This example demonstrates building and deploying an app to Control Plane using Terraform as part of a GitHub Action.
The example is a Node.js app that displays the environment variables and start-up arguments.
Terraform requires the current state be persisted between deployments. This example uses Terraform Cloud to manage the state.
This example is provided as a starting point and your own unique delivery and/or deployment requirements will dictate the steps needed in your situation.
Follow these instructions to set up an account and workspace at Terraform Cloud:
-
Create an account at https://app.terraform.io/.
-
Create an organization. Keep a note of the organization. It will be used in the example set up section.
-
Create a workspace. Select the
CLI-driven workflowtype. The example uses aworkspace prefixwhen configuring the workspace block in the/terraform/terraform.tffile. This allows a Terraform workspace to be used for each branch deployed. The prefix is prepended to the value of the environment variableTF_WORKSPACEwhen Terraform is executing. When creating the workspace in the wizard, the name should be the prefix followed by the branch name. For example,cpln-devandcpln-main(prefix iscpln-). Keep a note of the workspace. It will be used in the example set up section. -
Set the execution mode to
localin the general settings.- Click the
Settingsbutton in the top menu, then click theGeneralbutton. - Click the
Localradio button, then click theSave Settingsbutton at the bottom of the page.
- Click the
-
Create an API token.
- Click on your user profile (upper right corner) and click
Account settings. - Click Tokens on the left side menu.
- Click
Create an API token, enter a description, and clickCreate API token. - Keep a note of the token. It will be used in the example set up section.
- Click on your user profile (upper right corner) and click
The Terraform provider and Control Plane CLI require a Service Account with the proper permissions to perform actions against the Control Plane API.
- Follow the Control Plane documentation to create a Service Account and create a key. Take a note of the key. It will be used in the next section.
- Add the Service Account to the
superusersgroup. Once the GitHub Actions executes as expected, a policy can be created with a limited set of permissions and the Service Account can be removed from thesuperusersgroup.
When triggered, the GitHub action will execute the steps defined in the workload file located at .github/workflow/deploy-to-control-plane.yml. The workflow will generate a Terraform plan based on the HCL in the /terraform/terraform.tf file. The HCL will create/update a GVC and workload hosted at Control Plane. After the plan has been reviewed by the user, the action needs to be manually triggered with the apply flag set to true. This apply flag will execute the steps that will containerize and push the application to the org's private image repository and apply the Terraform plan.
The action file .github/actions/inputs/action.yml, is used by the workflow file to configure the pipeline based on the branch and input variables (which are configured as repository secrets). This can be used to deploy multiple branches as individual GVCs/workloads to Control Plane.
The action will:
- Install the Control Plane CLI.
- Install the Control Plane Terraform Provider.
- Configure the required environment variables based on the input from the workflow.
The action sets the environment variables used by the variables (prefixed with TF_VAR_) in the Terraform HCL script (in the /terraform/terraform.tf file). Any additional variables should be added to the action and set in the workflow.
The workflow will:
- Check out the code.
- Run the action based on the branch.
- Authenticate, containerize and push the application to the org's private image repository if the apply flag is set to true.
- Set the Terraform cloud token.
- Run the Terraform init and validate command.
- Run the Terraform plan command if the apply flag is set to false.
- Run the Terraform apply command if the apply flag is set to true.
Perform the following steps to set up the example:
-
Fork the example into your own workspace.
-
The following variables are required and must be added as GitHub repository secrets.
Browse to the Secrets page by clicking `Settings` (top menu bar), then `Secrets` (left menu bar).
Add the following variables:
CPLN_ORG: Control Plane org.CPLN_TOKEN: Service Account Key.CPLN_GVC_DEV: The name of the GVC for thedevbranch.CPLN_WORKLOAD_DEV: The name of the workload for thedevbranch.CPLN_IMAGE_NAME_DEV: The name of the image that will be deployed for thedevbranch. The workflow will append the short SHA of the commit as the image tag when pushing the image to the org's private image repository.TF_WORKSPACE_DEV: The Terraform workspace name for thedevbranch. Do not include the common prefix used when setting up the workspace in theTerraform Cloud Set Upsection.CPLN_GVC_MAIN: The name of the GVC for themainbranch.CPLN_WORKLOAD_MAIN: The name of the workload for themainbranch.CPLN_IMAGE_NAME_MAIN: The name of the image that will be deployed for themainbranch. The workflow will append the short SHA of the commit as the image tag when pushing the image to the org's private image repository.TF_WORKSPACE_MAIN: The Terraform workspace name for themainbranch. Do not include the common prefix used when setting up the workspace in theTerraform Cloud Set Upsection.TF_PROVIDER_VERSION: The version number of the Control Plane Terraform Provider (Current version is: 1.0.1).TF_CLOUD_TOKEN: Terraform Cloud Authentication Token (from theTerraform Cloud Set Upsection).
-
Review the
.github/workflows/deploy-to-control-plane.ymlfile:- The workflow can be updated to be triggered on specific branches and actions (pushes, pull requests, etc.). The example is set to trigger on a push to the
mainanddevbranch on lines 8-9 (currently commented out). - Lines 33 and 46: If necessary, update the branch names to match line 9.
- The workflow can be updated to be triggered on specific branches and actions (pushes, pull requests, etc.). The example is set to trigger on a push to the
-
Update the Terraform HCL file located at
/terraform/terraform.tfusing the values that were created in theTerraform Cloud Set Upsection:TERRAFORM_ORG: The Terraform Cloud organization.WORKSPACE_PREFIX: The Terraform Workspace Prefix. Only enter the prefix. Terraform will automatically append the value of theTF_WORKLOADenvironment variable that was set in the action when pushing the state to the Terraform cloud. This comes in handy when deploying to multiple branches as each branch will have its own workspace (hosting the state) within the Terraform Cloud.
-
The file
/terraform/.terraformrcmust be included to allow Terraform to authenticate to their cloud service. No modification is necessary. The pipeline will update the credentials during execution with the value of theTF_CLOUD_TOKENenvironment variable.
To manually trigger the GitHub action:
- From within the repository, click
Actions(top menu). - Click the
Deploy-To-Control-Planelink underWorkflows. - Click the
Run workflowpulldown button. - Select the branch to use.
- Update the
Apply Terraformtext box totrueto apply the Terraform updates. - Optionally, add the SHA of a specific commit to deploy. Leave empty to deploy the latest.
- Click
Run workflow.
After the Github Action has successfully deployed the application, it can be tested by following these steps:
- Browse to the Control Plane Console.
- Select the GVC name that corresponds to the branch that was deployed.
- Select the workload name that corresponds to the branch that was deployed.
- Click the
Openbutton. The app will open in a new tab. The container's environment variables and start up arguments will be displayed.
- Update the
TF_PROVIDER_VERSIONrepository secret with the desired provider version. - Update the version property inside the HCL file that contains the
required_providersdeclaration block for thecplnprovider. - The example workflow runs the command
terraform init -upgradewhich will upgrade the Terraform dependencies (state file, etc.).
Note: If necessary, the provider version can be downgraded.
Terraform
GitHub