mirror of https://github.com/fluxcd/flux2.git
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
217 lines
5.6 KiB
Markdown
217 lines
5.6 KiB
Markdown
# Flux GitHub Action
|
|
|
|
Usage:
|
|
|
|
```yaml
|
|
steps:
|
|
- name: Setup Flux CLI
|
|
uses: fluxcd/flux2/action@main
|
|
- name: Run Flux commands
|
|
run: flux -v
|
|
```
|
|
|
|
The latest stable version of the `flux` binary is downloaded from
|
|
GitHub [releases](https://github.com/fluxcd/flux2/releases)
|
|
and placed at `/usr/local/bin/flux`.
|
|
|
|
Note that this action can only be used on GitHub **Linux** runners.
|
|
You can change the arch (defaults to `amd64`) with:
|
|
|
|
```yaml
|
|
steps:
|
|
- name: Setup Flux CLI
|
|
uses: fluxcd/flux2/action@main
|
|
with:
|
|
arch: arm64 # can be amd64, arm64 or arm
|
|
```
|
|
|
|
You can download a specific version with:
|
|
|
|
```yaml
|
|
steps:
|
|
- name: Setup Flux CLI
|
|
uses: fluxcd/flux2/action@main
|
|
with:
|
|
version: 0.32.0
|
|
```
|
|
|
|
You can also authenticate against the GitHub API using GitHub Actions' `GITHUB_TOKEN` secret.
|
|
|
|
For more information, please [read about the GitHub token secret](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#about-the-github_token-secret).
|
|
|
|
```yaml
|
|
steps:
|
|
- name: Setup Flux CLI
|
|
uses: fluxcd/flux2/action@main
|
|
with:
|
|
token: ${{ secrets.GITHUB_TOKEN }}
|
|
```
|
|
|
|
This is useful if you are seeing failures on shared runners, those failures are usually API limits being hit.
|
|
|
|
### Automate Flux updates
|
|
|
|
Example workflow for updating Flux's components generated with `flux bootstrap --path=clusters/production`:
|
|
|
|
```yaml
|
|
name: update-flux
|
|
|
|
on:
|
|
workflow_dispatch:
|
|
schedule:
|
|
- cron: "0 * * * *"
|
|
|
|
permissions:
|
|
contents: write
|
|
pull-requests: write
|
|
|
|
jobs:
|
|
components:
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- name: Check out code
|
|
uses: actions/checkout@v3
|
|
- name: Setup Flux CLI
|
|
uses: fluxcd/flux2/action@main
|
|
- name: Check for updates
|
|
id: update
|
|
run: |
|
|
flux install \
|
|
--export > ./clusters/production/flux-system/gotk-components.yaml
|
|
|
|
VERSION="$(flux -v)"
|
|
echo "flux_version=$VERSION" >> $GITHUB_OUTPUT
|
|
- name: Create Pull Request
|
|
uses: peter-evans/create-pull-request@v4
|
|
with:
|
|
token: ${{ secrets.GITHUB_TOKEN }}
|
|
branch: update-flux
|
|
commit-message: Update to ${{ steps.update.outputs.flux_version }}
|
|
title: Update to ${{ steps.update.outputs.flux_version }}
|
|
body: |
|
|
${{ steps.update.outputs.flux_version }}
|
|
```
|
|
|
|
### Push Kubernetes manifests to container registries
|
|
|
|
Example workflow for publishing Kubernetes manifests bundled as OCI artifacts to GitHub Container Registry:
|
|
|
|
```yaml
|
|
name: push-artifact-staging
|
|
|
|
on:
|
|
push:
|
|
branches:
|
|
- 'main'
|
|
|
|
permissions:
|
|
packages: write # needed for ghcr.io access
|
|
|
|
env:
|
|
OCI_REPO: "oci://ghcr.io/my-org/manifests/${{ github.event.repository.name }}"
|
|
|
|
jobs:
|
|
kubernetes:
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- name: Checkout
|
|
uses: actions/checkout@v3
|
|
- name: Setup Flux CLI
|
|
uses: fluxcd/flux2/action@main
|
|
- name: Login to GHCR
|
|
uses: docker/login-action@v2
|
|
with:
|
|
registry: ghcr.io
|
|
username: ${{ github.actor }}
|
|
password: ${{ secrets.GITHUB_TOKEN }}
|
|
- name: Generate manifests
|
|
run: |
|
|
kustomize build ./manifests/staging > ./deploy/app.yaml
|
|
- name: Push manifests
|
|
run: |
|
|
flux push artifact $OCI_REPO:$(git rev-parse --short HEAD) \
|
|
--path="./deploy" \
|
|
--source="$(git config --get remote.origin.url)" \
|
|
--revision="$(git branch --show-current)/$(git rev-parse HEAD)"
|
|
- name: Deploy manifests to staging
|
|
run: |
|
|
flux tag artifact $OCI_REPO:$(git rev-parse --short HEAD) --tag staging
|
|
```
|
|
|
|
### Push and sign Kubernetes manifests to container registries
|
|
|
|
Example workflow for publishing Kubernetes manifests bundled as OCI artifacts
|
|
which are signed with Cosign and GitHub OIDC:
|
|
|
|
```yaml
|
|
name: push-sign-artifact
|
|
|
|
on:
|
|
push:
|
|
branches:
|
|
- 'main'
|
|
|
|
permissions:
|
|
packages: write # needed for ghcr.io access
|
|
id-token: write # needed for keyless signing
|
|
|
|
env:
|
|
OCI_REPO: "oci://ghcr.io/my-org/manifests/${{ github.event.repository.name }}"
|
|
|
|
jobs:
|
|
kubernetes:
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- name: Checkout
|
|
uses: actions/checkout@v3
|
|
- name: Setup Flux CLI
|
|
uses: fluxcd/flux2/action@main
|
|
- name: Setup Cosign
|
|
uses: sigstore/cosign-installer@main
|
|
- name: Login to GHCR
|
|
uses: docker/login-action@v2
|
|
with:
|
|
registry: ghcr.io
|
|
username: ${{ github.actor }}
|
|
password: ${{ secrets.GITHUB_TOKEN }}
|
|
- name: Push and sign manifests
|
|
run: |
|
|
digest_url=$(flux push artifact \
|
|
$OCI_REPO:$(git rev-parse --short HEAD) \
|
|
--path="./manifests" \
|
|
--source="$(git config --get remote.origin.url)" \
|
|
--revision="$(git branch --show-current)/$(git rev-parse HEAD)" |\
|
|
jq -r '. | .repository + "@" + .digest')
|
|
|
|
cosign sign $digest_url
|
|
```
|
|
|
|
### End-to-end testing
|
|
|
|
Example workflow for running Flux in Kubernetes Kind:
|
|
|
|
```yaml
|
|
name: e2e
|
|
|
|
on:
|
|
push:
|
|
branches:
|
|
- '*'
|
|
|
|
jobs:
|
|
kubernetes:
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- name: Checkout
|
|
uses: actions/checkout@v3
|
|
- name: Setup Flux CLI
|
|
uses: fluxcd/flux2/action@main
|
|
- name: Setup Kubernetes Kind
|
|
uses: engineerd/setup-kind@v0.5.0
|
|
- name: Install Flux in Kubernetes Kind
|
|
run: flux install
|
|
```
|
|
|
|
A complete e2e testing workflow is available here
|
|
[flux2-kustomize-helm-example](https://github.com/fluxcd/flux2-kustomize-helm-example/blob/main/.github/workflows/e2e.yaml)
|