This commit is contained in:
Jun-te Kim 2025-12-06 21:17:31 +00:00
parent f7e9326872
commit 87f5cef310

View file

@ -10,9 +10,6 @@ jobs:
image: ubuntu:22.04 image: ubuntu:22.04
steps: steps:
# -----------------------------------------------------
# Checkout Repo
# -----------------------------------------------------
- uses: actions/checkout@v4 - uses: actions/checkout@v4
# ----------------------------------------------------- # -----------------------------------------------------
@ -41,50 +38,43 @@ jobs:
kubectl config use-context runner-context kubectl config use-context runner-context
# ----------------------------------------------------- # -----------------------------------------------------
# Install buildctl (BuildKit client only) # Install buildctl (standalone)
# ----------------------------------------------------- # -----------------------------------------------------
- name: Install buildctl - name: Install buildctl
run: | run: |
apt-get update apt-get update && apt-get install -y curl
apt-get install -y curl
curl -sSL https://github.com/moby/buildkit/releases/download/v0.12.5/buildkit-v0.12.5.linux-amd64.tar.gz -o buildkit.tar.gz curl -sSL https://github.com/moby/buildkit/releases/download/v0.12.5/buildkit-v0.12.5.linux-amd64.tar.gz -o buildkit.tar.gz
tar -xzf buildkit.tar.gz tar -xzf buildkit.tar.gz
mv bin/buildctl /usr/local/bin/ mv bin/buildctl /usr/local/bin/
chmod +x /usr/local/bin/buildctl chmod +x /usr/local/bin/buildctl
# ----------------------------------------------------- # -----------------------------------------------------
# Authenticate to Docker Hub for pushing # Build & Push Docker Image (NO docker, NO buildx, NO daemon)
# -----------------------------------------------------
- name: Docker Hub Login (buildctl)
run: |
echo "${{ secrets.DOCKER_HUB_PASSWORD }}" | \
buildctl login docker.io \
--username ${{ secrets.DOCKER_HUB_USERNAME }} \
--password-stdin
# -----------------------------------------------------
# Build & Push Docker Image (ARC-compatible, simplest)
# ----------------------------------------------------- # -----------------------------------------------------
- name: Build & Push Traefik Image - name: Build & Push Traefik Image
env: env:
DOCKER_USER: ${{ secrets.DOCKER_HUB_USERNAME }}
DOCKER_PASS: ${{ secrets.DOCKER_HUB_PASSWORD }}
IMAGE_SHA: docker.io/kimjunte/edge_router:${{ github.sha }} IMAGE_SHA: docker.io/kimjunte/edge_router:${{ github.sha }}
IMAGE_LATEST: docker.io/kimjunte/edge_router:latest IMAGE_LATEST: docker.io/kimjunte/edge_router:latest
run: | run: |
# Build SHA-tagged image AUTH=$(printf "%s:%s" "$DOCKER_USER" "$DOCKER_PASS" | base64 -w0)
buildctl build \
--frontend dockerfile.v0 \
--local context="${GITHUB_WORKSPACE}/traefik" \
--local dockerfile="${GITHUB_WORKSPACE}/traefik" \
--opt platform=linux/amd64 \
--output type=image,name=${IMAGE_SHA},push=true
# Push latest tag # Build + Push SHA tag
buildctl build \ buildctl build \
--frontend dockerfile.v0 \ --frontend dockerfile.v0 \
--local context="${GITHUB_WORKSPACE}/traefik" \ --local context="${GITHUB_WORKSPACE}/traefik" \
--local dockerfile="${GITHUB_WORKSPACE}/traefik" \ --local dockerfile="${GITHUB_WORKSPACE}/traefik" \
--opt platform=linux/amd64 \ --opt platform=linux/amd64 \
--output type=image,name=${IMAGE_LATEST},push=true --output type=registry,name=${IMAGE_SHA},push=true,registry.insecure=false,registry.auth=$AUTH
# Build + Push latest tag
buildctl build \
--frontend dockerfile.v0 \
--local context="${GITHUB_WORKSPACE}/traefik" \
--local dockerfile="${GITHUB_WORKSPACE}/traefik" \
--opt platform=linux/amd64 \
--output type=registry,name=${IMAGE_LATEST},push=true,registry.insecure=false,registry.auth=$AUTH
# ----------------------------------------------------- # -----------------------------------------------------
# Apply Storage Classes + PVCs # Apply Storage Classes + PVCs
@ -93,7 +83,6 @@ jobs:
run: | run: |
kubectl apply -f traefik/storageclass/storageclass.yaml kubectl apply -f traefik/storageclass/storageclass.yaml
kubectl apply -f traefik/storageclass/certs-pv.yaml kubectl apply -f traefik/storageclass/certs-pv.yaml
kubectl get storageclass
# ----------------------------------------------------- # -----------------------------------------------------
# Install Traefik CRDs (idempotent) # Install Traefik CRDs (idempotent)
@ -101,12 +90,9 @@ jobs:
- name: Install Traefik CRDs - name: Install Traefik CRDs
run: | run: |
if ! kubectl get crd ingressroutes.traefik.containo.us >/dev/null 2>&1; then if ! kubectl get crd ingressroutes.traefik.containo.us >/dev/null 2>&1; then
echo "Installing Traefik CRDs..."
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-definition-v1.yml kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-definition-v1.yml
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-rbac.yml kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-rbac.yml
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/user-guides/crd-acme/05-tlsoption.yml kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/user-guides/crd-acme/05-tlsoption.yml
else
echo "Traefik CRDs already exist — skipping."
fi fi
# ----------------------------------------------------- # -----------------------------------------------------
@ -131,21 +117,21 @@ jobs:
kubectl apply -f traefik/who-am-i/whoami-ingressroute.yml kubectl apply -f traefik/who-am-i/whoami-ingressroute.yml
# ----------------------------------------------------- # -----------------------------------------------------
# Default namespace registry secret # Create registry secret in default namespace
# ----------------------------------------------------- # -----------------------------------------------------
- name: Create registry secret (default) - name: Create registry secret (default)
run: | run: |
kubectl apply -f traefik/docker-registry-credentials/docker-credentials.yml kubectl apply -f traefik/docker-registry-credentials/docker-credentials.yml
# ----------------------------------------------------- # -----------------------------------------------------
# Create staging namespace # Ensure staging namespace exists
# ----------------------------------------------------- # -----------------------------------------------------
- name: Create staging namespace - name: Create staging namespace
run: | run: |
kubectl get ns staging >/dev/null 2>&1 || kubectl create namespace staging kubectl get ns staging >/dev/null 2>&1 || kubectl create namespace staging
# ----------------------------------------------------- # -----------------------------------------------------
# Add registry secret to staging namespace # Apply registry secret to staging
# ----------------------------------------------------- # -----------------------------------------------------
- name: Registry secret to staging - name: Registry secret to staging
run: | run: |