Update .forgejo/workflows/deploy.yaml
This commit is contained in:
parent
8b231b944f
commit
37749b0f14
1 changed files with 37 additions and 64 deletions
|
|
@ -23,7 +23,6 @@ jobs:
|
||||||
|
|
||||||
- name: Build & Push Backend
|
- name: Build & Push Backend
|
||||||
run: |
|
run: |
|
||||||
# Build usando SHA para imutabilidade e latest para conveniência
|
|
||||||
docker build -t ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:${{ github.sha }} \
|
docker build -t ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:${{ github.sha }} \
|
||||||
-t ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:latest ./backend
|
-t ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:latest ./backend
|
||||||
docker push ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:${{ github.sha }}
|
docker push ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:${{ github.sha }}
|
||||||
|
|
@ -60,86 +59,60 @@ jobs:
|
||||||
run: |
|
run: |
|
||||||
kubectl create namespace gohorsejobsdev --dry-run=client -o yaml | kubectl apply -f -
|
kubectl create namespace gohorsejobsdev --dry-run=client -o yaml | kubectl apply -f -
|
||||||
|
|
||||||
# Sincroniza Registry Secret
|
|
||||||
kubectl get secret forgejo-registry-secret --namespace=forgejo -o yaml | \
|
kubectl get secret forgejo-registry-secret --namespace=forgejo -o yaml | \
|
||||||
sed 's/namespace: forgejo/namespace: gohorsejobsdev/' | \
|
sed 's/namespace: forgejo/namespace: gohorsejobsdev/' | \
|
||||||
kubectl apply -f - --force
|
kubectl apply -f - --force
|
||||||
|
|
||||||
# Injeta variáveis (Lembre-se de mudar DATABASE_URL para sslmode=disable no Forgejo!)
|
|
||||||
kubectl delete secret backend-secrets -n gohorsejobsdev --ignore-not-found
|
kubectl delete secret backend-secrets -n gohorsejobsdev --ignore-not-found
|
||||||
|
|
||||||
# Prepare RSA key file if available (prefer secrets over vars)
|
# Limpeza da chave para evitar caracteres UTF-8 invalidos
|
||||||
if [ -n "${{ secrets.RSA_PRIVATE_KEY_BASE64 }}" ]; then
|
RAW_KEY="${{ secrets.RSA_PRIVATE_KEY_BASE64 || vars.RSA_PRIVATE_KEY_BASE64 }}"
|
||||||
echo "Decoding RSA_PRIVATE_KEY_BASE64 from secrets"
|
CLEAN_KEY=$(echo "$RAW_KEY" | tr -d '[:space:]')
|
||||||
printf '%b' "${{ secrets.RSA_PRIVATE_KEY_BASE64 }}" > /tmp/rsa_key.pem || true
|
|
||||||
# if it's base64-encoded PEM, decode it
|
# Decodifica se necessario para o arquivo
|
||||||
if base64 -d /tmp/rsa_key.pem >/dev/null 2>&1; then
|
if [ -n "$CLEAN_KEY" ]; then
|
||||||
base64 -d /tmp/rsa_key.pem > /tmp/rsa_key_decoded.pem && mv /tmp/rsa_key_decoded.pem /tmp/rsa_key.pem || true
|
echo "$CLEAN_KEY" > /tmp/rsa_key.base64
|
||||||
fi
|
base64 -d /tmp/rsa_key.base64 > /tmp/rsa_key.pem 2>/dev/null || cp /tmp/rsa_key.base64 /tmp/rsa_key.pem
|
||||||
elif [ -n "${{ vars.RSA_PRIVATE_KEY_BASE64 }}" ]; then
|
|
||||||
echo "Decoding RSA_PRIVATE_KEY_BASE64 from vars"
|
|
||||||
