52 Commits

Author SHA1 Message Date
6966df2868 Automatyczna zmiana: 1754157020 2025-08-02 19:50:20 +02:00
d33e107efb Automatyczna zmiana: 1754156832 2025-08-02 19:47:13 +02:00
de360b10cc Automatyczna zmiana: 1754156664 2025-08-02 19:44:24 +02:00
e558baa265 Automatyczna zmiana: 1754156522 2025-08-02 19:42:02 +02:00
e8361548ff Automatyczna zmiana: 1754156388 2025-08-02 19:39:48 +02:00
c75e7de053 Automatyczna zmiana: 1754156224 2025-08-02 19:37:04 +02:00
157c451ba4 Automatyczna zmiana: 1754156085 2025-08-02 19:34:45 +02:00
4930bbe45c Automatyczna zmiana: 1754155919 2025-08-02 19:31:59 +02:00
c0469ca0c2 Automatyczna zmiana: 1754155776 2025-08-02 19:29:36 +02:00
77551add1e Automatyczna zmiana: 1754155638 2025-08-02 19:27:18 +02:00
9e4c747df5 Automatyczna zmiana: 1754155458 2025-08-02 19:24:18 +02:00
f28d9dd27f Automatyczna zmiana: 1754155314 2025-08-02 19:21:54 +02:00
4224a6be73 Automatyczna zmiana: 1754155162 2025-08-02 19:19:22 +02:00
f69be74a45 Automatyczna zmiana: 1754155005 2025-08-02 19:16:45 +02:00
d3908d8d66 Automatyczna zmiana: 1754154815 2025-08-02 19:13:35 +02:00
43c168aaf2 Automatyczna zmiana: 1754154641 2025-08-02 19:10:41 +02:00
fa6a653e73 Automatyczna zmiana: 1754154490 2025-08-02 19:08:10 +02:00
be606b6134 Automatyczna zmiana: 1754154324 2025-08-02 19:05:24 +02:00
2c3774ba09 Automatyczna zmiana: 1754154161 2025-08-02 19:02:41 +02:00
e623daad67 Automatyczna zmiana: 1754153922 2025-08-02 18:58:42 +02:00
49d7f8a500 Added missing dev functionalities for Docker files from dev branch 2025-08-02 16:16:05 +02:00
e32403dd86 Added execute permissions to deployment_timer script 2025-08-02 16:14:28 +02:00
64605796b2 Added development functionalities from dev branch 2025-08-02 15:54:42 +02:00
a652a0bddb Added script to trigger and measure deployment time 2025-08-02 15:32:36 +02:00
30ba18cace Corrected event source name 2025-08-02 15:11:20 +02:00
e297121e93 Added second webhook to separate deploy repo 2025-08-02 14:52:42 +02:00
9e4cc61e30 Added permissions for ui user to read workflows in argo-events namespace 2025-08-02 14:22:45 +02:00
90dcd19a46 Updated branch name 2025-08-02 14:22:19 +02:00
a5a9c9ec43 Removed unused files and not needed subdirs 2025-08-02 14:06:57 +02:00
a0a9d7d592 Removed old unused workflow copy 2025-08-02 13:49:26 +02:00
7ada42d7f8 Added one missing ident 2025-08-02 13:45:13 +02:00
2777e73aa2 Cleanup argo-workflows directory 2025-08-02 13:16:06 +02:00
77884b291d Configured separate ingress for webhook 2025-08-01 22:58:02 +02:00
c9ffa1c420 Configured first test webhook for Argo Workflows 2025-08-01 22:30:30 +02:00
c99b2be62f Updated branch name 2025-08-01 19:11:12 +02:00
239df0af11 Corrected some commands format 2025-08-01 00:31:54 +02:00
a44bf142ba Corrected name for ssk private key file 2025-08-01 00:20:06 +02:00
3fb4ffd621 Added new secrets to secret store 2025-08-01 00:19:06 +02:00
9659af1c9a Added GitOps commit after build and push Docker image 2025-07-31 22:01:46 +02:00
a77ec1a6f8 Revert "Removed unused secret store"
This reverts commit 8396169b19.
2025-07-31 21:43:01 +02:00
901805bd01 Replaced parameters by env variables 2025-07-30 23:41:11 +02:00
2886274d5e Removed unused secret-store volume 2025-07-30 23:20:24 +02:00
8396169b19 Removed unused secret store 2025-07-30 22:58:21 +02:00
8eb3dbfd59 Corrected sysbox runtime declaration in workflow 2025-07-30 22:57:15 +02:00
dd248dc0b9 Implemented sysbox runtime for docker image build and push step 2025-07-30 22:23:44 +02:00
c8cd08d7ff Update Kubernetes service account name 2025-07-30 22:22:52 +02:00
0c02c20995 Implemented automatic fetching ACR password from Azure KeyVault 2025-05-12 20:52:29 +00:00
7b12088952 Combined 2 steps checkout and get-git-sha into one 2025-05-12 20:06:44 +00:00
7a411a7148 Git-sha is now set as docker image tag 2025-05-11 18:40:59 +00:00
37ea900325 Prepared first working workflow version to auto build docker images 2025-05-11 17:52:43 +00:00
2a80c733b3 Configured volume to share data between steps 2025-05-10 19:26:23 +00:00
3764970082 Created initial workflow to build and push DOcker image by Argo Workflow 2025-05-10 15:14:33 +00:00
20 changed files with 615 additions and 84 deletions

