This commit is contained in:
hiondal 2025-03-03 21:47:54 +09:00
parent c45f7a107a
commit f57e460ba9

View File

@ -1,143 +1,272 @@
name: Backend CI/CD Pipeline name: Backend CI/CD Pipeline
# Temporarily disabled on:
# on: push:
# push: branches:
# branches: [ k8s ] - cicd
paths:
- '**/*.java'
- '**/*.gradle'
- 'deployment/**'
- '.github/workflows/**'
env: env:
JAVA_VERSION: '21' JAVA_VERSION: '21'
GRADLE_VERSION: '8.5' GRADLE_VERSION: '8.7'
jobs: jobs:
build: build:
name: Build Applications name: Build and Analyze Applications
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
- uses: actions/checkout@v4 - name: Checkout code
uses: actions/checkout@v4
with:
fetch-depth: 0 # SonarQube에서 더 나은 결과를 위해 전체 이력 가져오기
- name: Set up JDK - name: Set up JDK
uses: actions/setup-java@v4 uses: actions/setup-java@v3
with: with:
java-version: ${{ env.JAVA_VERSION }}
distribution: 'temurin' distribution: 'temurin'
java-version: ${{ env.JAVA_VERSION }}
cache: 'gradle'
- name: Setup Gradle - name: Grant execute permission for gradlew
uses: gradle/gradle-build-action@v2 run: chmod +x gradlew
- name: Cache SonarQube packages
uses: actions/cache@v3
with: with:
gradle-version: ${{ env.GRADLE_VERSION }} path: ~/.sonar/cache
key: ${{ runner.os }}-sonar
restore-keys: ${{ runner.os }}-sonar
- name: Build with Gradle - name: Build and analyze member service
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }}
run: | run: |
chmod +x gradlew ./gradlew :member:build :member:jacocoTestReport :member:sonar \
./gradlew clean :member:build :mysub-infra:build :recommend:build -Dsonar.projectKey=lifesub-member \
-Dsonar.projectName=lifesub-member \
-Dsonar.java.binaries=build/classes/java/main \
-Dsonar.coverage.jacoco.xmlReportPaths=build/reports/jacoco/test/jacocoTestReport.xml \
-Dsonar.exclusions=**/config/**,**/entity/**,**/dto/**,**/*Application.class,**/exception/**
- name: Upload Build Artifacts - name: Build and analyze mysub service
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }}
run: |
./gradlew :mysub-infra:build :mysub-infra:jacocoTestReport :mysub-infra:sonar \
-Dsonar.projectKey=lifesub-mysub \
-Dsonar.projectName=lifesub-mysub \
-Dsonar.java.binaries=build/classes/java/main \
-Dsonar.coverage.jacoco.xmlReportPaths=build/reports/jacoco/test/jacocoTestReport.xml \
-Dsonar.exclusions=**/config/**,**/entity/**,**/dto/**,**/*Application.class,**/exception/**
- name: Build and analyze recommend service
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }}
run: |
./gradlew :recommend:build :recommend:jacocoTestReport :recommend:sonar \
-Dsonar.projectKey=lifesub-recommend \
-Dsonar.projectName=lifesub-recommend \
-Dsonar.java.binaries=build/classes/java/main \
-Dsonar.coverage.jacoco.xmlReportPaths=build/reports/jacoco/test/jacocoTestReport.xml \
-Dsonar.exclusions=**/config/**,**/entity/**,**/dto/**,**/*Application.class,**/exception/**
- name: Check SonarQube Quality Gate
uses: sonarsource/sonarqube-quality-gate-action@master
timeout-minutes: 5
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }}
- name: Upload member artifact
uses: actions/upload-artifact@v4 uses: actions/upload-artifact@v4
with: with:
name: build-artifacts name: member-artifact
path: | path: member/build/libs/member.jar
member/build/libs/*.jar retention-days: 1
