DEV Community

Cover image for Article 3: Docker + GitHub Actions
Woulf
Woulf

Posted on • Edited on

Article 3: Docker + GitHub Actions

Automating the Docker build of my portfolio with GitHub Actions, publishing to Docker Hub, and seamless redeployment on Kubernetes.

Automating the build and push of a Node.js app

In this third step, I tackle the containerization of my Next.js application (personal portfolio), and the creation of a CI/CD pipeline to automate the Docker image build, its push to Docker Hub, and the automatic redeployment to Kubernetes.


CI/CD: Building the Docker image

The goal is to:

  • Produce a lightweight, optimized Docker image
  • Automatically publish it to Docker Hub
  • Restart the deployment on the cluster with zero downtime

Everything is defined in a GitHub Actions pipeline located in the application repository, under .github/workflows/deploy.yml.


Building the Docker image

Here is the Dockerfile used:

# Step 1: Base image for build and run
FROM node:23-alpine AS base
WORKDIR /app
ENV NEXT_TELEMETRY_DISABLED=1

# Step 2: Install dependencies
FROM base AS deps
COPY package.json package-lock.json ./
RUN npm ci

# Step 3: Build and fetch Dev.to articles securely
FROM base AS builder
COPY --from=deps /app/node_modules ./node_modules
COPY . .

ENV NEXT_PUBLIC_URL=https://woulf.fr
ENV NEXT_PUBLIC_EMAIL=corentinboucardpro@gmail.com

# Secure token injection via BuildKit
RUN --mount=type=secret,id=devto_token \\
  DEVTO_API_KEY=\$(cat /run/secrets/devto_token) node scripts/fetchDevtoArticles.js && npm run build

# Step 4: Final runtime image
FROM base AS runner
ENV NODE_ENV=production
ENV PORT=3000

# Create non-root user
RUN addgroup -S nodejs -g 1001 && \\
    adduser -S nextjs -u 1001 -G nodejs && \\
    mkdir .next && chown nextjs:nodejs .next

WORKDIR /app

COPY --from=builder /app/public ./public
COPY --from=builder --chown=nextjs:nodejs /app/.next/standalone ./
COPY --from=builder --chown=nextjs:nodejs /app/.next/static ./.next/static

USER nextjs
EXPOSE 3000
CMD ["node", "server.js"]
Enter fullscreen mode Exit fullscreen mode

🧠 Notes on the Dockerfile:

  • Multi-stage build: separates base, dependencies, build, and runtime phases results in a clean and minimal image.
  • Alpine base (node:23-alpine): lightweight, fast to pull, smaller attack surface (more secure).
  • Copying package*.json first: leverages Docker cache when dependencies don’t change → drastically speeds up builds.
  • Using npm ci: ensures a clean install based on package-lock.json without re-resolving versions.
  • Secure token injection via BuildKit: avoids exposing secrets in the image or logs. Token is available only during the build.
  • Dev.to article fetching during build: keeps content updated without committing it to the repo.
  • Non-root user (nextjs): improves runtime security.
  • Copying only required folders (.next/standalone, .next/static): recommended by Next.js for Docker deployments.
  • EXPOSE 3000: informative for docs and some tools.

🔐 Result: a lightweight, secure, fast-to-build Docker image ready for production.


Pipeline in the application repository

The deploy.yml pipeline contains two jobs:

  1. Build & push the image
  2. Redeploy to the Kubernetes cluster
name: Deploy Website

on:
  push:
    branches:
      - main

jobs:
  docker:
    runs-on: ubuntu-latest
    steps:
      - name: Checkout repository
        uses: actions/checkout@v4

      - name: Set up QEMU
        uses: docker/setup-qemu-action@v3

      - name: Set up Docker Buildx
        uses: docker/setup-buildx-action@v3

      - name: Login to Docker Hub
        uses: docker/login-action@v3
        with:
          username: \${{ secrets.DOCKER_USERNAME }}
          password: \${{ secrets.DOCKER_PASSWORD }}

      - name: Build and push
        uses: docker/build-push-action@v5
        with:
          context: .
          push: true
          tags: woulf/portfolio:latest
          secrets: |
            "devto_token=\${{ secrets.DEVTO_TOKEN }}"

  rollout_k8s:
    runs-on: ubuntu-latest
    needs: docker
    steps:
      - name: Set up Kubernetes context
        uses: azure/k8s-set-context@v3
        with:
          kubeconfig: \${{ secrets.KUBECONFIG }}

      - name: Restart Deployment
        run: |
          kubectl rollout restart deployment/portfolio -n default
          kubectl rollout status deployment/portfolio -n default
Enter fullscreen mode Exit fullscreen mode

🧠 Notes on the pipeline:

  • Auto-trigger on push to main: deploys automatically on merge, great for rolling releases.
  • Modular workflow: two isolated jobs (docker, rollout_k8s) for clarity and maintainability.
  • Official Docker action with BuildKit: handles cache, secrets, multi-platform builds.
  • Secrets via secrets.*: no credentials in code, tokens injected at build time only.
  • --mount=type=secret: ensures temporary use of secrets without exposing them in the final image.
  • Pushes to Docker Hub (woulf/portfolio:latest): versioned and publicly accessible.
  • Kubernetes redeploy with zero downtime: kubectl rollout restart updates the pod smoothly.
  • Deployment status check: prevents continuing if deployment fails.
  • needs: docker: guarantees the image is pushed before attempting redeploy.

🔄 Result: a robust, fully automated CI/CD pipeline that updates content, rebuilds your Docker image, and redeploys to Kubernetes, all from a single push.


Secret management

No credentials are hardcoded. Everything is securely stored via GitHub Secrets:

  • DOCKER_USERNAME / DOCKER_PASSWORD → for Docker Hub
  • KUBECONFIG → to connect to the MicroK8s cluster remotely
  • DEVTO_TOKEN → to fetch Dev.to articles automatically during build

Result

✅ On every push:

  • Dev.to articles are fetched
  • Docker image is rebuilt and pushed
  • App is redeployed with no interruption

💡 Next steps:

  • Add Trivy scan
  • Add a HEALTHCHECK
  • Reduce production dependencies

➡️ In the next article, I’ll explain how I versioned the Kubernetes infrastructure in a separate repository and set up a GitOps pipeline to keep the cluster in sync.

Top comments (0)