View File

@ -1,5 +1,18 @@
FROM python:3.11.7-slim-bookworm FROM python:3.11.7-alpine
# Wersja i data builda jako build-arg
ARG APP_VERSION=unknown
ARG BUILD_DATE=unknown
# Ustawiamy zmienne w ENV, by były dostępne w kontenerze
ENV APP_VERSION=$APP_VERSION
ENV BUILD_DATE=$BUILD_DATE
WORKDIR /app WORKDIR /app
COPY api . COPY api .
RUN apk add --no-cache curl
RUN pip install -r requirements.txt RUN pip install -r requirements.txt
CMD python3 app.py
CMD python3 app.py

72
Jenkinsfile vendored
View File

@ -1,72 +0,0 @@
pipeline {
agent any
environment {
DOCKER_REGISTRY_URL = 'marcin00.azurecr.io'
DOCKER_IMAGE = "${DOCKER_REGISTRY_URL}/user-microservice:${GIT_COMMIT}"
ACR_NAME = 'marcin00'
}
stages {
stage('Checkout') {
steps {
checkout scm
}
}
stage('Test python app') {
steps {
script {
dir('api') {
sh '''
python3 -m venv env
source env/bin/activate
pip install -r requirements.txt pytest
python3 -m pytest --junit-xml=pytest_junit.xml
'''
}
}
}
post {
always {
junit testResults: '**/*pytest_junit.xml'
}
}
}
stage('Build & test docker image') {
steps {
script {
appImage = docker.build("${DOCKER_IMAGE}")
sh label: 'Install dgoss', script: '''
curl -s -L https://github.com/aelsabbahy/goss/releases/latest/download/goss-linux-amd64 -o goss
curl -s -L https://github.com/aelsabbahy/goss/releases/latest/download/dgoss -o dgoss
chmod +rx *goss
'''
withEnv(['GOSS_OPTS=-f junit', 'GOSS_PATH=./goss', 'GOSS_SLEEP=3', 'SQLALCHEMY_DATABASE_URI=sqlite:///:memory:']) {
sh label: 'run image tests', script: './dgoss run -e SQLALCHEMY_DATABASE_URI=sqlite:///:memory: ${DOCKER_IMAGE} > goss_junit.xml'
}
}
}
post {
always {
junit testResults: '**/*goss_junit.xml'
}
}
}
stage('Deploy') {
steps {
script {
sh '''
az login --identity
az acr login --name ${ACR_NAME}
docker push ${DOCKER_IMAGE}
'''
}
}
}
}
post {
cleanup {
script { cleanWs() }
}
}
}