printf '%b' "${{ vars.RSA_PRIVATE_KEY_BASE64 }}" > /tmp/rsa_key.pem || true
|
|
||||||
if base64 -d /tmp/rsa_key.pem >/dev/null 2>&1; then
|
|
||||||
base64 -d /tmp/rsa_key.pem > /tmp/rsa_key_decoded.pem && mv /tmp/rsa_key_decoded.pem /tmp/rsa_key.pem || true
|
|
||||||
fi
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Create secret: if rsa file exists, create secret from file (robust); otherwise fallback to from-literal
|
# Criação via Heredoc para evitar erros de marshaling gRPC (UTF-8)
|
||||||
if [ -f /tmp/rsa_key.pem ]; then
|
cat <<EOF | kubectl apply -f -
|
||||||
kubectl create secret generic backend-secrets -n gohorsejobsdev \
|
apiVersion: v1
|
||||||
--from-literal=MTU="${{ vars.MTU }}" \
|
kind: Secret
|
||||||
--from-literal=DATABASE_URL="${{ vars.DATABASE_URL }}" \
|
metadata:
|
||||||
--from-literal=AMQP_URL="${{ vars.AMQP_URL }}" \
|
name: backend-secrets
|
||||||
--from-literal=JWT_SECRET="${{ vars.JWT_SECRET }}" \
|
namespace: gohorsejobsdev
|
||||||
--from-literal=JWT_EXPIRATION="${{ vars.JWT_EXPIRATION }}" \
|
type: Opaque
|
||||||
--from-literal=PASSWORD_PEPPER="${{ vars.PASSWORD_PEPPER }}" \
|
stringData:
|
||||||
--from-literal=COOKIE_SECRET="${{ vars.COOKIE_SECRET }}" \
|
MTU: "${{ vars.MTU }}"
|
||||||
--from-literal=COOKIE_DOMAIN="${{ vars.COOKIE_DOMAIN }}" \
|
DATABASE_URL: "${{ vars.DATABASE_URL }}"
|
||||||
--from-literal=BACKEND_PORT="${{ vars.BACKEND_PORT }}" \
|
AMQP_URL: "${{ vars.AMQP_URL }}"
|
||||||
--from-literal=BACKEND_HOST="${{ vars.BACKEND_HOST }}" \
|
JWT_SECRET: "${{ vars.JWT_SECRET }}"
|
||||||
--from-literal=ENV="${{ vars.ENV }}" \
|
JWT_EXPIRATION: "${{ vars.JWT_EXPIRATION }}"
|
||||||
--from-literal=CORS_ORIGINS="${{ vars.CORS_ORIGINS }}" \
|
PASSWORD_PEPPER: "${{ vars.PASSWORD_PEPPER }}"
|
||||||
--from-literal=S3_BUCKET="${{ vars.S3_BUCKET }}" \
|
COOKIE_SECRET: "${{ vars.COOKIE_SECRET }}"
|
||||||
--from-literal=AWS_REGION="${{ vars.AWS_REGION }}" \
|
COOKIE_DOMAIN: "${{ vars.COOKIE_DOMAIN }}"
|
||||||
--from-literal=AWS_ENDPOINT="${{ vars.AWS_ENDPOINT }}" \
|
BACKEND_PORT: "${{ vars.BACKEND_PORT }}"
|
||||||
--from-literal=AWS_ACCESS_KEY_ID="${{ vars.AWS_ACCESS_KEY_ID }}" \
|
BACKEND_HOST: "${{ vars.BACKEND_HOST }}"
|
||||||
--from-literal=AWS_SECRET_ACCESS_KEY="${{ vars.AWS_SECRET_ACCESS_KEY }}" \
|
ENV: "${{ vars.ENV }}"
|
||||||
--from-file=private_key.pem=/tmp/rsa_key.pem \
|
CORS_ORIGINS: "${{ vars.CORS_ORIGINS }}"
|
||||||
--dry-run=client -o yaml | kubectl apply -f -
|
S3_BUCKET: "${{ vars.S3_BUCKET }}"
|
||||||
else
|
AWS_REGION: "${{ vars.AWS_REGION }}"
|
||||||
kubectl create secret generic backend-secrets -n gohorsejobsdev \
|
AWS_ENDPOINT: "${{ vars.AWS_ENDPOINT }}"
|
||||||
--from-literal=MTU="${{ vars.MTU }}" \
|
AWS_ACCESS_KEY_ID: "${{ vars.AWS_ACCESS_KEY_ID }}"
|
||||||
--from-literal=DATABASE_URL="${{ vars.DATABASE_URL }}" \
|
AWS_SECRET_ACCESS_KEY: "${{ vars.AWS_SECRET_ACCESS_KEY }}"
