# README
Tekton Repo CI/CD
Why does Tekton pipelines have a folder called tekton
? Cuz we think it would be cool
if the tekton
folder were the place to look for CI/CD logic in most repos!
We dogfood our project by using Tekton Pipelines to build, test and release
Tekton Pipelines! This directory contains the
Tasks
and
Pipelines
that we use.
Create an official release
To create an official release, follow the steps in the release-cheat-sheet.
Create a patch release
Sometimes we'll find bugs that we want to backport fixes for into previous releases or discover things that were missing from a release that are required by upstream consumers of a project. In that case we'll make a patch release. To make one:
- Create a milestone to track issues and pull requests to include in the release, e.g. v0.12.1
- The issues when possible should first be fixed and merged into master. As they
are fixed, add the issues to the milestone and tag them with
needs-cherry-pick
. - Create a branch for the release named
release-<version number>x
, e.g.release-v0.13.0x
and push it to the repo https://github.com/tektoncd/pipeline (you may need help from an OWNER with permission to push) if that release branch does not exist. - Use git cherry-pick to cherry pick the
fixes from master into the release branch you have created (use
-x
to include the original commit information). - Check that you have cherry picked all issues in the milestone and look for any
pull requests you may have missed with with
needs-cherry-pick
. - Remove
needs-cherry-pick
from all issues that have been cherry picked. - Create an official release for the patch, with the patch version incremented
- Close the milestone.
Nightly releases
Existing approach:
The nightly release pipeline is triggered nightly by Tekton.
This Pipeline uses:
Setup
To start from scratch and use these Pipelines and Tasks:
- Install Tekton
- Setup the Tasks and Pipelines
- Create the required service account + secrets
- Setup post-processing
Install Tekton
# If this is your first time installing Tekton in the cluster you might need to give yourself permission to do so
kubectl create clusterrolebinding cluster-admin-binding-someusername \
--clusterrole=cluster-admin \
--user=$(gcloud config get-value core/account)
# Example, Tekton v0.9.1
export TEKTON_VERSION=0.9.1
kubectl apply --filename https://storage.googleapis.com/tekton-releases/pipeline/previous/v${TEKTON_VERSION}/release.yaml
Install tasks and pipelines
Add all the Tasks
to the cluster, including the
golang
Tasks from the
tektoncd/catalog
, and the
release Tasks from
tektoncd/plumbing
.
Use a version of the tektoncdcatalog
tasks that is compatible with version of Tekton being released, usually master
.
Install Task from plumbing too:
# Apply the Tasks we are using from the catalog
kubectl apply -f https://raw.githubusercontent.com/tektoncd/catalog/main/task/golang-build/0.3/golang-build.yaml
kubectl apply -f https://raw.githubusercontent.com/tektoncd/catalog/main/task/golang-test/0.2/golang-test.yaml
# Apply Tasks and other resources from Plumbing.
#
# If you want to install everything, including tekton-nightly components,
# run this command from the root of the plumbing repo (this requires
# "tekton-nightly" namespace to already be created in your cluster):
kubectl kustomize ./tekton/resources/release | kubectl apply -f -
# If you don't want the tekton-nightly components then run the following
# command from the root of the plumbing repo:
kubectl kustomize ./tekton/resources/release/overlays/default | kubectl apply -f -
Apply the tasks from the pipeline
repo:
# Apply the Tasks and Pipelines we use from this repo
kubectl apply -f tekton/publish.yaml
kubectl apply -f tekton/release-pipeline.yaml
# Apply the resources - note that when manually releasing you'll re-apply these
kubectl apply -f tekton/resources.yaml
Tasks
and Pipelines
from this repo are:
publish.yaml
- ThisTask
useskaniko
to build and publish base images, and usesko
to build all of the container images we release and generate therelease.yaml
release-pipeline.yaml
- ThisPipeline
uses thegolang
Task
s from thetektoncd/catalog
andpublish.yaml
'sTask
.