View File

@ -4,7 +4,8 @@ from flask_jwt_extended import JWTManager
from jwt import ExpiredSignatureError from jwt import ExpiredSignatureError
from models import db, RevokedToken from models import db, RevokedToken
import os import os
from utils import init_db from tech_views import tech_bp
from utils import init_db, wait_for_db
from views import user_bp from views import user_bp
from werkzeug.exceptions import HTTPException from werkzeug.exceptions import HTTPException
@ -26,6 +27,7 @@ def create_app(config_name="default"):
# Blueprints registration # Blueprints registration
app.register_blueprint(user_bp) app.register_blueprint(user_bp)
app.register_blueprint(tech_bp)
# Database and JWT initialization # Database and JWT initialization
db.init_app(app) db.init_app(app)
@ -53,6 +55,7 @@ def create_app(config_name="default"):
# Fill database by initial values (only if we are not testing) # Fill database by initial values (only if we are not testing)
with app.app_context(): with app.app_context():
wait_for_db(max_retries=100)
db.create_all() db.create_all()
if config_name != "testing": if config_name != "testing":
init_db() init_db()

20
api/tech_views.py Normal file
View File

@ -0,0 +1,20 @@
from flask import Blueprint, jsonify
from models import db
from sqlalchemy import text
from utils import db_ready
# Blueprint with technical endpoints
tech_bp = Blueprint('tech_bp', __name__)
@tech_bp.route('/health', methods=['GET'])
def health_check():
"Check if service works and database is functional"
try:
with db.engine.connect() as connection:
connection.execute(text("SELECT 1"))
return jsonify(status="healthy"), 200
except Exception:
if db_ready:
return jsonify(status="unhealthy"), 500
else:
return jsonify(status="starting"), 503

View File

@ -2,17 +2,22 @@ from flask import abort
from flask_jwt_extended import get_jwt_identity from flask_jwt_extended import get_jwt_identity
from models import User, db from models import User, db
import os import os
from sqlalchemy import text
from sqlalchemy.exc import DatabaseError, InterfaceError
import time
from werkzeug.security import generate_password_hash from werkzeug.security import generate_password_hash
db_ready = False
def admin_required(user_id, message='Access denied.'): def admin_required(user_id, message='Access denied.'):
"Check if common user try to make administrative action."
user = db.session.get(User, user_id) user = db.session.get(User, user_id)
if user is None or user.role != "Administrator": if user is None or user.role != "Administrator":
abort(403, message) abort(403, message)
def validate_access(owner_id, message='Access denied.'): def validate_access(owner_id, message='Access denied.'):
# Check if user try to access or edit resource that does not belong to them "Check if user try to access or edit resource that does not belong to them."
logged_user_id = int(get_jwt_identity()) logged_user_id = int(get_jwt_identity())
logged_user_role = db.session.get(User, logged_user_id).role logged_user_role = db.session.get(User, logged_user_id).role
if logged_user_role != "Administrator" and logged_user_id != owner_id: if logged_user_role != "Administrator" and logged_user_id != owner_id:
@ -27,6 +32,20 @@ def get_user_or_404(user_id):
return user return user
def wait_for_db(max_retries):
"Try to connect with database <max_retries> times."
global db_ready
for _ in range(max_retries):
try:
with db.engine.connect() as connection:
connection.execute(text("SELECT 1"))
db_ready = True
return
except DatabaseError | InterfaceError:
time.sleep(3)
raise Exception("Failed to connect to database.")
def init_db(): def init_db():
"""Create default admin account if database is empty""" """Create default admin account if database is empty"""
with db.session.begin(): with db.session.begin():

View File

@ -2,6 +2,7 @@ from flask import Blueprint, jsonify, request, abort
from flask_jwt_extended import create_access_token, set_access_cookies, jwt_required, \ from flask_jwt_extended import create_access_token, set_access_cookies, jwt_required, \
verify_jwt_in_request, get_jwt_identity, unset_jwt_cookies, get_jwt verify_jwt_in_request, get_jwt_identity, unset_jwt_cookies, get_jwt
from models import db, RevokedToken, User from models import db, RevokedToken, User
import os
from utils import admin_required, validate_access, get_user_or_404 from utils import admin_required, validate_access, get_user_or_404
from werkzeug.security import check_password_hash, generate_password_hash from werkzeug.security import check_password_hash, generate_password_hash
@ -110,3 +111,10 @@ def user_logout():
response = jsonify({"msg": "User logged out successfully."}) response = jsonify({"msg": "User logged out successfully."})
unset_jwt_cookies(response) unset_jwt_cookies(response)
return response return response
@user_bp.route('/version', methods=['GET'])
def version():
return jsonify({
"version": os.getenv("APP_VERSION", "unknown"),
"build_time": os.getenv("BUILD_DATE", "unknown")
})