mysub-infra/build/libs/*.jar
recommend/build/libs/*.jar - name: Upload mysub artifact
uses: actions/upload-artifact@v4
with:
name: mysub-artifact
path: mysub-infra/build/libs/mysub.jar
retention-days: 1
- name: Upload recommend artifact
uses: actions/upload-artifact@v4
with:
name: recommend-artifact
path: recommend/build/libs/recommend.jar
retention-days: 1
release: release:
name: Build and Push Images name: Build and Push Docker Images
needs: build needs: build
runs-on: ubuntu-latest runs-on: ubuntu-latest
outputs: outputs:
image_tag: ${{ steps.set_tag.outputs.tag }} image_tag: ${{ steps.set_tag.outputs.image_tag }}
steps: steps:
- uses: actions/checkout@v4 - name: Checkout code
uses: actions/checkout@v4
- name: Download Build Artifacts - name: Download member artifact
uses: actions/download-artifact@v4 uses: actions/download-artifact@v4
with: with:
name: build-artifacts name: member-artifact
path: member/build/libs/
- name: Load Environment Variables - name: Download mysub artifact
run: source deployment/deploy_env_vars uses: actions/download-artifact@v4
with:
name: mysub-artifact
path: mysub-infra/build/libs/
- name: Generate Image Tag - name: Download recommend artifact
id: set_tag uses: actions/download-artifact@v4
run: | with:
tag=$(date +'%Y%m%d%H%M%S') name: recommend-artifact
echo "tag=${tag}" >> $GITHUB_OUTPUT path: recommend/build/libs/
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Login to Azure Container Registry - name: Login to Azure Container Registry
uses: azure/docker-login@v1 uses: docker/login-action@v3
with: with:
login-server: ${{ env.registry }} registry: ${{ secrets.REGISTRY_URL }}
username: ${{ secrets.ACR_USERNAME }} username: ${{ secrets.REGISTRY_USERNAME }}
password: ${{ secrets.ACR_PASSWORD }} password: ${{ secrets.REGISTRY_PASSWORD }}
- name: Build and Push Images - name: Load environment variables
id: env_vars
run: | run: |
for service in member mysub recommend; do cat deployment/deploy_env_vars >> $GITHUB_ENV
build_dir=$([[ "$service" == "mysub" ]] && echo "mysub-infra" || echo "$service")
jar_file=$([[ "$service" == "mysub" ]] && echo "mysub.jar" || echo "${service}.jar") - name: Set image tag
id: set_tag
docker build \ run: |
--build-arg BUILD_LIB_DIR="${build_dir}/build/libs" \ TIMESTAMP=$(date +'%Y%m%d%H%M%S')
--build-arg ARTIFACTORY_FILE="${jar_file}" \ echo "image_tag=${TIMESTAMP}" >> $GITHUB_OUTPUT
-f deployment/Dockerfile \
-t ${registry}/${image_org}/${service}:${{ steps.set_tag.outputs.tag }} . - name: Build and push member image
uses: docker/build-push-action@v5
docker push ${registry}/${image_org}/${service}:${{ steps.set_tag.outputs.tag }} with:
done context: .
file: deployment/Dockerfile
build-args: |
BUILD_LIB_DIR=member/build/libs
ARTIFACTORY_FILE=member.jar
push: true
tags: ${{ env.registry }}/${{ env.image_org }}/member:${{ steps.set_tag.outputs.image_tag }}
- name: Build and push mysub image
uses: docker/build-push-action@v5
with:
context: .
file: deployment/Dockerfile
build-args: |
BUILD_LIB_DIR=mysub-infra/build/libs
ARTIFACTORY_FILE=mysub.jar
push: true
tags: ${{ env.registry }}/${{ env.image_org }}/mysub:${{ steps.set_tag.outputs.image_tag }}
- name: Build and push recommend image
uses: docker/build-push-action@v5
with:
context: .
