About migrating from CircleCI with GitHub Actions Importer
The instructions below will guide you through configuring your environment to use GitHub Actions Importer to migrate CircleCI pipelines to GitHub Actions.
Prerequisites
- A CircleCI account or organization with projects and pipelines that you want to convert to GitHub Actions workflows.
- Access to create a CircleCI personal API token for your account or organization.
- Um ambiente em que seja possível executar contêineres baseados no Linux e instalar as ferramentas necessárias.
-
O Docker está instalado e em execução.
-
A CLI do GitHub está instalada.
Observação
A CLI e o contêiner do GitHub Actions Importer não precisam ser instalados no mesmo servidor que a plataforma de CI.
-
Limitations
There are some limitations when migrating from CircleCI to GitHub Actions with GitHub Actions Importer:
- Automatic caching in between jobs of different workflows is not supported.
- The
audit
command is only supported when you use a CircleCI organization account. Thedry-run
andmigrate
commands can be used with a CircleCI organization or user account.
Manual tasks
Certain CircleCI constructs must be migrated manually. These include:
- Contexts
- Project-level environment variables
- Unknown job properties
- Unknown orbs
Installing the GitHub Actions Importer CLI extension
-
Instale a extensão da CLI do GitHub Actions Importer:
Bash gh extension install github/gh-actions-importer
gh extension install github/gh-actions-importer
-
Verifique se a extensão foi instalada:
$ gh actions-importer -h Options: -?, -h, --help Show help and usage information Commands: update Update to the latest version of GitHub Actions Importer. version Display the version of GitHub Actions Importer. configure Start an interactive prompt to configure credentials used to authenticate with your CI server(s). audit Plan your CI/CD migration by analyzing your current CI/CD footprint. forecast Forecast GitHub Actions usage from historical pipeline utilization. dry-run Convert a pipeline to a GitHub Actions workflow and output its yaml file. migrate Convert a pipeline to a GitHub Actions workflow and open a pull request with the changes.
Configuring credentials
The configure
CLI command is used to set required credentials and options for GitHub Actions Importer when working with CircleCI and GitHub.
-
Create a GitHub personal access token (classic). For more information, see Gerenciar seus tokens de acesso pessoal.
Your token must have the
workflow
scope.After creating the token, copy it and save it in a safe location for later use.
-
Create a CircleCI personal API token. For more information, see Managing API Tokens in the CircleCI documentation.
After creating the token, copy it and save it in a safe location for later use.
-
In your terminal, run the GitHub Actions Importer
configure
CLI command:gh actions-importer configure
The
configure
command will prompt you for the following information:- For "Which CI providers are you configuring?", use the arrow keys to select
CircleCI
, press Space to select it, then press Enter. - For "Personal access token for GitHub", enter the value of the personal access token (classic) that you created earlier, and press Enter.
- For "Base url of the GitHub instance", press Enter to accept the default value (
https://github.com
). - For "Personal access token for CircleCI", enter the value for the CircleCI personal API token that you created earlier, and press Enter.
- For "Base url of the CircleCI instance", press Enter to accept the default value (
https://circleci.com
). - For "CircleCI organization name", enter the name for your CircleCI organization, and press Enter.
An example of the
configure
command is shown below:$ gh actions-importer configure ✔ Which CI providers are you configuring?: CircleCI Enter the following values (leave empty to omit): ✔ Personal access token for GitHub: *************** ✔ Base url of the GitHub instance: https://github.com ✔ Personal access token for CircleCI: ******************** ✔ Base url of the CircleCI instance: https://circleci.com ✔ CircleCI organization name: mycircleciorganization Environment variables successfully updated.
- For "Which CI providers are you configuring?", use the arrow keys to select
-
In your terminal, run the GitHub Actions Importer
update
CLI command to connect to GitHub Packages Container registry and ensure that the container image is updated to the latest version:gh actions-importer update
The output of the command should be similar to below:
Updating ghcr.io/actions-importer/cli:latest... ghcr.io/actions-importer/cli:latest up-to-date
Perform an audit of CircleCI
You can use the audit
command to get a high-level view of all projects in a CircleCI organization.
