Customizing CI/CD Templates
The CI/CD templates can be configured on a control plane level (available for customers using Truefoundry in separate hosted control plane only). This customization can be used to add custom image scanning workflows, security scans etc to the CI/CD pipelines or add whatever custom logic user wants to add.
How do CI/CD templates get rendered?
Truefoundry renders different CI/CD templates as shown in this document automatically based on the deployment.
All the templates can be found here.
There is a file called cicd-providers.yaml
which basically stores which tells which providers need to be enabled like github, bitbucket and gitlab. All other files contain templates to configure CI/CD based on different cases like:
- Whether image is built on TrueFoundry or built elsewhere.
- Whether the spec is stored as a yaml in your repository (complete Gitops) or not.
These are different templates for gitlab, bitbucket and github.
How to customize these templates for your Control Plane?
The CI/CD templates are supplied to TrueFoundry's control plane via a config map. These config map values can be overridden by updating the values of truefoundry
helm chart
You will need to update the values of tfy-configs in the truefoundry
helm chart.
You need to define the content of cicd-providers.yaml
with your provider specific details. Here is the default file.
Apart from this you need to define all the the other templates of a particular provider (for e.g. github) by taking reference from the files in this folder. ( You should ideally change only the steps
field in each yaml file (or maybe the description). No other field should be changed.)
...
tfy-configs:
...
configs:
cicdTemplates:
cicd-providers.yaml: |
- id: github
name: GitHub
icon: github
enabled: true
#- id: gitlab
# name: GitLab
# icon: gitlab
# enabled: false
#- id: bitbucket
# name: Bitbucket
# icon: bitbucket
# enabled: false
github-actions-git-source.yaml: |
...
github-actions-local-source.yaml: |
...
github-actions-self-build-image.yaml: |
...
github-actions-git-source-patch-application.yaml: |
...
github-actions-self-build-image-patch-application.yaml: |
name: Deploy docker image on TrueFoundry with out spec in Git repository
cicd_provider_id: github
enabled: true
description: "The application spec will be stored and maintained from
TrueFoundry UI. The docker image is built in your CI pipeline and then
the image uri is patched in the spec and deployed to truefoundry."
deployment_mode: patch-application
build_source: local
recommended_environment: dev
image_builder: self
steps:
- label: Generate API Key
icon: null
usage: Generate an API Key to authenticate and deploy applications
type: generate-api-key
- label: Add API Key to Github Secrets
icon: null
usage: null
type: markdown-content
args:
content: |
In your GitHub Repository, navigate to **Settings > Secrets and Variables > Actions**.
Add a new secret called `TFY_API_KEY` and set the generated api key as value
- label: Create GitHub Action
icon: null
usage: |
Add the below workflow as `tfy-deploy.yaml` in your github workflow directory (`.github/workflows/`).
Following GitHub Action will be triggered on each push to `main` branch
type: markdown-content
args:
content: |
> **Note:** Please read through the `env` section and Image Build Section and update them for your registry and repo.
```yaml
name: Deploy to TrueFoundry
on:
push:
branches:
- 'main'
permissions:
id-token: write
contents: read
env:
TFY_HOST: {{ TRUEFOUNDRY_TFY_HOST }}
TFY_API_KEY: $\{{ secrets.TFY_API_KEY }}
APPLICATION_FQN: {{ TRUEFOUNDRY_APPLICATION_FQN }}
# Update these with your Docker Registry and Repository
DOCKER_REGISTRY: docker.io
DOCKER_REPO_NAME: $\{{ github.event.repository.name }}
DOCKER_IMAGE_REPO: $\{{ env.DOCKER_REGISTRY }}/$\{{ env.DOCKER_REPO_NAME }}
DOCKER_IMAGE_TAG: $\{{ github.sha }}
DOCKER_IMAGE_URI: "$\{{ env.DOCKER_IMAGE_REPO }}:$\{{ env.DOCKER_IMAGE_TAG }}"
jobs:
build_deploy:
name: Build Image
runs-on: ubuntu-latest
timeout-minutes: 30
steps:
- name: Checkout code
uses: actions/checkout@v3
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
### Image Build Section ###
# Build your image, push it
# Here is a sample, you can replace this with your registry specific steps.
# The registry here should be also be linked in Integrations on TrueFoundry
# Please see https://github.com/docker/login-action?tab=readme-ov-file#usage for examples
name: Login to Docker Hub
uses: docker/login-action@v3
with:
registry: $\{{ env.DOCKER_REGISTRY }}
username: $\{{ secrets.DOCKER_REGISTRY_USERNAME }}
password: $\{{ secrets.DOCKER_REGISTRY_PASSWORD }}
- name: Build and push image
uses: docker/build-push-action@v5
with:
platforms: linux/amd64
context: .
push: true
tags: $\{{ env.DOCKER_IMAGE_URI }}
cache-from: type=registry,ref=$\{{ env.DOCKER_IMAGE_REPO }}:buildcache
cache-to: mode=max,image-manifest=true,type=registry,ref=$\{{ env.DOCKER_IMAGE_REPO }}:buildcache
############################
- name: Set up Python
uses: actions/setup-python@v4
with:
python-version: 3.11
- name: Install dependencies
run: |
pip install "truefoundry<1.0.0"
- name: Deploy to workspace
run: |
tfy patch-application --application-fqn $\{{ env.APPLICATION_FQN }} --patch='{"image": {"image_uri": "$\{{ env.DOCKER_IMAGE_URI }}"}}'
```
Note
- There must be a file named:
cicd-providers.yaml
in the CI/CD templates. You can use this as reference to create a CI/CD providers file: - All the keys must be file names of format
*.yaml
- You must define all the templates you need in the
truefoundry
values.
Updated 6 days ago