This folder includes all the resources that are used to setup and run CI for Tekton using Tekton. A general concept is available with diagrams to explain the general setup.
The CI system provides the following facilities:
- Run Tekton tasks or pipelines as GitHub checks, in response to pull request events and specific comments
- Update the status of the check on GitHub when a job is started and when it completes
- Filter the jobs to be executed based on the content of the PR
All the resources used for CI are deployed in the tekton-ci
namespace in the
dogfooding
cluster.
The resources in eventlistener.yaml
and ingress.yaml
set up the service and
ingress that are configured in repository specific webhook settings on GitHub.
The Event Listener uses a secret called ci-webhook
:
apiVersion: v1
data:
secret: [Base64 encoded secret specified when creating the WebHook in GitHub]
kind: Secret
metadata:
name: ci-webhook
namespace: tekton-ci
type: Opaque
A domain name webhook.ci.dogfooding.tekton.dev
is configured automatically in
Netlify through an annotation on the ingress. The ingress in annotated so that
cert-manager automatically obtains a certificate from Let's Encrypt and configures
HTTPs termination on the load balancer.
The webhook configuration on GitHub side is manual. Two events are required:
- pull_request
- issue_comment
If more events are added to the webhook, they will be filtered out by the GitHub interceptor.
The eventlistener.yaml
does not defined any trigger. Triggers are instead
defined as separate resources, so that each project can define its own.
There is a shared trigger that defines jobs that should run on groups of
repositories.
Each project has a dedicated folder with project specific resources:
trigger.yaml
which defines the triggers for the project (pull_request, comment)template.yaml
which defines the CI pipelines for the project
The Tasks and Pipelines used to define the CI Job must be available in the
tekton-ci
namespace. There is no facility yet to avoid name conflicts, so
projects should namespace job names by including the project name in the check
names.
The comment trigger requires a custom interceptor add-pr-body to enrich the event with the details of the pull request where the comment was made.
The ability to filter events based on the user requires a custom interceptor add-team-members to enrich the event payload with details about members of the GitHub org and of the repo maintainer team.
Tekton is deployed the dogfooding
cluster with cloud events enabled.
All cloud events are sent to the tekton-events
event listener. CEL filters are used to select events from CI jobs TaskRuns
.
Note Please make sure to update the CEL filters of the ci-job-triggers
trigger group accordingly when adding a new Task
or PipelineTask
to avoid unexpected Github Check updates.
When a start, failed or succeeded event is received for a CI job, the
github-template.yaml
is triggered,
which takes care of updating the check status on GitHub side accordingly.
The github-template
adds labels to the task runs it triggers to make it
easier to associate them back with the source task run:
labels:
prow.k8s.io/build-id: $(tt.params.buildUUID)
ci.tekton.dev/source-taskrun-namespace: $(tt.params.taskRunNamespace)
ci.tekton.dev/source-taskrun-name: $(tt.params.taskRunName)
The existing overlays and bindings produce a set of parameters available to CI jobs via the trigger templates. This interface is maintained consistent across CI jobs and trigger templates:
Parameter Name | Description | Source | Notes |
---|---|---|---|
buildUUID | Prow style build ID | build-id custom interceptor | base binding |
sourceEventId | Unique GitHub Event ID | X-GitHub-Delivery header |
base binding |
package | GitHub org/repo | repository.full_name | base binding |
gitRepository | GitHub repo HTML URL | repository.html_url | base binding |
gitRevision | Git rev of the HEAD commit | pull_request.head.sha | Added by add_pr_body for comments |
gitCloneDepth | Number of commits + 1 | extensions.git_clone_depth | Added by an overlay |
pullRequestNumber | Pull request number | pull_request.number | Added by add_pr_body or overlay for comments |
pullRequestURL | Pull request HTML URL | pull_request.html_url | Added by add_pr_body for comments |
pullRequestBaseRef | Pull request Base Branch | pull_request.base.ref | Added by add_pr_body for comments |
gitHubCommand | GitHub comment body | comment.body | Only available for comments, default "" for PR |
labels | GitHub labels for PR | pull_request.labels | Added by add_pr_body for comments |
body | GitHub PR body | pull_request.body | Added by add_pr_body for comments |
A new CI Job requires the following:
- a unique GitHub check name, used to identify the check on GitHub side and to trigger the job on demand
- one or more
Tasks
to be executed - a
Pipeline
that maps the CI Job Interface to theTasks
- a
PipelineRun
to be added to aTriggerTemplate
that runs thePipeline
with the right metadata and parameters from the event
The check name is build according to the following convention:
TRIGGER[-PROJECT]-TEST_NAME
The TRIGGER
can be:
pull
for jobs executed against a pull requestperiodic[-BRANCH]
for periodic jobs executed against aBRANCH
TheBRANCH
part can be omitted if the branch is the main one for the repositorypost
for jobs executed after a change is merged
The PROJECT
part is optional, so job that are identical across repositories
shall not include it in the name.
