: Deploy Traefik (safe repeat)
run: |
echo "Applying Traefik PVC/Deployments/Services/etc…"
kubectl apply -f traefik/edge-router/pvc.yaml
kubectl apply -f traefik/edge-router/traefik-deployment.yml
kubectl apply -f traefik/edge-router/traefik-services.yml
kubectl apply -f traefik/edge-router/middleware.yaml
kubectl apply -f traefik/edge-router/secret-dashboard.yml
kubectl apply -f traefik/edge-router/traefik-ingressroute.yml
# -----------------------------------------------------
# Deploy whoami — idempotent
# -----------------------------------------------------
- name: Deploy whoami test service
run: |
kubectl apply -f traefik/who-am-i/whoami-deployment.yml
kubectl apply -f traefik/who-am-i/whoami-service.yml
kubectl apply -f traefik/who-am-i/whoami-ingressroute.yml
# -----------------------------------------------------
# Create Docker Registry Secrets — idempotent
# -----------------------------------------------------
- name: Create registry secret (default ns)
run: |
kubectl apply -f traefik/docker-registry-credentials/docker-credentials.yml
# -----------------------------------------------------
# Create staging namespace if not exists
# -----------------------------------------------------
- name: Create staging namespace
run: |
kubectl get namespace staging >/dev/null 2>&1 || kubectl create namespace staging
# -----------------------------------------------------
# Apply registry secret to staging — idempotent
# -----------------------------------------------------
- name: Registry secret in staging namespace
run: |
sed 's/namespace: default/namespace: staging/' \
traefik/docker-registry-credentials/docker-credentials.yml \
| kubectl apply -f -

View file

@ -7,6 +7,7 @@ TODO:
- [x] Download next js
- [x] Aws terraform plan and apply configured
- [] Deploy into my new k8s
- [x] k get pods -A works
- [] deploy docker registry credentials
- [] deploy storageclass
- [] deloy traefik customised

View file

@ -55,7 +55,7 @@ metadata:
name: arc-runner-readonly-binding
subjects:
- kind: ServiceAccount
name: mealcraft-runners
name: default
namespace: arc-systems
roleRef:
kind: ClusterRole
@ -63,4 +63,5 @@ roleRef:
apiGroup: rbac.authorization.k8s.io
EOF
echo "=== RBAC Applied Successfully ==="