The audit
command performs the following steps:
- Fetches all of the projects defined in a CircleCI organization.
- Converts each pipeline to its equivalent GitHub Actions workflow.
- Generates a report that summarizes how complete and complex of a migration is possible with GitHub Actions Importer.
Running the audit command
To perform an audit of a CircleCI organization, run the following command in your terminal:
gh actions-importer audit circle-ci --output-dir tmp/audit
Inspecting the audit results
Os arquivos do diretório de saída especificado contêm os resultados da auditoria. Confira o arquivo audit_summary.md
para ver um resumo dos resultados da auditoria.
O resumo da auditoria contém as seções a seguir.
Pipelines
A seção "Pipelines" contém estatísticas de alto nível sobre a taxa de conversão feita pelo GitHub Actions Importer.
Veja abaixo alguns termos importantes que podem aparecer na seção "Pipelines":
- Os pipelines Bem-sucedidos tiveram 100% dos constructos e itens individuais convertidos automaticamente nos equivalentes do GitHub Actions.
- Os pipelines parcialmente bem-sucedidos tiveram todos os constructos de pipeline convertidos, porém, houve alguns itens individuais que não foram convertidos automaticamente nos GitHub Actions equivalentes.
- Os pipelines Sem suporte são tipos de definição que não têm suporte no GitHub Actions Importer.
- Os pipelines com falha encontraram um erro fatal ao serem convertidos. Isso pode ocorrer por uma das seguintes razões:
- O pipeline foi originalmente configurado de forma incorreta e inválida.
- O GitHub Actions Importer encontrou um erro interno ao convertê-lo.
- Houve uma resposta de rede malsucedida que tornou o pipeline inacessível, o que geralmente ocorre devido a credenciais inválidas.
Etapas de Build
A seção "Etapas de compilação" contém uma visão geral das etapas de compilação individuais usadas em todos os pipelines e indica quantas delas foram convertidas automaticamente pelo GitHub Actions Importer.
Veja abaixo alguns termos importantes que podem aparecer na seção "Etapas de compilação":
- Uma etapa de compilação conhecida foi convertida automaticamente em uma ação equivalente.
- Uma etapa de compilação desconhecida não foi convertida automaticamente em uma ação equivalente.
- Uma etapa de compilação sem suporte é aquela que:
- Fundamentalmente, não tem suporte no GitHub Actions.
- Foi configurada de maneira incompatível com o GitHub Actions.
- Uma ação é uma lista das ações que foram usadas nos fluxos de trabalho convertidos. Isso pode ser importante para:
- Se você usar o GitHub Enterprise Server, reunir a lista de ações a serem sincronizadas com a sua instância.
- Definir uma lista de permissões no nível da organização das ações que são usadas. Essa lista de ações é abrangente e inclui as ações que as equipes de segurança ou conformidade podem precisar analisar.
Tarefas manuais
A seção "Tarefas manuais" contém uma visão geral das tarefas que o GitHub Actions Importer não consegue executar automaticamente e que precisam ser realizadas de maneira manual.
Veja abaixo alguns termos importantes que podem aparecer na seção "Tarefas manuais":
- Um segredo é um repositório ou um segredo no nível da organização que é usado nos pipelines convertidos. Esses segredos devem ser criados manualmente no GitHub Actions para que os pipelines funcionem de maneira correta. Para saber mais, confira Using secrets in GitHub Actions.
- Um executor auto-hospedado refere-se a um rótulo de um executor que é referenciado em um pipeline convertido e que não é hospedado no GitHub. Será necessário definir manualmente esses executores para que os pipelines funcionem de maneira correta.
Arquivos
A seção final do relatório de auditoria fornece um manifesto de todos os arquivos que foram gravados em disco durante a auditoria.
Cada arquivo de pipeline tem uma variedade de arquivos contidos na auditoria, incluindo:
- O pipeline original como foi definido no GitHub.
- Todas as respostas de rede usadas para converter o pipeline.
- O arquivo de fluxo de trabalho convertido.
- Rastreamentos de pilha que podem ser usados para solucionar problemas de uma conversão de pipeline com falha.