Service account and secrets
In order to release, these Pipelines use the release-right-meow
service account,
which uses release-secret
and has
Storage Admin
access to
tekton-releases
and
tekton-releases-nightly
.
After creating these service accounts in GCP, the kubernetes service account and secret were created with:
KEY_FILE=release.json
GENERIC_SECRET=release-secret
ACCOUNT=release-right-meow
# Connected to the `prow` in the `tekton-releases` GCP project
GCP_ACCOUNT="[email protected]"
# 1. Create a private key for the service account
gcloud iam service-accounts keys create $KEY_FILE --iam-account $GCP_ACCOUNT
# 2. Create kubernetes secret, which we will use via a service account and directly mounting
kubectl create secret generic $GENERIC_SECRET --from-file=./$KEY_FILE
# 3. Add the docker secret to the service account
kubectl apply -f tekton/account.yaml
kubectl patch serviceaccount $ACCOUNT \
-p "{\"secrets\": [{\"name\": \"$GENERIC_SECRET\"}]}"
Setup post processing
Post-processing services perform post release automated tasks. Today the only
service available collects the PipelineRun
logs uploads them to the release
bucket. To use release post-processing services, the PipelineResource in
resources.yaml
must be configured with a valid targetURL in the
cloud event PipelineResource
named post-release-trigger
:
apiVersion: tekton.dev/v1alpha1
kind: PipelineResource
metadata:
name: post-release-trigger
spec:
type: cloudEvent
params:
- name: targetURI
value: http://el-pipeline-release-post-processing.default.svc.cluster.local:8080 # This has to be changed to a valid URL
The targetURL should point to the event listener configured in the cluster.
The example above is configured with the correct value for the dogfooding
cluster, using the event listener pipeline-release-post-processing
.
Supporting scripts and images
Some supporting scripts have been written using Python3:
- koparse - Contains logic for parsing
release.yaml
files created byko
ko image
In order to run ko
, and to be able to use a cluster's default credentials, we
need an image which contains:
ko
golang
- Required byko
to buildgcloud
- Required to auth with default namespace credentials
The image which we use for this is built from tekton/ko/Dockerfile.
go-containerregistry#383
is about publishing a ko
image, which hopefully we'll be able to move it.
GitHub Action based approach:
The GitHub Actions workflow provides an alternative approach for automated nightly releases with enhanced CI/CD capabilities and better integration with GitHub infrastructure.
The nightly release workflow is triggered daily and uses:
- release-nightly-pipeline.yaml - Tekton Pipeline for nightly releases
- publish-nightly.yaml - Tekton Task for building and publishing nightly images
Key Features:
Automated Scheduling:
- Runs daily at 03:00 UTC via cron schedule
- Supports manual triggering with customizable parameters
- Intelligent change detection - only releases when there are recent commits (configurable)
Multi-mode Operation:
- Production mode: For
tektoncd/pipeline
repository with full release capabilities - Fork mode: For testing in forks with isolated buckets and registries
Usage:
Scheduled Release: The workflow runs automatically every night and will create a release if:
- There have been commits in the last 25 hours, OR
- Force release is enabled, OR
- It's manually triggered
Manual Release:
# Trigger via GitHub UI or CLI
gh workflow run nightly-release.yaml \
--field kubernetes_version=v1.33.0 \
--field force_release=true \
--field dry_run=false
Fork Testing: For testing in forks, the workflow automatically:
- Uses a test bucket pattern:
gs://tekton-releases-nightly-{repo-owner}
- Publishes to
ghcr.io/{owner}/pipeline/*
instead of production registry - Skips certain production-only validations
Output:
The workflow generates:
- Container images tagged with
vYYYYMMDD-{sha7}
format - Release YAML manifests uploaded to GCS bucket
- Multi-architecture image support
- Comprehensive build logs and artifacts
This approach provides better observability, easier debugging, and more flexible configuration compared to the traditional Tekton-only pipeline approach.