View File

@ -0,0 +1,20 @@
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: argo-ingress
namespace: argo
annotations:
nginx.ingress.kubernetes.io/ssl-redirect: "false"
spec:
ingressClassName: nginx
rules:
- host: argo.marcin00.pl
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: argo-server
port:
number: 2746

View File

@ -0,0 +1,23 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: argo-workflow-manager
namespace: argo-events
rules:
- apiGroups: ["argoproj.io"]
resources: ["workflows", "workflowtemplates", "cronworkflows"]
verbs: ["get", "list", "watch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: argo-ui-user-read-access
namespace: argo-events
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: argo-workflow-manager
subjects:
- kind: ServiceAccount
name: argo-ui-user
namespace: argo

View File

@ -0,0 +1,109 @@
apiVersion: argoproj.io/v1alpha1
kind: Sensor
metadata:
name: webhook-deploy
namespace: argo-events
spec:
template:
serviceAccountName: operate-workflow-sa
dependencies:
- name: gitea-push
eventSourceName: webhook
eventName: user-microservice-deploy
triggers:
- template:
name: deploy-user-microservice
k8s:
operation: create
source:
resource:
apiVersion: argoproj.io/v1alpha1
kind: Workflow
metadata:
generateName: deploy-user-microservice-
spec:
entrypoint: main
serviceAccountName: operate-workflow-sa
volumeClaimTemplates:
- metadata:
name: workspace
spec:
accessModes: ["ReadWriteOnce"]
resources:
requests:
storage: 128Mi
templates:
- name: main
steps:
- - name: checkout
template: checkout
- - name: deploy
template: deploy
- name: checkout
container:
image: alpine/git
command: [sh, -c]
workingDir: /workspace
env:
- name: REPO_URL
value: https://gitea.marcin00.pl/pikram/user-microservice-deploy.git
- name: REPO_BRANCH
value: argo-deploy
args:
- |
git clone --depth 1 --branch "${REPO_BRANCH}" --single-branch "${REPO_URL}" repo
volumeMounts:
- name: workspace
mountPath: /workspace
- name: deploy
container:
image: marcin00.azurecr.io/azure-cli-kubectl:latest
command: [sh, -c]
workingDir: /workspace/repo
env:
- name: CLIENT_ID
value: "c302726f-fafb-4143-94c1-67a70975574a"
- name: CLUSTER_NAME
value: "build"
- name: RESOURCE_GROUP
value: "tst-aks-rg"
- name: DEPLOY_FILES
value: "namespace.yaml secret-store.yaml deploy.yaml ingress.yaml"
- name: DEPLOYMENT
value: "api"
- name: NAMESPACE
value: "user-microservice"
- name: HEALTHCHECK_URL
value: "https://user-microservice.marcin00.pl/health"
args:
- |
echo "===> Logging in to Azure"
az login --identity --client-id $CLIENT_ID
az aks get-credentials --resource-group $RESOURCE_GROUP --name $CLUSTER_NAME --overwrite-existing
kubelogin convert-kubeconfig -l azurecli
echo "===> Applying Kubernetes manifests"
for file in $DEPLOY_FILES; do
kubectl apply -f "$file"
done
echo "===> Waiting for deployment to complete"
kubectl rollout status deployment/$DEPLOYMENT -n $NAMESPACE --timeout=60s
echo "===> Running health check"
for i in $(seq 1 120); do
if curl -sf $HEALTHCHECK_URL; then
echo "Health check OK"
exit 0
else
echo "Health check failed. Retry $i..."
sleep 5
fi
done
echo "Health check failed"
exit 1
volumeMounts:
- name: workspace
mountPath: /workspace