Além disso, o arquivo workflow_usage.csv
contém uma lista separada por vírgula de todas as ações, todos os segredos e todos os executores usados pelos pipelines convertidos com sucesso. Isso pode ser útil para determinar quais fluxos de trabalho usam quais ações, segredos ou executores e para executar revisões de segurança.
Forecast potential GitHub Actions usage
You can use the forecast
command to forecast potential GitHub Actions usage by computing metrics from completed pipeline runs in CircleCI.
Running the forecast command
To perform a forecast of potential GitHub Actions usage, run the following command in your terminal. By default, GitHub Actions Importer includes the previous seven days in the forecast report.
gh actions-importer forecast circle-ci --output-dir tmp/forecast_reports
Inspecting the forecast report
The forecast_report.md
file in the specified output directory contains the results of the forecast.
Listed below are some key terms that can appear in the forecast report:
-
The job count is the total number of completed jobs.
-
The pipeline count is the number of unique pipelines used.
-
Execution time describes the amount of time a runner spent on a job. This metric can be used to help plan for the cost of GitHub-hosted runners.
This metric is correlated to how much you should expect to spend in GitHub Actions. This will vary depending on the hardware used for these minutes. You can use the GitHub Actions pricing calculator to estimate the costs.
-
Queue time metrics describe the amount of time a job spent waiting for a runner to be available to execute it.
-
Concurrent jobs metrics describe the amount of jobs running at any given time. This metric can be used to define the number of runners you should configure.
Additionally, these metrics are defined for each queue of runners in CircleCI. This is especially useful if there is a mix of hosted or self-hosted runners, or high or low spec machines, so you can see metrics specific to different types of runners.
Perform a dry-run migration of a CircleCI pipeline
You can use the dry-run
command to convert a CircleCI pipeline to an equivalent GitHub Actions workflow. A dry-run creates the output files in a specified directory, but does not open a pull request to migrate the pipeline.
To perform a dry run of migrating your CircleCI project to GitHub Actions, run the following command in your terminal, replacing my-circle-ci-project
with the name of your CircleCI project.
gh actions-importer dry-run circle-ci --output-dir tmp/dry-run --circle-ci-project my-circle-ci-project
You can view the logs of the dry run and the converted workflow files in the specified output directory.
No caso de qualquer item que o GitHub Actions Importer não tenha conseguido converter automaticamente, como etapas de build desconhecidas ou um pipeline parcialmente bem-sucedido, o ideal é criar transformadores personalizados para personalizar ainda mais o processo de conversão. Para saber mais, confira Extending GitHub Actions Importer with custom transformers.
Perform a production migration of a CircleCI pipeline
You can use the migrate
command to convert a CircleCI pipeline and open a pull request with the equivalent GitHub Actions workflow.
Running the migrate command
To migrate a CircleCI pipeline to GitHub Actions, run the following command in your terminal, replacing the target-url
value with the URL for your GitHub repository, and my-circle-ci-project
with the name of your CircleCI project.
gh actions-importer migrate circle-ci --target-url https://github.com/octo-org/octo-repo --output-dir tmp/migrate --circle-ci-project my-circle-ci-project
The command's output includes the URL to the pull request that adds the converted workflow to your repository. An example of a successful output is similar to the following:
$ gh actions-importer migrate circle-ci --target-url https://github.com/octo-org/octo-repo --output-dir tmp/migrate --circle-ci-project my-circle-ci-project
[2022-08-20 22:08:20] Logs: 'tmp/migrate/log/actions-importer-20220916-014033.log'
[2022-08-20 22:08:20] Pull request: 'https://github.com/octo-org/octo-repo/pull/1'
Como inspecionar a solicitação de pull
A saída de uma execução bem-sucedida do comando migrate
contém um link para a nova solicitação de pull que adiciona o fluxo de trabalho convertido ao seu repositório.
Alguns elementos importantes da solicitação de pull incluem:
- Na descrição da solicitação de pull, uma seção chamada Etapas manuais, que lista as etapas que você precisa concluir manualmente para concluir a migração dos pipelines para o GitHub Actions. Por exemplo, esta seção pode solicitar a criação dos segredos usados nos fluxos de trabalho.