Example of job names:
pull-pipeline-build-tests
pull-triggers-go-coverage
periodic-dashboard-integration-tests
post-catalog-publish-tasks
pull-kind-label
Tasks should be from the catalog when possible. Non catalog tasks shall be stored
in the tektoncd/plumbing
repo under tekton/ci/jobs
if they are applicable
across repos, or in the tekton/ci
folder of the specific repository.
NOTE Resources from the plumbing repo are deployed automatically to the dogfooding
cluster. Tasks from the catalog and from other repos must be deployed and updated
manually for now.
Common CI pipelines shall be stored in the tektoncd/plumbing
repo under
tekton/ci/jobs
, ideally one YAML file per pipeline.
apiVersion: tekton.dev/v1beta1
kind: Pipeline
metadata:
name: [PIPELINE NAME]
spec:
params:
- name: pullRequestNumber
description: The pullRequestNumber
- name: pullRequestBaseRef
description: The pull request base branch
- name: gitRepository
description: The git repository that hosts context and Dockerfile
- name: gitCloneDepth
description: Number of commits in the change + 1
- name: fileFilterRegex
description: Names regex to be matched in the list of modified files
- name: checkName
description: The name of the GitHub check that this pipeline is used for
- name: gitHubCommand
description: The command that was used to trigger testing
# Additional parameters may be added here as required, as long as the
# pipeline run will be in a position to supply them based on the CI interface
workspaces:
- name: sources
description: Workspace where the git repo is prepared for testing
tasks:
- name: clone-repo
taskRef:
name: git-batch-merge # from the catalog
params:
- name: url
value: $(params.gitRepository)
- name: mode
value: "merge"
- name: revision
value: $(params.pullRequestBaseRef)
- name: refspec
value: refs/heads/$(params.pullRequestBaseRef):refs/heads/$(params.pullRequestBaseRef)
- name: batchedRefs
value: "refs/pull/$(params.pullRequestNumber)/head"
workspaces:
- name: output
workspace: sources
- name: check-name-matches
taskRef:
name: check-name-matches
params:
- name: gitHubCommand
value: $(params.gitHubCommand)
- name: checkName
value: pull-community-teps-lint
- name: check-git-files-changed
runAfter: ['clone-repo']
taskRef:
name: check-git-files-changed
params:
- name: gitCloneDepth
value: $(params.gitCloneDepth)
- name: regex
value: $(params.fileFilterRegex)
workspaces:
- name: input
workspace: sources
- name: [CI JOB specific name]
when: # implicit dependency on the check tasks
- input: $(tasks.check-name-matches.results.check)
operator: in
values: ["passed"]
- input: $(tasks.check-git-files-changed.results.check)
operator: in
values: ["passed"]
workspaces:
- name: input
workspace: sources
taskRef:
name: [CI JOB Task Ref]
params:
- # Any task specific parameter
In case the CI Job is made of multiple tasks, all should run after the task that evaluate the conditions are executed.
The check-name-matches
task is required for the CI job to
executed on demand via the /test [regex]
command.
The check-git-files-changed
task is optional, it is used to only execute
the CI job when relevant files have been modified.
PipelineRuns
are added to the relevant TriggerTemplate
in the
tektoncd/plumbing
repo under tekton/ci/repos/<project>/template.yaml
.
The shared
folder is used for jobs that are shared across repos.
Unless PipelineRuns
require a different Trigger
, they should all be
added to a single TriggerTemplate
.
Most of the TriggerTemplate
spec is boiler-plate YAML, and it's factored up
under ci/bases/template.yaml
, so that the project
specific template only includes the list of PipelineRuns
:
- op: add
path: /spec/resourcetemplates
value:
- apiVersion: tekton.dev/v1beta1
kind: PipelineRun
(...)
