name: Deploy Backend and Backoffice Dev on: workflow_dispatch: push: branches: [dev] env: REGISTRY: pipe.gohorsejobs.com IMAGE_NAMESPACE: bohessefm NAMESPACE: gohorsejobsdev jobs: build-and-push: runs-on: [self-hosted, linux-amd64] steps: - name: Checkout code uses: actions/checkout@v4 - name: Docker Login run: | echo "${{ secrets.FORGEJO_TOKEN }}" | docker login ${{ env.REGISTRY }} \ -u ${{ env.IMAGE_NAMESPACE }} --password-stdin - name: Build & Push Backend run: | docker build -t ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:${{ github.sha }} \ -t ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:latest ./backend docker push ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:${{ github.sha }} docker push ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:latest - name: Build & Push Backoffice run: | docker build -t ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/backoffice:${{ github.sha }} \ -t ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/backoffice:latest ./backoffice docker push ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/backoffice:${{ github.sha }} docker push ${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/backoffice:latest deploy: needs: build-and-push runs-on: [self-hosted, linux-amd64] steps: - name: Checkout code uses: actions/checkout@v4 - name: Install kubectl run: | apk add --no-cache curl curl -LO "https://dl.k8s.io/release/$(curl -L -s https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl" chmod +x kubectl mv kubectl /usr/local/bin/ - name: Configure Kubeconfig run: | mkdir -p ~/.kube echo "${{ secrets.KUBECONFIG }}" > ~/.kube/config chmod 600 ~/.kube/config - name: Sync Secrets and Vars run: | # 1. Garante que o namespace existe kubectl create namespace ${{ env.NAMESPACE }} --dry-run=client -o yaml | kubectl apply -f - # 2. Sincroniza Registry Secret limpando metadados que causam erro de Conflict kubectl get secret forgejo-registry-secret --namespace=forgejo -o yaml | \ grep -vE "resourceVersion|uid|creationTimestamp|namespace" | \ kubectl apply --namespace=${{ env.NAMESPACE }} -f - # 3. Prepara a chave RSA RSA_CONTENT="${{ secrets.RSA_PRIVATE_KEY_BASE64 || vars.RSA_PRIVATE_KEY_BASE64 }}" if [ -n "$RSA_CONTENT" ]; then echo "$RSA_CONTENT" > /tmp/rsa_raw.txt if base64 -d /tmp/rsa_raw.txt > /tmp/rsa_key.pem 2>/dev/null; then echo "RSA Key decoded successfully." else cp /tmp/rsa_raw.txt /tmp/rsa_key.pem fi fi # 4. Cria ou atualiza a backend-secrets (sem deletar antes para evitar downtime) kubectl create secret generic backend-secrets -n ${{ env.NAMESPACE }} \ --from-literal=MTU="${{ vars.MTU }}" \ --from-literal=DATABASE_URL="${{ vars.DATABASE_URL }}" \ --from-literal=AMQP_URL="${{ vars.AMQP_URL }}" \ --from-literal=JWT_SECRET="${{ vars.JWT_SECRET }}" \ --from-literal=JWT_EXPIRATION="${{ vars.JWT_EXPIRATION }}" \ --from-literal=PASSWORD_PEPPER="${{ vars.PASSWORD_PEPPER }}" \ --from-literal=COOKIE_SECRET="${{ vars.COOKIE_SECRET }}" \ --from-literal=COOKIE_DOMAIN="${{ vars.COOKIE_DOMAIN }}" \ --from-literal=BACKEND_PORT="${{ vars.BACKEND_PORT }}" \ --from-literal=BACKEND_HOST="${{ vars.BACKEND_HOST }}" \ --from-literal=ENV="${{ vars.ENV }}" \ --from-literal=CORS_ORIGINS="${{ vars.CORS_ORIGINS }}" \ --from-literal=S3_BUCKET="${{ vars.S3_BUCKET }}" \ --from-literal=AWS_REGION="${{ vars.AWS_REGION }}" \ --from-literal=AWS_ENDPOINT="${{ vars.AWS_ENDPOINT }}" \ --from-literal=AWS_ACCESS_KEY_ID="${{ vars.AWS_ACCESS_KEY_ID }}" \ --from-literal=AWS_SECRET_ACCESS_KEY="${{ vars.AWS_SECRET_ACCESS_KEY }}" \ $( [ -f /tmp/rsa_key.pem ] && echo "--from-file=private_key.pem=/tmp/rsa_key.pem" ) \ --dry-run=client -o yaml | kubectl apply -f - - name: Deploy to K3s run: | kubectl apply -f k8s/dev/ -n ${{ env.NAMESPACE }} # Atualiza as imagens nos deployments kubectl -n ${{ env.NAMESPACE }} set image deployment/gohorse-backend-dev backend=${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/gohorsejobs:${{ github.sha }} kubectl -n ${{ env.NAMESPACE }} set image deployment/gohorse-backoffice-dev backoffice=${{ env.REGISTRY }}/${{ env.IMAGE_NAMESPACE }}/backoffice:${{ github.sha }} # Restart para garantir que novos pods peguem a Secret atualizada kubectl -n ${{ env.NAMESPACE }} rollout restart deployment/gohorse-backend-dev kubectl -n ${{ env.NAMESPACE }} rollout restart deployment/gohorse-backoffice-dev # Aguarda o backend ficar pronto kubectl -n ${{ env.NAMESPACE }} rollout status deployment/gohorse-backend-dev --timeout=120s