- O arquivo de fluxos de trabalho convertido. Selecione a guia Files changed na pull request para ver o arquivo de fluxo de trabalho que será adicionado ao repositório do GitHub.
Quando terminar de inspecionar a pull request, você poderá mesclá-la para adicionar o fluxo de trabalho ao repositório do GitHub.
Reference
This section contains reference information on environment variables, optional arguments, and supported syntax when using GitHub Actions Importer to migrate from CircleCI.
Using environment variables
O GitHub Actions Importer usa variáveis de ambiente para a configuração de autenticação. Essas variáveis são definidas durante o processo de configuração com o comando configure
. Para obter mais informações, confira a seção Como configurar as credenciais.
GitHub Actions Importer uses the following environment variables to connect to your CircleCI instance:
GITHUB_ACCESS_TOKEN
: The personal access token (classic) used to create pull requests with a converted workflow (requiresrepo
andworkflow
scopes).GITHUB_INSTANCE_URL
: The URL to the target GitHub instance (for example,https://github.com
).CIRCLE_CI_ACCESS_TOKEN
: The CircleCI personal API token used to authenticate with your CircleCI instance.CIRCLE_CI_INSTANCE_URL
: The URL to the CircleCI instance (for example,https://circleci.com
). If the variable is left unset,https://circleci.com
is used as the default value.CIRCLE_CI_ORGANIZATION
: The organization name of your CircleCI instance.CIRCLE_CI_PROVIDER
: The location where your pipeline's source file is stored (such asgithub
). Currently, only GitHub is supported.CIRCLE_CI_SOURCE_GITHUB_ACCESS_TOKEN
(Optional): The personal access token (classic) used to authenticate with your source GitHub instance (requiresrepo
scope). If not provided, the value ofGITHUB_ACCESS_TOKEN
is used instead.CIRCLE_CI_SOURCE_GITHUB_INSTANCE_URL
(Optional): The URL to the source GitHub instance. If not provided, the value ofGITHUB_INSTANCE_URL
is used instead.
These environment variables can be specified in a .env.local
file that is loaded by GitHub Actions Importer when it is run.
Optional arguments
Há argumentos opcionais que você pode usar com os subcomandos do GitHub Actions Importer para personalizar sua migração.
--source-file-path
You can use the --source-file-path
argument with the forecast
, dry-run
, or migrate
subcommands.
By default, GitHub Actions Importer fetches pipeline contents from source control. The --source-file-path
argument tells GitHub Actions Importer to use the specified source file path instead.
For example:
gh actions-importer dry-run circle-ci --output-dir ./output/ --source-file-path ./path/to/.circleci/config.yml
If you would like to supply multiple source files when running the forecast
subcommand, you can use pattern matching in the file path value. For example, gh forecast --source-file-path ./tmp/previous_forecast/jobs/*.json
supplies GitHub Actions Importer with any source files that match the ./tmp/previous_forecast/jobs/*.json
file path.
--config-file-path
You can use the --config-file-path
argument with the audit
, dry-run
, and migrate
subcommands.
By default, GitHub Actions Importer fetches pipeline contents from source control. The --config-file-path
argument tells GitHub Actions Importer to use the specified source files instead.
The --config-file-path
argument can also be used to specify which repository a converted composite action should be migrated to.
Audit example
In this example, GitHub Actions Importer uses the specified YAML configuration file to perform an audit.
gh actions-importer audit circle-ci --output-dir ./output/ --config-file-path ./path/to/circle-ci/config.yml
To audit a CircleCI instance using a config file, the config file must be in the following format, and each repository_slug
must be unique:
source_files:
- repository_slug: circle-org-name/circle-project-name
path: path/to/.circleci/config.yml
- repository_slug: circle-org-name/some-other-circle-project-name
path: path/to/.circleci/config.yml
Dry run example
In this example, GitHub Actions Importer uses the specified YAML configuration file as the source file to perform a dry run.
