Pulumi CI/CD & GitLab
GitLab CI/CD enables the management of deploying staging and production stacks based on commits to specific Git branches. This is sometimes referred to as Push-to-Deploy.
Using GitLab with Pulumi is a great way to combine software development and infrastructure as code (IaC) best practices. Pulumi is built with CI/CD integration in mind because:
- It doesn’t require any particular arrangement of stacks or workflow to work in CI/CD processes.
- It can be run from anywhere and your infrastructure code can be hosted anywhere.
The examples provided in this guide were created under the context of a Pulumi TypeScript project with the project code hosted in a GitLab repository, but the steps described below can be altered to fit into any existing type of deployment setup.
Prerequisites
- Sign up for a Pulumi account.
- Create a Pulumi Access Token.
- Install the latest Pulumi CLI.
- Create a blank GitLab project without a README.
- Create a new Pulumi project and initialize it as a git repository
- Set the remote URL of the Pulumi project to be your GitLab project.
- Ex:
git remote add origin <your-gitlab-repo-url>
- Ex:
Environment Variables
To use Pulumi within GitLab CI, there are a few environment variables you’ll need to set for each build.
The first is PULUMI_ACCESS_TOKEN
, which is required to authenticate with pulumi.com
in order to
perform the preview or update.
Next, you will also need to set environment variables specific to your cloud resource provider.
For example, if your stack is managing resources on AWS, you will need to set AWS_ACCESS_KEY_ID
and
AWS_SECRET_ACCESS_KEY
.
Protected Branches
In order to prevent abuse of protected resources as well as other sensitive information used by your repository, GitLab has the concept of Protected Branches and Tags.
Your GitLab repository’s main
or master
branch is the only branch that is created as a protected branch by default. If you are running Pulumi CLI commands from any branch other than the main | master
branch,
you are likely to run into a login error. This is due to the PULUMI_ACCESS_TOKEN
environment variable only being accessible by protected branches and tags.
You can fix this by configuring branch protection using wildcard rules. Doing this will allow any branches with names that match this rule the ability to access the secret environment variables.
Merge Request Builds
GitLab has the ability to restrict jobs to run only on merge requests. This is done by adding the following configuration to your GitLab pipeline config file:
only:
- merge_requests
The example script provided below will demonstrate how to use this configuration to run the pulumi preview
command only in merge request pipelines.
Sample Scripts
In GitLab, a CI/CD pipeline is defined in a yaml file labeled .gitlab-ci.yml
. This file must exist
in the root of your repository as GitLab looks there by default.
If you are storing this file in an alternate location, be sure to reflect this location in the CI/CD settings of your GitLab project by going to https://gitlab.com > (select your project) > Settings > CI/CD and updating the value of “CI/CD configuration file” under the “General pipelines” section.
The following are samples only. You may choose to structure your configuration any way you like.
The pulumi-preview.sh
script (not shown here) is similar to the run-pulumi.sh
script, except that
it runs the pulumi preview
command instead of the pulumi up --yes
command. The preview command performs a dry-run
of your project deployment and only shows you changes (if any) in your infrastructure.
.gitlab-ci.yml
#
# This sample yaml configuration file contains two stages and three jobs.
# This configuration uses GitLab's `only`, `when`, and `except` configuration
# options to create a pipeline that will create the `pulumi-preview` job in the pipeline,
# for all branches except the master.
# Only for master branch merges, the main `pulumi` job is executed automatically.
stages:
- build
- infrastructure-update
# Each stage may require multiple jobs to complete that stage.
# Consider a build stage, which may require building the UI, service, and a CLI.
# All 3 individual build jobs can be attributed to the build _stage_.
complex_build_job:
stage: build
script:
- echo "pulumi rocks!"
pulumi:
stage: infrastructure-update
before_script:
- chmod +x ./scripts/*.sh
- ./scripts/setup.sh
script:
- ./scripts/run-pulumi.sh
# Create an artifact archive with just the pulumi log file,
# which is created using console-redirection in run-pulumi.sh.
artifacts:
paths:
- pulumi-log.txt
# This is just a sample of how artifacts can be expired (removed) automatically in GitLab.
# You may choose to not set this at all based on your organization's or team's preference.
expire_in: 1 week
# This job should only be created if the pipeline is created for the master (or main) branch.
only:
- master # or main
pulumi-preview:
stage: infrastructure-update
before_script:
- chmod +x ./scripts/*.sh
- ./scripts/setup.sh
script:
- ./scripts/pulumi-preview.sh
only:
- merge_requests
setup.sh
The setup.sh
installs the pulumi
CLI on the GitLab CI Runner, and other tools.
It also installs yarn
and nodejs
since that’s the runtime for this sample project.
#!/bin/bash
# exit if a command returns a non-zero exit code and also print the commands and their args as they are executed
set -e -x
# Download and install required tools.
# pulumi
curl -fsSL https://get.pulumi.com/ | bash
export PATH=$PATH:$HOME/.pulumi/bin
# Login into pulumi. This will require the PULUMI_ACCESS_TOKEN environment variable
pulumi login
# update the GitLab Runner's packages
apt-get update -y
apt-get install sudo ca-certificates curl gnupg -y
# nodejs
mkdir -p /etc/apt/keyrings
curl -fsSL https://deb.nodesource.com/gpgkey/nodesource-repo.gpg.key | sudo gpg --dearmor -o /etc/apt/keyrings/nodesource.gpg
NODE_MAJOR=20
echo "deb [signed-by=/etc/apt/keyrings/nodesource.gpg] https://deb.nodesource.com/node_$NODE_MAJOR.x nodistro main" | sudo tee /etc/apt/sources.list.d/nodesource.list
apt-get update -y
apt-get install -y nodejs
# yarn
npm i -g yarn
run-pulumi.sh
The run-pulumi.sh
script runs the pulumi up
command to apply any stack changes and to start
updating your infrastructure.
#!/bin/bash
# exit if a command returns a non-zero exit code and also print the commands and their args as they are executed
set -e -x
# Add the pulumi CLI to the PATH
export PATH=$PATH:$HOME/.pulumi/bin
yarn install
pulumi stack select product-catalog-service
# The following is just a sample config setting that the hypothetical pulumi
# program needs.
# Learn more about pulumi configuration at: https://www.pulumi.com/docs/concepts/config/
pulumi config set mysetting myvalue
pulumi up --yes # this line will be the pulumi preview command in pulumi-preview.sh
Enhance Merge Requests With Pulumi
Pulumi now supports enhancing your merge requests with insights into changes to your infrastructure. Never miss another unintended change with the infrastructure change summary shown inline with the rest of your merge request notes. Learn how to configure the integration with Pulumi.
Thank you for your feedback!
If you have a question about how to use Pulumi, reach out in Community Slack.
Open an issue on GitHub to report a problem or suggest an improvement.