84 lines
3.2 KiB
YAML
84 lines
3.2 KiB
YAML
name: K8s Bootstrap Setup
|
|
|
|
on:
|
|
workflow_dispatch:
|
|
|
|
jobs:
|
|
bootstrap:
|
|
runs-on: mealcraft-runners
|
|
|
|
container:
|
|
image: docker:24.0-dind
|
|
options: --privileged
|
|
|
|
steps:
|
|
- uses: actions/checkout@v4
|
|
|
|
# Start the docker daemon manually (REQUIRED)
|
|
- name: Start Docker daemon
|
|
run: |
|
|
dockerd-entrypoint.sh >/tmp/dockerd.log 2>&1 &
|
|
echo "Waiting for Docker to start..."
|
|
sleep 10
|
|
docker info
|
|
|
|
- name: Install kubectl
|
|
run: |
|
|
apk add --no-cache curl ca-certificates bash
|
|
curl -LO "https://dl.k8s.io/release/$(curl -sL https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl"
|
|
install -m 0755 kubectl /usr/local/bin/kubectl
|
|
|
|
- name: Configure kubeconfig
|
|
run: |
|
|
KUBE_HOST="https://$KUBERNETES_SERVICE_HOST:$KUBERNETES_SERVICE_PORT"
|
|
SA_TOKEN=$(cat /var/run/secrets/kubernetes.io/serviceaccount/token)
|
|
CA_CERT=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
|
|
NAMESPACE=$(cat /var/run/secrets/kubernetes.io/serviceaccount/namespace)
|
|
|
|
kubectl config set-cluster microk8s --server="$KUBE_HOST" --certificate-authority="$CA_CERT"
|
|
kubectl config set-credentials runner --token="$SA_TOKEN"
|
|
kubectl config set-context runner-context --cluster=microk8s --user=runner --namespace="$NAMESPACE"
|
|
kubectl config use-context runner-context
|
|
|
|
- name: Login to Docker Hub
|
|
uses: docker/login-action@v3
|
|
with:
|
|
username: ${{ secrets.DOCKER_HUB_USERNAME }}
|
|
password: ${{ secrets.DOCKER_HUB_TOKEN }}
|
|
|
|
- name: Build and Push Traefik Image
|
|
uses: docker/build-push-action@v5
|
|
with:
|
|
context: ./traefik
|
|
file: ./traefik/Dockerfile
|
|
push: true
|
|
tags: |
|
|
docker.io/kimjunte/edge_router:${{ github.sha }}
|
|
docker.io/kimjunte/edge_router:latest
|
|
|
|
- name: Apply StorageClass + PV
|
|
run: |
|
|
kubectl apply -f traefik/storageclass/storageclass.yaml
|
|
kubectl apply -f traefik/storageclass/certs-pv.yaml
|
|
|
|
- name: Install Traefik CRDs
|
|
run: |
|
|
if ! kubectl get crd ingressroutes.traefik.containo.us >/dev/null 2>&1; then
|
|
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-definition-v1.yml
|
|
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-rbac.yml
|
|
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/user-guides/crd-acme/05-tlsoption.yml
|
|
fi
|
|
|
|
- name: Deploy Traefik
|
|
run: |
|
|
kubectl apply -f traefik/edge-router/pvc.yaml
|
|
kubectl apply -f traefik/edge-router/traefik-deployment.yml
|
|
kubectl apply -f traefik/edge-router/traefik-services.yml
|
|
kubectl apply -f traefik/edge-router/middleware.yaml
|
|
kubectl apply -f traefik/edge-router/secret-dashboard.yml
|
|
kubectl apply -f traefik/edge-router/traefik-ingressroute.yml
|
|
|
|
- name: Deploy whoami
|
|
run: |
|
|
kubectl apply -f traefik/who-am-i/whoami-deployment.yml
|
|
kubectl apply -f traefik/who-am-i/whoami-servi
|