The pipeline is selected by matching the repository_slug
in the config file to the value of the --circle-ci-organization
and --circle-ci-project
options. The path
is then used to pull the specified source file.
gh actions-importer dry-run circle-ci --circle-ci-project circle-org-name/circle-project-name --output-dir ./output/ --config-file-path ./path/to/circle-ci/config.yml
Specify the repository of converted composite actions
GitHub Actions Importer uses the YAML file provided to the --config-file-path
argument to determine the repository that converted composite actions are migrated to.
To begin, you should run an audit without the --config-file-path
argument:
gh actions-importer audit circle-ci --output-dir ./output/
The output of this command will contain a file named config.yml
that contains a list of all the composite actions that were converted by GitHub Actions Importer. For example, the config.yml
file may have the following contents:
composite_actions:
- name: my-composite-action.yml
target_url: https://github.com/octo-org/octo-repo
ref: main
You can use this file to specify which repository and ref a reusable workflow or composite action should be added to. You can then use the --config-file-path
argument to provide the config.yml
file to GitHub Actions Importer. For example, you can use this file when running a migrate
command to open a pull request for each unique repository defined in the config file:
gh actions-importer migrate circle-ci --circle-ci-project my-project-name --output-dir output/ --config-file-path config.yml --target-url https://github.com/my-org/my-repo
--include-from
You can use the --include-from
argument with the audit
subcommand.
The --include-from
argument specifies a file that contains a line-delimited list of repositories to include in the audit of a CircleCI organization. Any repositories that are not included in the file are excluded from the audit.
For example:
gh actions-importer audit circle-ci --output-dir ./output/ --include-from repositories.txt
The file supplied for this parameter must be a line-delimited list of repositories, for example:
repository_one
repository_two
repository_three
Supported syntax for CircleCI pipelines
The following table shows the type of properties that GitHub Actions Importer is currently able to convert.
CircleCI Pipelines | GitHub Actions | Status |
---|---|---|
cron triggers |
| Supported |
environment |
| Supported |
executors |
| Supported |
jobs |
| Supported |
job |
| Supported |
matrix |
| Supported |
parameters |
| Supported |
steps |
| Supported |
when, unless |
| Supported |
triggers |
| Supported |
executors |
| Partially Supported |
orbs |
| Partially Supported |
executors |
| Unsupported |
setup | Not applicable | Unsupported |
version | Not applicable | Unsupported |
For more information about supported CircleCI concept and orb mappings, see the github/gh-actions-importer
repository.
Environment variable mapping
GitHub Actions Importer uses the mapping in the table below to convert default CircleCI environment variables to the closest equivalent in GitHub Actions.
CircleCI | GitHub Actions |
---|---|
CI | $CI |
CIRCLE_BRANCH | ${{ github.ref }} |
CIRCLE_JOB | ${{ github.job }} |
CIRCLE_PR_NUMBER | ${{ github.event.number }} |
CIRCLE_PR_REPONAME | ${{ github.repository }} |
CIRCLE_PROJECT_REPONAME | ${{ github.repository }} |
CIRCLE_SHA1 | ${{ github.sha }} |
CIRCLE_TAG | ${{ github.ref }} |
CIRCLE_USERNAME | ${{ github.actor }} |
CIRCLE_WORKFLOW_ID | ${{ github.run_number }} |
CIRCLE_WORKING_DIRECTORY | ${{ github.workspace }} |
<< pipeline.id >> | ${{ github.workflow }} |
<< pipeline.number >> | ${{ github.run_number }} |
<< pipeline.project.git_url >> | $GITHUB_SERVER_URL/$GITHUB_REPOSITORY |
<< pipeline.project.type >> | github |
<< pipeline.git.tag >> | ${{ github.ref }} |
<< pipeline.git.branch >> | ${{ github.ref }} |
<< pipeline.git.revision >> | ${{ github.event.pull_request.head.sha }} |
<< pipeline.git.base_revision >> | ${{ github.event.pull_request.base.sha }} |
Legal notice
Partes foram adaptadas do https://github.com/github/gh-actions-importer/ de acordo com a licença MIT:
MIT License
Copyright (c) 2022 GitHub
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.