file: deployment/Dockerfile
build-args: |
BUILD_LIB_DIR=recommend/build/libs
ARTIFACTORY_FILE=recommend.jar
push: true
tags: ${{ env.registry }}/${{ env.image_org }}/recommend:${{ steps.set_tag.outputs.image_tag }}
deploy: deploy:
name: Deploy to AKS name: Deploy to Kubernetes
needs: release needs: release
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
- uses: actions/checkout@v4 - name: Checkout code
uses: actions/checkout@v4
- name: Load Environment Variables - name: Load environment variables
run: source deployment/deploy_env_vars run: |
cat deployment/deploy_env_vars >> $GITHUB_ENV
- name: Azure Login - name: Install envsubst
run: |
sudo apt-get update
sudo apt-get install -y gettext-base
- name: Set up Azure CLI
uses: azure/setup-azurecli@v3
- name: Login to Azure
uses: azure/login@v1 uses: azure/login@v1
with: with:
creds: ${{ secrets.AZURE_CREDENTIALS }} creds: ${{ secrets.AZURE_CREDENTIALS }}
- name: Set AKS Context - name: Set up kubectl
uses: azure/aks-set-context@v1 uses: azure/setup-kubectl@v3
with:
resource-group: ictcoe-edu
cluster-name: ${{ env.teamid }}-aks
- name: Create Namespace - name: Get AKS credentials
run: | run: |
kubectl create namespace ${teamid}-${root_project}-ns --dry-run=client -o yaml | kubectl apply -f - az aks get-credentials \
--resource-group ictcoe-edu \
--name ${{ env.teamid }}-aks \
--overwrite-existing
- name: Generate Manifest - name: Create namespace
run: | run: |
export namespace=${teamid}-${root_project}-ns kubectl create namespace ${{ env.namespace }} --dry-run=client -o yaml | kubectl apply -f -
export allowed_origins=${allowed_origins}
export jwt_secret_key=${jwt_secret_key} - name: Generate deployment manifest
export postgres_user=${postgres_user} run: |
export postgres_password=${postgres_password} export namespace=${{ env.namespace }}
export replicas=${replicas} export allowed_origins=${{ env.allowed_origins }}
export resources_requests_cpu=${resources_requests_cpu} export jwt_secret_key=${{ env.jwt_secret_key }}
export resources_requests_memory=${resources_requests_memory} export postgres_user=${{ env.postgres_user }}
export resources_limits_cpu=${resources_limits_cpu} export postgres_password=${{ env.postgres_password }}
export resources_limits_memory=${resources_limits_memory} export replicas=${{ env.replicas }}
export member_image_path=${registry}/${image_org}/member:${{ needs.release.outputs.image_tag }} export resources_requests_cpu=${{ env.resources_requests_cpu }}
export mysub_image_path=${registry}/${image_org}/mysub:${{ needs.release.outputs.image_tag }} export resources_requests_memory=${{ env.resources_requests_memory }}
export recommend_image_path=${registry}/${image_org}/recommend:${{ needs.release.outputs.image_tag }} export resources_limits_cpu=${{ env.resources_limits_cpu }}
export resources_limits_memory=${{ env.resources_limits_memory }}
# Set image paths with the tag from the release job
export member_image_path=${{ env.registry }}/${{ env.image_org }}/member:${{ needs.release.outputs.image_tag }}
export mysub_image_path=${{ env.registry }}/${{ env.image_org }}/mysub:${{ needs.release.outputs.image_tag }}
export recommend_image_path=${{ env.registry }}/${{ env.image_org }}/recommend:${{ needs.release.outputs.image_tag }}
# Generate manifest
envsubst < deployment/deploy.yaml.template > deployment/deploy.yaml envsubst < deployment/deploy.yaml.template > deployment/deploy.yaml
# Debug: Output the generated manifest
cat deployment/deploy.yaml cat deployment/deploy.yaml
- name: Deploy to AKS - name: Apply deployment manifest
run: | run: |
kubectl apply -f deployment/deploy.yaml kubectl apply -f deployment/deploy.yaml
echo "Waiting for deployments to be ready..." - name: Wait for deployments
kubectl -n ${namespace} wait --for=condition=available deployment/member --timeout=300s run: |
kubectl -n ${namespace} wait --for=condition=available deployment/mysub --timeout=300s kubectl -n ${{ env.namespace }} wait --for=condition=available deployment/member --timeout=300s
kubectl -n ${namespace} wait --for=condition=available deployment/recommend --timeout=300s kubectl -n ${{ env.namespace }} wait --for=condition=available deployment/mysub --timeout=300s
kubectl -n ${{ env.namespace }} wait --for=condition=available deployment/recommend --timeout=300s
- name: Get service information
run: |
kubectl get ingress -n ${{ env.namespace }}
echo "Backend services deployed successfully"