- apiVersion: tekton.dev/v1beta1
kind: PipelineRun
(...)
The event listener will trigger the correct template based on the event.
The PipelineRun
must define specific metadata for the conditions and the
downstream CEL filters to work correctly.
- apiVersion: tekton.dev/v1beta1
kind: PipelineRun
metadata:
generateName: CHECK-NAME- # generateName *MUST* be used here. The name is for information only.
labels:
tekton.dev/kind: ci
tekton.dev/check-name: CHECK-NAME # *MUST* be the GitHub check name
tekton.dev/pr-number: $(tt.params.pullRequestNumber)
tekton.dev/source-event-id: $(tt.params.sourceEventId)
prow.k8s.io/build-id: $(tt.params.buildUUID)
annotations:
tekton.dev/gitRevision: "$(tt.params.gitRevision)"
tekton.dev/gitURL: "$(tt.params.gitRepository)"
spec:
serviceAccountName: tekton-ci-jobs
pipelineRef:
name: PIPELINE_NAME # The name of the CI pipeline
workspaces:
- name: source
volumeClaimTemplate:
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 1Gi
params:
- name: checkName
value: CHECK-NAME # *MUST* be the GitHub check name
- name: pullRequestNumber
value: $(tt.params.pullRequestNumber)
- name: gitCloneDepth
value: $(tt.params.gitCloneDepth)
- name: fileFilterRegex
value: "some/relevant/path/**" # A RegExp to match all relevant files
# The match is executed roughly follows:
# git diff-tree --no-commit-id --name-only -r HEAD "$(params.gitCloneDepth) - 1" | \
# grep -E '$(params.fileFilterRegex)
- name: gitHubCommand
value: $(tt.params.gitHubCommand)
# Extra parameters required by the pipeline shall be passed here
NOTE The naming convention for labels and annotations may change in future
as the tekton.dev
namespace has been reserved for Tekton itself only.
If a TriggerTemplate
for a specific repository does not exists yet, it must be
created under tekton/ci/repos/<name>/
and it's usually named template.yaml
.
When a new trigger template is added, corresponding Trigger
resources need to
be added to use the new template when events are received.
Every new file and folder must added to the list in the kustomization.yaml
file in the containing folder.
Most of the TriggerTemplate
and Trigger
resources code can be reused from
ci/bases/template.yaml
and
ci/bases/trigger.yaml
. The content of any
tekton/ci/repos/<name>/
folder is then comprised of three files:
template.yaml
which includes the list of pipelines:
- op: add
path: /spec/resourcetemplates
value:
- apiVersion: tekton.dev/v1beta1
kind: PipelineRun
(...)
- apiVersion: tekton.dev/v1beta1
kind: PipelineRun
(...)
trigger.yaml
which includes the CEL filter that matches the repo:
- op: replace
path: /spec/interceptors/0/params/0/value
value: >-
body.repository.name == 'pipeline'
kustomization.yaml
which includes the configuration of the resources. ThenamePrefix
is the only part that needs to be changed:
namePrefix: tekton-pipeline-
bases:
- ../../bases
patches:
- path: template.yaml
target:
group: triggers.tekton.dev
version: v1beta1
kind: TriggerTemplate
name: ci-pipeline
- path: trigger.yaml
target:
group: triggers.tekton.dev
version: v1beta1
kind: Trigger
Project who want to define an test job running that run on a KinD Kubernetes cluster.
The kind-e2e
pipeline defines a pipeline that
can clones the project repo, sets up Kubernetes in a sidecar using KinD, and runs
an executable script from the project repo. The behaviour of that script can be
customized through environment variables stored in an .env
file in the project repo.
To run the CI job as part of the project CI, a project shall:
- create the test script and
.env
file. In many cases it may be possible to re-use the existing test script that is used inProw
based e2e tests jobs - add a
PipelineRun
to the projectTriggerTemplate
. ThePipelineRun
runs thekind-e2e
pipeline and passes to it the name and path of the script and.env
file (a full example is available in the pipeline template):
- name: e2e-script
value: test/e2e-kind.sh
- name: e2e-env
value: test/e2e-tests-kind.env