GitHub Actions gives you the flexibility to build automated software development workflows. With GitHub Actions for Okteto you can create workflows to build, deploy and update your applications in Okteto.
Try Okteto for free for 30 days, no credit card required. Start your 30-day trial now!
You can use this action to trigger an Okteto Pipeline based on Github events.
You can use this action to enable your CI/CD workflow in Okteto.
This document has more information on this workflow.
The Deploy Pipeline GitHub action deploys your application based on the Okteto Manifest present in your repository.
Your application will be deployed to the namespace that you specified.
The name of the pipeline.
The Okteto namespace to use. If not specified it will use the namespace specified by the namespace
action.
The length of time to wait for completion. Values should contain a corresponding time unit e.g. 1s, 2m, 3h. If not specified it will use 5m
.
Skip the pipeline deployment if the pipeline already exists in the namespace (defaults to false)
A list of variables to be used by the pipeline. If several variables are present, they should be separated by commas e.g. VAR1=VAL1,VAR2=VAL2,VAR3=VAL3.
The relative path within the repository to the pipeline file. If not specified the default pipeline is executed.
Log level used. Supported values are: debug
, info
, warn
, error
. (defaults to warn)
This example runs the context action, activates a namespace, and triggers the Okteto pipeline
# File: .github/workflows/workflow.yml
on:
pull_request:
branches:
- master
name: example
jobs:
devflow:
runs-on: ubuntu-latest
steps:
- name: checkout
uses: actions/checkout@master
- name: context
uses: okteto/context@latest
with:
url: https://okteto.example.com
token: ${{ secrets.OKTETO_TOKEN }}
- name: "Activate Namespace"
uses: okteto/namespace@latest
with:
name: cindylopez
- name: "Trigger the pipeline"
uses: okteto/pipeline@latest
with:
name: pr-${{ github.event.number }}
timeout: 8m
skipIfExists: true
variables: "DB_HOST=mysql,CONFIG_PATH=/tmp/config.yaml"
You can specify a custom certificate authority or a self-signed certificate by setting the OKTETO_CA_CERT
environment variable. When this variable is set, the action will install the certificate in the container, and then execute the action.
Use this option if you're using a private Certificate Authority or a self-signed certificate in your Okteto SH instance. We recommend that you store the certificate as an encrypted secret, and that you define the environment variable for the entire job, instead of doing it on every step.
# File: .github/workflows/workflow.yml
on: [push]
name: example
jobs:
devflow:
runs-on: ubuntu-latest
env:
OKTETO_CA_CERT: ${{ secrets.OKTETO_CA_CERT }}
steps:
- uses: okteto/context@latest
with:
url: https://okteto.example.com
token: ${{ secrets.OKTETO_TOKEN }}
- name: "Activate Namespace"
uses: okteto/namespace@latest
with:
name: cindylopez
- name: "Trigger the pipeline"
uses: okteto/pipeline@latest
with:
name: pr-${{ github.event.number }}
timeout: 8m
skipIfExists: true
filename: .okteto/custom-pipeline.yaml
variables: "DB_HOST=mysql,CONFIG_PATH=/tmp/config.yaml"