name: K8s Bootstrap Setup on: workflow_dispatch: jobs: bootstrap: runs-on: mealcraft-runners container: image: ubuntu:22.04 steps: # ----------------------------------------------------- # Checkout # ----------------------------------------------------- - uses: actions/checkout@v4 # ----------------------------------------------------- # Install kubectl # ----------------------------------------------------- - name: Install kubectl run: | apt-get update apt-get install -y ca-certificates curl curl -LO "https://dl.k8s.io/release/$(curl -sL https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl" install -m 0755 kubectl /usr/local/bin/kubectl # ----------------------------------------------------- # Configure kubeconfig using ARC pod token # ----------------------------------------------------- - name: Configure kubeconfig run: | KUBE_HOST="https://$KUBERNETES_SERVICE_HOST:$KUBERNETES_SERVICE_PORT" SA_TOKEN=$(cat /var/run/secrets/kubernetes.io/serviceaccount/token) CA_CERT=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt NAMESPACE=$(cat /var/run/secrets/kubernetes.io/serviceaccount/namespace) kubectl config set-cluster microk8s --server="$KUBE_HOST" --certificate-authority="$CA_CERT" kubectl config set-credentials runner --token="$SA_TOKEN" kubectl config set-context runner-context --cluster=microk8s --user=runner --namespace="$NAMESPACE" kubectl config use-context runner-context # ----------------------------------------------------- # Enable Buildx in Rootless BuildKit Mode # ----------------------------------------------------- - name: Install buildkit run: | curl -sSL https://github.com/moby/buildkit/releases/download/v0.12.5/buildkit-v0.12.5.linux-amd64.tar.gz -o buildkit.tar.gz tar -xzf buildkit.tar.gz mv bin/buildctl /usr/local/bin/ mv bin/buildkitd /usr/local/bin/ chmod +x /usr/local/bin/buildctl /usr/local/bin/buildkitd - name: Start buildkitd (rootless) run: | buildkitd --oci-worker-no-process-sandbox --rootless & sleep 3 - name: Build & Push (rootless buildkit) run: | buildctl build \ --frontend dockerfile.v0 \ --local context=./traefik \ --local dockerfile=./traefik \ --output type=image,name=docker.io/kimjunte/edge_router:${GITHUB_SHA},push=true # ----------------------------------------------------- # Apply Storage Classes + PVCs # ----------------------------------------------------- - name: Apply StorageClass + PV run: | kubectl apply -f traefik/storageclass/storageclass.yaml kubectl apply -f traefik/storageclass/certs-pv.yaml kubectl get storageclass # ----------------------------------------------------- # Install Traefik CRDs (idempotent) # ----------------------------------------------------- - name: Install Traefik CRDs run: | if ! kubectl get crd ingressroutes.traefik.containo.us >/dev/null 2>&1; then echo "Installing Traefik CRDs..." kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-definition-v1.yml kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-rbac.yml kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/user-guides/crd-acme/05-tlsoption.yml else echo "CRDs already exist — skipping." fi # ----------------------------------------------------- # Deploy Traefik # ----------------------------------------------------- - name: Deploy Traefik run: | kubectl apply -f traefik/edge-router/pvc.yaml kubectl apply -f traefik/edge-router/traefik-deployment.yml kubectl apply -f traefik/edge-router/traefik-services.yml kubectl apply -f traefik/edge-router/middleware.yaml kubectl apply -f traefik/edge-router/secret-dashboard.yml kubectl apply -f traefik/edge-router/traefik-ingressroute.yml # ----------------------------------------------------- # Deploy whoami # ----------------------------------------------------- - name: Deploy whoami test service run: | kubectl apply -f traefik/who-am-i/whoami-deployment.yml kubectl apply -f traefik/who-am-i/whoami-service.yml kubectl apply -f traefik/who-am-i/whoami-ingressroute.yml # ----------------------------------------------------- # Create registry secret # ----------------------------------------------------- - name: Create registry secret (default ns) run: | kubectl apply -f traefik/docker-registry-credentials/docker-credentials.yml # ----------------------------------------------------- # Create staging namespace # ----------------------------------------------------- - name: Create staging namespace run: | kubectl get namespace staging >/dev/null 2>&1 || kubectl create namespace staging # ----------------------------------------------------- # Apply registry secret to staging # ----------------------------------------------------- - name: Registry secret in staging namespace run: | sed 's/namespace: default/namespace: staging/' \ traefik/docker-registry-credentials/docker-credentials.yml \ | kubectl apply -f -