View File

@ -0,0 +1,13 @@
apiVersion: argoproj.io/v1alpha1
kind: EventBus
metadata:
name: default
namespace: argo-events
spec:
nats:
native:
# Optional, defaults to 3.
# If it is < 3, set it to 3, that is the minimal requirement.
replicas: 3
# Optional, authen strategy, "none" or "token", defaults to "none"
auth: token

View File

@ -0,0 +1,38 @@
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: operate-workflow-sa
namespace: argo-events
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: operate-workflow-role
namespace: argo-events
rules:
- apiGroups: [ "argoproj.io" ]
resources: [ "workflows" ]
verbs: [ "*" ]
- apiGroups: [ "argoproj.io" ]
resources: [ "workflowtaskresults" ]
verbs: [ "create", "patch" ]
- apiGroups: [ "" ]
resources: [ "pods" ]
verbs: [ "get", "patch" ]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: operate-workflow-role-binding
namespace: argo-events
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: operate-workflow-role
subjects:
- kind: ServiceAccount
name: operate-workflow-sa
namespace: argo-events

View File

@ -0,0 +1,30 @@
apiVersion: secrets-store.csi.x-k8s.io/v1
kind: SecretProviderClass
metadata:
name: azure-keyvault
namespace: argo-events
spec:
provider: azure
secretObjects:
- secretName: gitea-secrets
type: Opaque
data:
- objectName: gitea-known-host
key: GITEA_KNOWN_HOST
- objectName: gitea-deploy-key
key: GITEA_DEPLOY_KEY
parameters:
usePodIdentity: "false"
useVMManagedIdentity: "true"
userAssignedIdentityID: "f91aef65-7d2a-4df8-a884-e33b05d54a31" # client_id of the user-assigned managed identity
clientID: "f91aef65-7d2a-4df8-a884-e33b05d54a31" # client_id of the user-assigned managed identity
keyvaultName: "dev-aks"
objects: |
array:
- |
objectName: gitea-known-host
objectType: secret
- |
objectName: gitea-deploy-key
objectType: secret
tenantID: "f4e3e6f7-d21c-460e-b201-2192174e7f41"

