Manually deploy hono api to hono-api-prod env/namespace on microk8s #6
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Manually deploy hono api to hono-api-prod env/namespace on microk8s | |
on: workflow_dispatch # run manually | |
jobs: | |
deploy-prod: | |
name: Deploy to hono api prod | |
environment: | |
name: hono-api-prod | |
runs-on: ubuntu-latest | |
if: github.ref == 'refs/heads/main' | |
steps: | |
- name: Kubectl tool installer | |
uses: Azure/setup-kubectl@v3 | |
- name: Setup kubectl | |
env: | |
MICROK8S_CONFIG: ${{ secrets.MICROK8S_CONFIG }} | |
run: | | |
mkdir -p $HOME/.kube | |
echo "${MICROK8S_CONFIG}" | base64 --decode > $HOME/.kube/config | |
- name: Check kubectl get node | |
run: kubectl get nodes -o wide | |
- name: Check out code | |
uses: actions/checkout@v4 | |
- name: Install jq | |
run: sudo apt-get update && sudo apt-get install -y jq | |
- name: deploy apply pods to hono-api-prod env | |
env: | |
REGISTRY: ghcr.io | |
run: | | |
# Check if the namespace 'hono-api-prod' is already created, if not, create it. | |
NAMESPACE=$(kubectl get namespaces -o jsonpath="{.items[?(@.metadata.name=='hono-api-prod')].metadata.name}") | |
if [ -z "$NAMESPACE" ]; then | |
echo "Namespace $NAMESPACE does not exist. Creating namespace..." | |
kubectl apply -f k8s-hono-api/hono-api-prod/namespace.yaml | |
else | |
echo "Namespace $NAMESPACE already exists. Skipping creation." | |
fi | |
function manage_kube_secret { | |
local secret_name=$1 | |
local secret_key=$2 | |
local secret_value=$3 | |
local secret_type=${4:-generic} | |
if [ "$secret_name" == "regcred" ]; then | |
# Special handling for Github container registry secret | |
if ! kubectl -n hono-api-prod get secret "$secret_name"; then | |
echo "Creating Github container registry secret $secret_name..." | |
kubectl -n hono-api-prod create secret "$secret_type" "$secret_name" \ | |
--docker-username=${{ github.actor }} \ | |
--docker-password="$secret_value" \ | |
--docker-server=${{ env.REGISTRY }} | |
else | |
echo "Checking if Github container registry secret $secret_name needs to be updated..." | |
existing_pass=$(kubectl -n hono-api-prod get secret "$secret_name" --template='{{index .data ".dockerconfigjson" | base64decode}}' | jq -r '.auths["ghcr.io"].password') | |
if [[ "$existing_pass" != "$secret_value" ]]; then | |
echo "Updating Github registry secret $secret_name..." | |
kubectl -n hono-api-prod delete secret "$secret_name" | |
kubectl -n hono-api-prod create secret "$secret_type" "$secret_name" \ | |
--docker-username=${{ github.actor }} \ | |
--docker-password="$secret_value" \ | |
--docker-server=${{ env.REGISTRY }} | |
else | |
echo "Github container registry secret $secret_name is up-to-date, no action required." | |
fi | |
fi | |
else | |
# General handling for other secrets using passed parameters | |
if ! kubectl -n hono-api-prod get secret "$secret_name"; then | |
echo "Creating secret $secret_name..." | |
kubectl -n hono-api-prod create secret "$secret_type" "$secret_name" --from-literal="$secret_key"="$secret_value" | |
else | |
echo "Checking if secret $secret_name needs to be updated..." | |
existing_value=$(kubectl -n hono-api-prod get secret "$secret_name" --template="{{index .data \"$secret_key\" | base64decode}}") | |
if [[ "$existing_value" != "$secret_value" ]]; then | |
echo "Updating secret $secret_name..." | |
kubectl -n hono-api-prod delete secret "$secret_name" | |
kubectl -n hono-api-prod create secret "$secret_type" "$secret_name" --from-literal="$secret_key"="$secret_value" | |
else | |
echo "Secret $secret_name is up-to-date, no action required." | |
fi | |
fi | |
fi | |
} | |
# Handle secrets using the generic function | |
manage_kube_secret "regcred" ".dockerconfigjson" "${{ secrets.GHCR_PAT }}" "docker-registry" | |
manage_kube_secret "esapikeycred" "esApiKey" "${{ secrets.ES_APIKEY }}" | |
manage_kube_secret "esobserveapikeycred" "esObserveApiKey" "${{ secrets.OBSERVE_ES_APIKEY }}" | |
manage_kube_secret "apieswritetokencred" "apiEsWriteToken" "${{ secrets.API_ES_WRITE_TOKEN }}" | |
DEPLOYMENT_NAME="hono-api" | |
NAMESPACE="hono-api-prod" | |
# Check if the deployment already exists | |
if kubectl get deployment "$DEPLOYMENT_NAME" -n "$NAMESPACE" >/dev/null 2>&1; then | |
echo "Deployment $DEPLOYMENT_NAME already exists. Performing rolling restart..." | |
kubectl rollout restart deployment "$DEPLOYMENT_NAME" -n "$NAMESPACE" | |
else | |
echo "Deployment $DEPLOYMENT_NAME does not exist. Applying deployment..." | |
kubectl apply -k k8s-hono-api/hono-api-dev -n "$NAMESPACE" | |
fi | |
- name: Wait For Deployment To Start | |
run: sleep 10s | |
- name: Wait For Pods To Start | |
run: kubectl wait --for=condition=ready pod -l app=hono-api -n hono-api-prod --timeout=10m |