135 lines
5.6 KiB
YAML
135 lines
5.6 KiB
YAML
name: K8s Bootstrap Setup
|
|
|
|
on:
|
|
workflow_dispatch:
|
|
|
|
jobs:
|
|
bootstrap:
|
|
runs-on: mealcraft-runners
|
|
container:
|
|
image: ubuntu:22.04
|
|
|
|
steps:
|
|
# -----------------------------------------------------
|
|
# Checkout
|
|
# -----------------------------------------------------
|
|
- uses: actions/checkout@v4
|
|
|
|
# -----------------------------------------------------
|
|
# Install kubectl
|
|
# -----------------------------------------------------
|
|
- name: Install kubectl
|
|
run: |
|
|
apt-get update
|
|
apt-get install -y ca-certificates curl
|
|
curl -LO "https://dl.k8s.io/release/$(curl -sL https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl"
|
|
install -m 0755 kubectl /usr/local/bin/kubectl
|
|
|
|
# -----------------------------------------------------
|
|
# Configure kubeconfig using ARC pod token
|
|
# -----------------------------------------------------
|
|
- name: Configure kubeconfig
|
|
run: |
|
|
KUBE_HOST="https://$KUBERNETES_SERVICE_HOST:$KUBERNETES_SERVICE_PORT"
|
|
SA_TOKEN=$(cat /var/run/secrets/kubernetes.io/serviceaccount/token)
|
|
CA_CERT=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
|
|
NAMESPACE=$(cat /var/run/secrets/kubernetes.io/serviceaccount/namespace)
|
|
|
|
kubectl config set-cluster microk8s --server="$KUBE_HOST" --certificate-authority="$CA_CERT"
|
|
kubectl config set-credentials runner --token="$SA_TOKEN"
|
|
kubectl config set-context runner-context --cluster=microk8s --user=runner --namespace="$NAMESPACE"
|
|
kubectl config use-context runner-context
|
|
|
|
- name: Install Buildx Standalone
|
|
run: |
|
|
mkdir -p ~/.docker/cli-plugins/
|
|
curl -sSL https://github.com/docker/buildx/releases/download/v0.13.1/buildx-v0.13.1.linux-amd64 \
|
|
-o ~/.docker/cli-plugins/docker-buildx
|
|
chmod +x ~/.docker/cli-plugins/docker-buildx
|
|
docker buildx version
|
|
|
|
# -----------------------------------------------------
|
|
# Build & Push Docker Image (ARC-compatible, no Docker)
|
|
# -----------------------------------------------------
|
|
- name: Build & Push Traefik Image (ARC-compatible)
|
|
uses: docker/build-push-action@v5
|
|
env:
|
|
BUILDKIT_SBOM_SCAN_STATUS: disabled
|
|
with:
|
|
context: ${{ github.workspace }}/traefik
|
|
file: ${{ github.workspace }}/traefik/Dockerfile
|
|
platforms: linux/amd64
|
|
push: true
|
|
provenance: false
|
|
sbom: false
|
|
builder: default
|
|
tags: |
|
|
docker.io/kimjunte/edge_router:${{ github.sha }}
|
|
docker.io/kimjunte/edge_router:latest
|
|
|
|
# -----------------------------------------------------
|
|
# Apply Storage Classes + PVCs
|
|
# -----------------------------------------------------
|
|
- name: Apply StorageClass + PV
|
|
run: |
|
|
kubectl apply -f traefik/storageclass/storageclass.yaml
|
|
kubectl apply -f traefik/storageclass/certs-pv.yaml
|
|
kubectl get storageclass
|
|
|
|
# -----------------------------------------------------
|
|
# Install Traefik CRDs (idempotent)
|
|
# -----------------------------------------------------
|
|
- name: Install Traefik CRDs
|
|
run: |
|
|
if ! kubectl get crd ingressroutes.traefik.containo.us >/dev/null 2>&1; then
|
|
echo "Installing Traefik CRDs..."
|
|
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-definition-v1.yml
|
|
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-rbac.yml
|
|
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/user-guides/crd-acme/05-tlsoption.yml
|
|
else
|
|
echo "CRDs already exist — skipping."
|
|
fi
|
|
|
|
# -----------------------------------------------------
|
|
# Deploy Traefik
|
|
# -----------------------------------------------------
|
|
- name: Deploy Traefik
|
|
run: |
|
|
kubectl apply -f traefik/edge-router/pvc.yaml
|
|
kubectl apply -f traefik/edge-router/traefik-deployment.yml
|
|
kubectl apply -f traefik/edge-router/traefik-services.yml
|
|
kubectl apply -f traefik/edge-router/middleware.yaml
|
|
kubectl apply -f traefik/edge-router/secret-dashboard.yml
|
|
kubectl apply -f traefik/edge-router/traefik-ingressroute.yml
|
|
|
|
# -----------------------------------------------------
|
|
# Deploy whoami (test app)
|
|
# -----------------------------------------------------
|
|
- name: Deploy whoami test service
|
|
run: |
|
|
kubectl apply -f traefik/who-am-i/whoami-deployment.yml
|
|
kubectl apply -f traefik/who-am-i/whoami-service.yml
|
|
kubectl apply -f traefik/who-am-i/whoami-ingressroute.yml
|
|
|
|
# -----------------------------------------------------
|
|
# Create registry secret
|
|
# -----------------------------------------------------
|
|
- name: Create registry secret (default ns)
|
|
run: |
|
|
kubectl apply -f traefik/docker-registry-credentials/docker-credentials.yml
|
|
|
|
# -----------------------------------------------------
|
|
# Create staging namespace
|
|
# -----------------------------------------------------
|
|
- name: Create staging namespace
|
|
run: |
|
|
kubectl get namespace staging >/dev/null 2>&1 || kubectl create namespace staging
|
|
|
|
# -----------------------------------------------------
|
|
# Apply registry secret to staging
|
|
# -----------------------------------------------------
|
|
- name: Registry secret in staging namespace
|
|
run: |
|
|
sed 's/namespace: default/namespace: staging/' \
|
|
traefik/docker-registry-credentials/docker-credentials.yml \
|
|
| kubectl apply -f -
|