From 0e587c360652860129f1aaf978fea26ec271ecf9 Mon Sep 17 00:00:00 2001 From: JaehongDev Date: Mon, 1 Jul 2024 18:53:33 +0900 Subject: [PATCH] =?UTF-8?q?chore:=20github=20workflow=20=EC=88=98=EC=A0=95?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .github/workflows/backend-ci-test.yml | 75 ++++++++++++++++++++++----- 1 file changed, 63 insertions(+), 12 deletions(-) diff --git a/.github/workflows/backend-ci-test.yml b/.github/workflows/backend-ci-test.yml index 28d3905..6968c5f 100644 --- a/.github/workflows/backend-ci-test.yml +++ b/.github/workflows/backend-ci-test.yml @@ -1,18 +1,62 @@ -name: Build and Deploy to Cloud Run +# This workflow build and push a Docker container to Google Artifact Registry and deploy it on Cloud Run when a commit is pushed to the "master" branch +# +# Overview: +# +# 1. Authenticate to Google Cloud +# 2. Authenticate Docker to Artifact Registry +# 3. Build a docker container +# 4. Publish it to Google Artifact Registry +# 5. Deploy it to Cloud Run +# +# To configure this workflow: +# +# 1. Ensure the required Google Cloud APIs are enabled: +# +# Cloud Run run.googleapis.com +# Artifact Registry artifactregistry.googleapis.com +# +# 2. Create and configure Workload Identity Federation for GitHub (https://github.com/google-github-actions/auth#setting-up-workload-identity-federation) +# +# 3. Ensure the required IAM permissions are granted +# +# Cloud Run +# roles/run.admin +# roles/iam.serviceAccountUser (to act as the Cloud Run runtime service account) +# +# Artifact Registry +# roles/artifactregistry.admin (project or repository level) +# +# NOTE: You should always follow the principle of least privilege when assigning IAM roles +# +# 4. Create GitHub secrets for WIF_PROVIDER and WIF_SERVICE_ACCOUNT +# +# 5. Change the values for the GAR_LOCATION, SERVICE and REGION environment variables (below). +# +# NOTE: To use Google Container Registry instead, replace ${{ env.GAR_LOCATION }}-docker.pkg.dev with gcr.io +# +# For more support on how to run this workflow, please visit https://github.com/marketplace/actions/deploy-to-cloud-run +# +# Further reading: +# Cloud Run IAM permissions - https://cloud.google.com/run/docs/deploying +# Artifact Registry IAM permissions - https://cloud.google.com/artifact-registry/docs/access-control#roles +# Container Registry vs Artifact Registry - https://cloud.google.com/blog/products/application-development/understanding-artifact-registry-vs-container-registry +# Principle of least privilege - https://cloud.google.com/blog/products/identity-security/dont-get-pwned-practicing-the-principle-of-least-privilege + +name: Deploy GCP Cloud Run to Dev Server on: pull_request: branches: [ main ] -defaults: - run: - working-directory: backend - -permissions: - contents: read +env: + PROJECT_ID: ${{secrets.PROJECT_ID}} + SERVICE: ${{secrets.SERVICE}} + REGION: ${{secrets.REGION}} + ARTIFACT_REGISTRY: ${{secrets.ARTIFACT_REGISTRY}} jobs: deploy: + # Add 'id-token' with the intended permissions for workload identity federation permissions: contents: 'read' id-token: 'write' @@ -32,7 +76,7 @@ jobs: token_format: 'access_token' workload_identity_provider: '${{ secrets.WIF_PROVIDER }}' # e.g. - projects/123456789/locations/global/workloadIdentityPools/my-pool/providers/my-provider service_account: '${{ secrets.WIF_SERVICE_ACCOUNT }}' # e.g. - my-service-account@my-project.iam.gserviceaccount.com - project_id: '${{secrets.PROJECT_ID}}' + project_id: '${{env.PROJECT_ID}}' - uses: actions/setup-java@v4 @@ -40,19 +84,26 @@ jobs: distribution: 'temurin' java-version: 21 + # BEGIN - Docker auth and build (NOTE: If you already have a container image, these Docker steps can be omitted) + + # Authenticate Docker to Google Cloud Artifact Registry + # Authenticate JIB to Google Cloud Run - name: Build and Push Container using Jib env: GOOGLE_AR_CLIENT_SECRET: ${{ secrets.GOOGLE_AR_CLIENT_SECRET }} SPRING_PROFILES_ACTIVE: dev run: ./gradlew jib + # END - Docker auth and build - name: Deploy to Cloud Run id: deploy uses: google-github-actions/deploy-cloudrun@v2 with: - service: ${{ secrets.SERVICE }} - region: ${{ secrets.REGION }} - image: ${{ secrets.REGION }}-docker.pkg.dev/${{ secrets.PROJECT_ID }}/${{ secrets.ARTIFACT_REGISTRY }}/${{ secrets.SERVICE }}:latest + service: ${{ env.SERVICE }} + region: ${{ env.REGION }} + # NOTE: If using a pre-built image, update the image name here + image: ${{ env.REGION }}-docker.pkg.dev/${{ env.PROJECT_ID }}/${{ env.ARTIFACT_REGISTRY }}/${{ env.SERVICE }}:latest + # If required, use the Cloud Run url output in later steps - name: Show Output - run: echo ${{ steps.deploy.outputs.url }} + run: echo ${{ steps.deploy.outputs.url }} \ No newline at end of file