172
argo-workflows/sensor.yaml Normal file
View File

@ -0,0 +1,172 @@
apiVersion: argoproj.io/v1alpha1
kind: Sensor
metadata:
name: webhook-build
namespace: argo-events
spec:
template:
serviceAccountName: operate-workflow-sa
dependencies:
- name: gitea-push
eventSourceName: webhook
eventName: user-microservice
triggers:
- template:
name: trigger-build-workflow
k8s:
group: argoproj.io
version: v1alpha1
resource: workflows
operation: create
source:
resource:
apiVersion: argoproj.io/v1alpha1
kind: Workflow
metadata:
generateName: build-workflow-
namespace: argo-events
spec:
entrypoint: main
serviceAccountName: operate-workflow-sa
volumeClaimTemplates:
- metadata:
name: workspace
spec:
accessModes: ["ReadWriteOnce"]
resources:
requests:
storage: 128Mi
volumes:
- name: secrets-store
csi:
driver: secrets-store.csi.k8s.io
readOnly: true
volumeAttributes:
secretProviderClass: azure-keyvault
templates:
- name: main
steps:
- - name: checkout
template: checkout
- - name: tests
template: tests
- - name: build-and-push-image
template: build-and-push-image
arguments:
parameters:
- name: git-sha
value: "{{steps.checkout.outputs.parameters.git-sha}}"
- - name: gitops-commit
template: gitops-commit
arguments:
parameters:
- name: git-sha
value: "{{steps.checkout.outputs.parameters.git-sha}}"
- name: checkout
container:
image: alpine/git
command: [sh, -c]
workingDir: /workspace
env:
- name: REPO_URL
value: https://gitea.marcin00.pl/pikram/user-microservice.git
- name: REPO_BRANCH
value: argo-workflows
args:
- |
git clone --depth 1 --branch "${REPO_BRANCH}" --single-branch "${REPO_URL}" repo
cd repo
git rev-parse HEAD > /tmp/gitsha.txt
volumeMounts:
- name: workspace
mountPath: /workspace
outputs:
parameters:
- name: git-sha
valueFrom:
path: /tmp/gitsha.txt
- name: tests
script:
image: python:3.11.7-alpine
command: [sh]
workingDir: /workspace/repo/api
source: |
python3 -m venv env
source env/bin/activate
pip install -r requirements.txt pytest
python3 -m pytest --junit-xml=pytest_junit.xml
volumeMounts:
- name: workspace
mountPath: /workspace
- name: build-and-push-image
inputs:
parameters:
- name: git-sha
podSpecPatch: |
runtimeClassName: sysbox-runc
metadata:
annotations:
io.kubernetes.cri-o.userns-mode: "auto:size=65536"
container:
image: marcin00.azurecr.io/azure-cli-docker:slim-bookworm
command: [sh, -c]
workingDir: /workspace/repo
env:
- name: DOCKER_IMAGE
value: marcin00.azurecr.io/user-microservice:{{inputs.parameters.git-sha}}
- name: CLIENT_ID
value: c302726f-fafb-4143-94c1-67a70975574a
- name: ACR_NAME
value: marcin00
args:
- |
dockerd &
docker build -t $DOCKER_IMAGE --build-arg APP_VERSION={{inputs.parameters.git-sha}} --build-arg BUILD_DATE=$(date -u +"%Y-%m-%dT%H:%M:%SZ") .
az login --identity --client-id ${CLIENT_ID}
az acr login --name ${ACR_NAME}
docker push ${DOCKER_IMAGE}
volumeMounts:
- name: workspace
mountPath: /workspace
- name: gitops-commit
inputs:
parameters:
- name: git-sha
container:
image: alpine/git
command: [sh, -c]
env:
- name: DEPLOY_REPO_URL
value: ssh://git@srv22.mikr.us:20343/pikram/user-microservice-deploy.git
- name: DEPLOY_REPO_BRANCH
value: argo-deploy
- name: CI_COMMIT_SHA
value: "{{inputs.parameters.git-sha}}"
args:
- |
mkdir -p ~/.ssh
cp /mnt/secrets/gitea-known-host ~/.ssh/known_hosts
chmod 644 ~/.ssh/known_hosts
cp /mnt/secrets/gitea-deploy-key ~/.ssh/id_ed25519
chmod 600 ~/.ssh/id_ed25519
git config --global user.name "argo[bot]"
git config --global user.email "argo@marcin00.pl"
git clone --depth 1 --branch $DEPLOY_REPO_BRANCH --single-branch $DEPLOY_REPO_URL repo
cd repo
awk -v commit="$CI_COMMIT_SHA" '
$0 ~ /name:[[:space:]]*api/ { in_api_container = 1; print; next }
in_api_container && $0 ~ /^[[:space:]]*image:[[:space:]]*/ {
sub(/:[^:[:space:]]+$/, ":" commit)
in_api_container = 0
print
next
}
{ print }
' deploy.yaml > deploy.tmp && mv deploy.tmp deploy.yaml
git add deploy.yaml
git diff-index --quiet HEAD || git commit -m "Argo: Changed deployed version to $CI_COMMIT_SHA"
git push origin $DEPLOY_REPO_BRANCH
volumeMounts:
- name: secrets-store
mountPath: "/mnt/secrets"
readOnly: true

View File

@ -0,0 +1,19 @@
apiVersion: argoproj.io/v1alpha1
kind: EventSource
metadata:
name: webhook
namespace: argo-events
spec:
service:
ports:
- port: 12000
targetPort: 12000
webhook:
user-microservice:
endpoint: /user-microservice
method: POST
port: "12000"
user-microservice-deploy:
endpoint: /user-microservice-deploy
method: POST
port: "12000"