|
||||||
--from-literal=AMQP_URL="${{ vars.AMQP_URL }}" \
|
private_key.pem: |
|
||||||
--from-literal=JWT_SECRET="${{ vars.JWT_SECRET }}" \
|
$(cat /tmp/rsa_key.pem 2>/dev/null || echo "$CLEAN_KEY")
|
||||||
--from-literal=JWT_EXPIRATION="${{ vars.JWT_EXPIRATION }}" \
|
EOF
|
||||||
--from-literal=PASSWORD_PEPPER="${{ vars.PASSWORD_PEPPER }}" \
|
|
||||||
--from-literal=COOKIE_SECRET="${{ vars.COOKIE_SECRET }}" \
|
|
||||||
--from-literal=COOKIE_DOMAIN="${{ vars.COOKIE_DOMAIN }}" \
|
|
||||||
--from-literal=BACKEND_PORT="${{ vars.BACKEND_PORT }}" \
|
|
||||||
--from-literal=BACKEND_HOST="${{ vars.BACKEND_HOST }}" \
|
|
||||||
--from-literal=ENV="${{ vars.ENV }}" \
|
|
||||||
--from-literal=CORS_ORIGINS="${{ vars.CORS_ORIGINS }}" \
|
|
||||||
--from-literal=S3_BUCKET="${{ vars.S3_BUCKET }}" \
|
|
||||||
--from-literal=AWS_REGION="${{ vars.AWS_REGION }}" \
|
|
||||||
--from-literal=AWS_ENDPOINT="${{ vars.AWS_ENDPOINT }}" \
|
|
||||||
--from-literal=AWS_ACCESS_KEY_ID="${{ vars.AWS_ACCESS_KEY_ID }}" \
|
|
||||||
--from-literal=AWS_SECRET_ACCESS_KEY="${{ vars.AWS_SECRET_ACCESS_KEY }}" \
|
|
||||||
--from-literal=RSA_PRIVATE_KEY_BASE64="${{ vars.RSA_PRIVATE_KEY_BASE64 }}" \
|
|
||||||
--dry-run=client -o yaml | kubectl apply -f -
|
|
||||||
fi
|
|
||||||
|
|
||||||
- name: Deploy to K3s
|
- name: Deploy to K3s
|
||||||
run: |
|
run: |
|
||||||
kubectl apply -f k8s/dev/ -n gohorsejobsdev
|
kubectl apply -f k8s/dev/ -n gohorsejobsdev
|
||||||
|
|
||||||
# Vincula o deployment ao SHA específico para garantir que o Pull ocorra corretamente
|
|
||||||
kubectl -n gohorsejobsdev set image deployment/gohorse-backend-dev backend=${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:${{ github.sha }}
|
kubectl -n gohorsejobsdev set image deployment/gohorse-backend-dev backend=${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:${{ github.sha }}
|
||||||
kubectl -n gohorsejobsdev set image deployment/gohorse-backoffice-dev backoffice=${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/backoffice:${{ github.sha }}
|
kubectl -n gohorsejobsdev set image deployment/gohorse-backoffice-dev backoffice=${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/backoffice:${{ github.sha }}
|
||||||
|
|
||||||
# Força o restart para carregar os novos valores do secret backend-secrets
|
|
||||||
kubectl -n gohorsejobsdev rollout restart deployment/gohorse-backend-dev
|
kubectl -n gohorsejobsdev rollout restart deployment/gohorse-backend-dev
|
||||||
kubectl -n gohorsejobsdev rollout restart deployment/gohorse-backoffice-dev
|
kubectl -n gohorsejobsdev rollout restart deployment/gohorse-backoffice-dev
|
||||||
|
|
||||||
# Aguarda estabilização
|
|
||||||
kubectl -n gohorsejobsdev rollout status deployment/gohorse-backend-dev --timeout=120s
|
kubectl -n gohorsejobsdev rollout status deployment/gohorse-backend-dev --timeout=120s
|
||||||
Loading…
Reference in a new issue