Automating the Docker build of my portfolio with GitHub Actions, publishing to Docker Hub, and seamless redeployment on Kubernetes.
Automating the build and push of a Node.js app
In this third step, I tackle the containerization of my Next.js application (personal portfolio), and the creation of a CI/CD pipeline to automate the Docker image build, its push to Docker Hub, and the automatic redeployment to Kubernetes.
CI/CD: Building the Docker image
The goal is to:
- Produce a lightweight, optimized Docker image
- Automatically publish it to Docker Hub
- Restart the deployment on the cluster with zero downtime
Everything is defined in a GitHub Actions pipeline located in the application repository, under .github/workflows/deploy.yml
.
Building the Docker image
Here is the Dockerfile
used:
# Step 1: Base image for build and run
FROM node:23-alpine AS base
WORKDIR /app
ENV NEXT_TELEMETRY_DISABLED=1
# Step 2: Install dependencies
FROM base AS deps
COPY package.json package-lock.json ./
RUN npm ci
# Step 3: Build and fetch Dev.to articles securely
FROM base AS builder
COPY --from=deps /app/node_modules ./node_modules
COPY . .
ENV NEXT_PUBLIC_URL=https://woulf.fr
ENV NEXT_PUBLIC_EMAIL=corentinboucardpro@gmail.com
# Secure token injection via BuildKit
RUN --mount=type=secret,id=devto_token \\
DEVTO_API_KEY=\$(cat /run/secrets/devto_token) node scripts/fetchDevtoArticles.js && npm run build
# Step 4: Final runtime image
FROM base AS runner
ENV NODE_ENV=production
ENV PORT=3000
# Create non-root user
RUN addgroup -S nodejs -g 1001 && \\
adduser -S nextjs -u 1001 -G nodejs && \\
mkdir .next && chown nextjs:nodejs .next
WORKDIR /app
COPY --from=builder /app/public ./public
COPY --from=builder --chown=nextjs:nodejs /app/.next/standalone ./
COPY --from=builder --chown=nextjs:nodejs /app/.next/static ./.next/static
USER nextjs
EXPOSE 3000
CMD ["node", "server.js"]
🧠 Notes on the Dockerfile:
- Multi-stage build: separates base, dependencies, build, and runtime phases results in a clean and minimal image.
- Alpine base (node:23-alpine): lightweight, fast to pull, smaller attack surface (more secure).
-
Copying
package*.json
first: leverages Docker cache when dependencies don’t change → drastically speeds up builds. -
Using
npm ci
: ensures a clean install based onpackage-lock.json
without re-resolving versions. - Secure token injection via BuildKit: avoids exposing secrets in the image or logs. Token is available only during the build.
- Dev.to article fetching during build: keeps content updated without committing it to the repo.
-
Non-root user (
nextjs
): improves runtime security. -
Copying only required folders (
.next/standalone
,.next/static
): recommended by Next.js for Docker deployments. -
EXPOSE 3000
: informative for docs and some tools.
🔐 Result: a lightweight, secure, fast-to-build Docker image ready for production.
Pipeline in the application repository
The deploy.yml
pipeline contains two jobs:
- Build & push the image
- Redeploy to the Kubernetes cluster
name: Deploy Website
on:
push:
branches:
- main
jobs:
docker:
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@v4
- name: Set up QEMU
uses: docker/setup-qemu-action@v3
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Login to Docker Hub
uses: docker/login-action@v3
with:
username: \${{ secrets.DOCKER_USERNAME }}
password: \${{ secrets.DOCKER_PASSWORD }}
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
tags: woulf/portfolio:latest
secrets: |
"devto_token=\${{ secrets.DEVTO_TOKEN }}"
rollout_k8s:
runs-on: ubuntu-latest
needs: docker
steps:
- name: Set up Kubernetes context
uses: azure/k8s-set-context@v3
with:
kubeconfig: \${{ secrets.KUBECONFIG }}
- name: Restart Deployment
run: |
kubectl rollout restart deployment/portfolio -n default
kubectl rollout status deployment/portfolio -n default
🧠 Notes on the pipeline:
-
Auto-trigger on
push
tomain
: deploys automatically on merge, great for rolling releases. -
Modular workflow: two isolated jobs (
docker
,rollout_k8s
) for clarity and maintainability. - Official Docker action with BuildKit: handles cache, secrets, multi-platform builds.
-
Secrets via
secrets.*
: no credentials in code, tokens injected at build time only. -
--mount=type=secret
: ensures temporary use of secrets without exposing them in the final image. -
Pushes to Docker Hub (
woulf/portfolio:latest
): versioned and publicly accessible. -
Kubernetes redeploy with zero downtime:
kubectl rollout restart
updates the pod smoothly. - Deployment status check: prevents continuing if deployment fails.
-
needs: docker
: guarantees the image is pushed before attempting redeploy.
🔄 Result: a robust, fully automated CI/CD pipeline that updates content, rebuilds your Docker image, and redeploys to Kubernetes, all from a single push.
Secret management
No credentials are hardcoded. Everything is securely stored via GitHub Secrets:
-
DOCKER_USERNAME
/DOCKER_PASSWORD
→ for Docker Hub -
KUBECONFIG
→ to connect to the MicroK8s cluster remotely -
DEVTO_TOKEN
→ to fetch Dev.to articles automatically during build
Result
✅ On every push:
- Dev.to articles are fetched
- Docker image is rebuilt and pushed
- App is redeployed with no interruption
💡 Next steps:
- Add Trivy scan
- Add a
HEALTHCHECK
- Reduce production dependencies
➡️ In the next article, I’ll explain how I versioned the Kubernetes infrastructure in a separate repository and set up a GitOps pipeline to keep the cluster in sync.
Top comments (0)