View File

@ -0,0 +1,27 @@
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: argo-ingress
namespace: argo-events
annotations:
nginx.ingress.kubernetes.io/ssl-redirect: "false"
spec:
ingressClassName: nginx
rules:
- host: argo-hook.marcin00.pl
http:
paths:
- path: /user-microservice
pathType: Prefix
backend:
service:
name: webhook-eventsource-svc
port:
number: 12000
- path: /user-microservice-deploy
pathType: Prefix
backend:
service:
name: webhook-eventsource-svc
port:
number: 12000

View File

@ -0,0 +1,16 @@
apiVersion: v1
kind: Service
metadata:
name: webhook-eventsource-svc
namespace: argo-events
spec:
type: ClusterIP
ports:
- name: default
port: 12000
protocol: TCP
targetPort: 12000
selector:
controller: eventsource-controller
eventsource-name: webhook
owner-name: webhook

65
deployment_timer.sh Executable file
View File

@ -0,0 +1,65 @@
#!/bin/bash
# === KONFIGURACJA ===
APP_URL="https://user-microservice.marcin00.pl/version"
MARKER_FILE="version_marker.txt"
OUTPUT_FILE="deployment_times.csv"
CHECK_INTERVAL=1 # sekundy
# === POBRANIE AKTUALNEJ WERSJI APLIKACJI ===
echo "[INFO] Pobieranie aktualnej wersji z /version..."
OLD_VERSION=$(curl -s "$APP_URL" | jq -r '.version')
if [[ -z "$OLD_VERSION" ]]; then
echo "[ERROR] Nie udało się pobrać aktualnej wersji aplikacji."
exit 1
fi
echo "[INFO] Aktualna wersja: $OLD_VERSION"
# === Modyfikacja pliku, commit i push ===
TIMESTAMP=$(date +%s)
echo "$TIMESTAMP" > "$MARKER_FILE"
git add "$MARKER_FILE"
git commit -m "Automatyczna zmiana: $TIMESTAMP"
START_TIME=$(date +%s)
echo "[INFO] Wykonuję git push..."
git push
if [[ $? -ne 0 ]]; then
echo "[ERROR] Push nie powiódł się."
exit 1
fi
echo "[INFO] Oczekiwanie na wdrożenie nowej wersji..."
# === Odpytywanie endpointa /version ===
WAITED=0
echo "[WAIT] Oczekiwanie na nową wersję..."
while true; do
sleep $CHECK_INTERVAL
WAITED=$((WAITED + CHECK_INTERVAL))
NEW_VERSION=$(curl -s "$APP_URL" | jq -r '.version')
if [[ "$NEW_VERSION" != "$OLD_VERSION" ]]; then
END_TIME=$(date +%s)
DURATION=$((END_TIME - START_TIME))
# Nadpisujemy linię z licznikiem
printf "\r[INFO] Nowa wersja wdrożona po %d healtcheck próbach: %s\n" "$WAITED" "$NEW_VERSION"
echo "[INFO] Czas wdrożenia: $DURATION sekund"
echo "$START_TIME,$END_TIME,$DURATION,$OLD_VERSION,$NEW_VERSION" >> "$OUTPUT_FILE"
break
else
# Nadpisujemy TYLKO linię z licznikiem
printf "\r[WAIT] Czekam... wykonano %d healtcheck prób" "$WAITED"
fi
done
# Żeby kursor przeszedł do nowej linii po zakończeniu
echo ""

View File

@ -7,9 +7,24 @@ services:
build: . build: .
env_file: env_file:
- api/.env - api/.env
ports:
- 80:80
healthcheck:
test: ["CMD", "curl", "-f", "http://localhost/health"]
interval: 10s
timeout: 5s
retries: 5
start_period: 15s
db: db:
container_name: db container_name: db
hostname: db hostname: db
image: mysql:latest image: mysql:latest
env_file: env_file:
- db/.env - db/.env
ports:
- 3306:3306
healthcheck:
test: ["CMD", "mysqladmin", "ping", "-h", "localhost"]
interval: 10s
timeout: 5s
retries: 5

View File

@ -1,8 +0,0 @@
port:
tcp:80:
listening: true
ip:
- 0.0.0.0
process:
python3:
running: true

1
version_marker.txt Normal file
View File

@ -0,0 +1 @@
1754157020