Skip to main content
Version: v0.9

Deploy Application Securely and Efficiently via GitHub Actions

This document provides the instruction to deploy your application securely and efficiently via GitHub Actions.

Using git repository is a very reliable and common way to manage code, and the same goes for Kusion-managed configuration code. GitHub Actions is a CI/CD platform. By customizing GitHub Actions workflow, the pipeline such as building, testing, and deploying will be executed automatically.

Kusion has a commendable integration with Github Actions. You can use Github Actions to test configuration correctness, preview change, and deploy application. This tutorial demonstrates how to deploy and operate an application through GitHub Actions.

GitHub Actions Workflow

KusionStack/konfig is the official example repository, and provides the GitHub Actions workflow main.yml. The main.yml is triggered by a push or a pull request on the main branch, and includes multiple jobs, which ensures the reliability of configuration code, and deploys the changed application.

workflow

The workflow to deploy an application is shown above, which includes the following jobs:

  • Get changed project and stack
  • Check project and stack structure
  • Test code correctness
  • Preview changed stack
  • Apply changed stack

These jobs ensure the security and efficiency of the application deployment. Next, this tutorial will introduce the usage and function of these jobs. To show how they work more visually, updating port configuration of multi-stack (referred to "the example" in the below) is given as an example.

Get Changed Project and Stack

As Kusion organizes code by project and stack, to deploy the affected applications, analyze the changed project and stack is the first step.

The jobs, get-changed-project-stack perfectly accomplish the analysis. The main steps are as follows:

  • Obtain the list of changed files through git diff;
  • Based on the changed file list, obtain the changed projects and stacks which are indicated by project.yaml and stack.yaml respectively.

The example changes the file example/multi-stack/base/base.k, where the affected project is example/multi-stack, and the stack is example/multi-stack/dev and example/multi-stack/prod. Delightfully, the result, which is shown below, meets our expectation.

changed-project-stack

Check Project and Stack Structure

The job check-structure guarantees the structure legality of the changed project and stack, so that Kusion CLI tools can be used correctly. The check items are as follows:

  • The field name is required in project.yaml;
  • The field name is required in stack.yaml.

The success of structure-check means the correctness of structure. A pytest report check-structure-report is also generated, and you can get it from GithHub Actions Artifacts .

The example passes the directory structure verification. It is clear from the report that the changed project and stack have get checked, and the result is passed.

check-structure

Test Code Correctness

Besides a rightful structure, the code must have correct syntax and semantics, and the job test-correctness ensures the correctness. kusion compile get executed on the changed stacks. If succeeded, there are no syntax errors; or the configuration code is illegal, and the following application deployment will fail.

The report whose name is test-correctness-report get generated.

The example passes the code correctness test. The report shows that the tested stack is example/multi-stack/dev and example/multi-stack/prod, and the result is passed.

test-correctness

Preview Changed Stack

After passing the above jobs, security of the configuration change is guaranteed, and it's time to deploy your application. Before applying the change to the real infrastructure, it's necessary to get the expected result of the application deployment. The job preview calls kusion preview to get the expected change result, the result is uploaded to the artifact preview-report. If the result meets your requirement, you can go to the next job and deploy the application.

The example changes stack example/multi-stack/dev and example/multi-stack/prod. The following picture shows the preview result of example/multi-stack/prod, where the result is to create a Kubernetes Namespace, Service and Deployment if call kusion apply.

preview

Apply Changed Stack

Finally, the last step is arrived, i.e. deploy application. The job apply calls kusion apply to apply the configuration change to the real infrastructure. If the job succeeded, the result will be uploaded to the artifact apply-report.

For the stack example/multi-stack/prod in the example, a Kubernetes Namespace, Service and Deployment get created, which is consistent with the preview result.

apply

Summary

This tutorial demonstrates how Kusion integrates with GitHub Actions to deploy an application. By structure check, correctness test, preview and apply, Kusion with GitHub Actions enables you deploy application efficiently and securely.