132 lines
5.4 KiB
YAML
132 lines
5.4 KiB
YAML
# Template docker-push
|
|
|
|
# This template allows you to build and push your docker image to a Docker Hub account.
|
|
# The workflow allows running tests, code linting and security scans on feature branches (as well as master).
|
|
# The docker image will be validated and pushed to the docker registry after the code is merged to master.
|
|
|
|
# Prerequisites: $DOCKERHUB_USERNAME, $DOCKERHUB_PASSWORD setup as deployment variables
|
|
|
|
image: atlassian/default-image:2
|
|
|
|
|
|
definitions:
|
|
services:
|
|
docker:
|
|
memory: 3072
|
|
pipelines:
|
|
default:
|
|
- parallel:
|
|
- step:
|
|
name: Build and Test
|
|
script:
|
|
- docker build . --file k8s/Dockerfile-autoscaler --tag autoscaler-${BITBUCKET_REPO_SLUG}
|
|
- docker build . --file k8s/Dockerfile-coturn-dns --tag coturn-dns-${BITBUCKET_REPO_SLUG}
|
|
services:
|
|
- docker
|
|
caches:
|
|
- docker
|
|
- step:
|
|
name: Lint the Dockerfile
|
|
image: hadolint/hadolint:latest-debian
|
|
script:
|
|
- hadolint Dockerfile-autoscaler
|
|
- hadolint Docuerfile-coturn-dns
|
|
branches:
|
|
main:
|
|
- step:
|
|
name: Build and Test
|
|
script:
|
|
- docker build . --file k8s/Dockerfile-autoscaler --tag autoscaler-${BITBUCKET_REPO_SLUG}
|
|
- docker build . --file k8s/Dockerfile-coturn-dns --tag coturn-dns-${BITBUCKET_REPO_SLUG}
|
|
- docker save autoscaler-${BITBUCKET_REPO_SLUG} --output "autoscaler-${BITBUCKET_REPO_SLUG}.tar"
|
|
- docker save coturn-dns-${BITBUCKET_REPO_SLUG} --output "coturn-dns-${BITBUCKET_REPO_SLUG}.tar"
|
|
services:
|
|
- docker
|
|
caches:
|
|
- docker
|
|
artifacts:
|
|
- "*.tar"
|
|
- step:
|
|
name: Push docker images to GCR
|
|
image: google/cloud-sdk:alpine
|
|
script:
|
|
# Authenticating with the service account key file
|
|
- echo $GCLOUD_API_KEYFILE | base64 -d > ./gcloud-api-key.json
|
|
- gcloud auth activate-service-account --key-file gcloud-api-key.json
|
|
- gcloud config set project $GCLOUD_PROJECT
|
|
- docker load --input "autoscaler-${BITBUCKET_REPO_SLUG}.tar"
|
|
- docker load --input "coturn-dns-${BITBUCKET_REPO_SLUG}.tar"
|
|
- VERSION="prod-0.1.${BITBUCKET_BUILD_NUMBER}"
|
|
- docker tag "autoscaler-${BITBUCKET_REPO_SLUG}" "gcr.io/${GCLOUD_PROJECT}/autoscaler:${VERSION}"
|
|
- docker tag "coturn-dns-${BITBUCKET_REPO_SLUG}" "gcr.io/${GCLOUD_PROJECT}/coturn-dns:${VERSION}"
|
|
# Login to google docker hub
|
|
- cat ./gcloud-api-key.json | docker login -u _json_key --password-stdin https://gcr.io
|
|
- docker push "gcr.io/${GCLOUD_PROJECT}/autoscaler:${VERSION}"
|
|
- docker push "gcr.io/${GCLOUD_PROJECT}/coturn-dns:${VERSION}"
|
|
services:
|
|
- docker
|
|
|
|
|
|
# - step: Deploy haproxy ingress controller
|
|
# % helm install haproxy-ingress haproxy-ingress/haproxy-ingress\
|
|
# --create-namespace --namespace ingress-controller\
|
|
# --version 0.13.1\
|
|
# -f k8s/haproxy/haproxy-ingress-values.yaml
|
|
|
|
|
|
# - step: Deploy cert-manager
|
|
# helm install \
|
|
# cert-manager jetstack/cert-manager \
|
|
# --namespace cert-manager \
|
|
# --create-namespace \
|
|
# --version v1.5.0 \
|
|
# --set installCRDs=true
|
|
# $ kubectl apply -f k8s/cert-manager/cluster-issuer-production.yaml
|
|
|
|
|
|
|
|
# - step: Deploy GCR credentials
|
|
# kubectl create secret docker-registry gcr-json-key \
|
|
# --docker-server=gcr.io \
|
|
# --docker-username=_json_key \
|
|
# --docker-password="$(cat k8s/gcp.json)" \
|
|
# --docker-email=any@valid.email
|
|
# kubectl patch serviceaccount default \
|
|
# -p '{"imagePullSecrets": [{"name": "gcr-json-key"}]}'
|
|
|
|
# Deploy nginx ingress controller
|
|
# helm install nginx-ingress stable/nginx-ingress
|
|
|
|
# Deploy monitoring clusterissuer
|
|
# kubectl apply -f k8s/monitoring/clusterissuer.yaml
|
|
|
|
# Deploy monitoring certificate
|
|
# kubectl apply -f k8s/monitoring/certificate.yaml
|
|
|
|
# Deploy monitoring helm
|
|
# helm install \
|
|
# monitoring stable/prometheus-operator \
|
|
# -f k8s/monitoring/helm-values.yaml \
|
|
# --namespace monitoring \
|
|
# --set grafana.adminPassword=jamkazamMonitoring
|
|
|
|
|
|
- step:
|
|
name: Deploy to K8s
|
|
deployment: production
|
|
script:
|
|
- AUTOSCALER_IMAGE="gcr.io/$GCLOUD_PROJECT/autoscaler:prod-0.1.$BITBUCKET_BUILD_NUMBER"
|
|
- COTURN_DNS_IMAGE="gcr.io/$GCLOUD_PROJECT/coturn-dns:prod-0.1.$BITBUCKET_BUILD_NUMBER"
|
|
- sed -i "s|{{linode_autoscaler_image}}|$AUTOSCALER_IMAGE|g" k8s/linode-autoscaler/production-webrtc-be-autoscaler.yaml
|
|
- sed -i "s|{{linode_autoscaler_image}}|$AUTOSCALER_IMAGE|g" k8s/linode-autoscaler/production-coturn-autoscaler.yaml
|
|
- sed -i "s|{{coturn_dns_image}}|$COTURN_DNS_IMAGE|g" k8s/coturn-dns/production-coturn-dns.yaml
|
|
- pipe: atlassian/kubectl-run:1.1.2
|
|
variables:
|
|
KUBE_CONFIG: $KUBE_CONFIG
|
|
KUBECTL_COMMAND: 'apply'
|
|
RESOURCE_PATH: 'k8s/linode-autoscaler/production-coturn-autoscaler.yaml'
|
|
- pipe: atlassian/kubectl-run:1.1.2
|
|
variables:
|
|
KUBE_CONFIG: $KUBE_CONFIG_PRD
|
|
KUBECTL_COMMAND: 'apply'
|
|
RESOURCE_PATH: 'k8s/coturn-dns/production-coturn-dns.yaml' |