About migrating from Bamboo with GitHub Actions Importer
The instructions below will guide you through configuring your environment to use GitHub Actions Importer to migrate Bamboo pipelines to GitHub Actions.
Prerequisites
- A Bamboo account or organization with projects and pipelines that you want to convert to GitHub Actions workflows.
- Bamboo version of 7.1.1 or greater.
- Access to create a Bamboo personal access token for your account or organization.
- Un entorno en el que puedas ejecutar contenedores basados en Linux e instalar las herramientas necesarias.
-
Docker está instalado y funcionando.
-
La CLI de GitHub está instalada.
Nota:
El contenedor y la CLI de GitHub Actions Importer no deben estar instalados en el mismo servidor que tu plataforma de CI.
-
Limitations
There are some limitations when migrating from Bamboo to GitHub Actions with GitHub Actions Importer:
- GitHub Actions Importer relies on the YAML specification generated by the Bamboo Server to perform migrations. When Bamboo does not support exporting something to YAML, the missing information is not migrated.
- Trigger conditions are unsupported. When GitHub Actions Importer encounters a trigger with a condition, the condition is surfaced as a comment and the trigger is transformed without it.
- Bamboo Plans with customized settings for storing artifacts are not transformed. Instead, artifacts are stored and retrieved using the
upload-artifact
anddownload-artifact
actions. - Disabled plans must be disabled manually in the GitHub UI. For more information, see Deshabilitación y habilitación de un flujo de trabajo.
- Disabled jobs are transformed with a
if: false
condition which prevents it from running. You must remove this to re-enable the job. - Disabled tasks are not transformed because they are not included in the exported plan when using the Bamboo API.
- Bamboo provides options to clean up build workspaces after a build is complete. These are not transformed because it is assumed GitHub-hosted runners or ephemeral self-hosted runners will automatically handle this.
- The hanging build detection options are not transformed because there is no equivalent in GitHub Actions. The closest option is
timeout-minutes
on a job, which can be used to set the maximum number of minutes to let a job run. For more information, see Sintaxis del flujo de trabajo para GitHub Actions. - Pattern match labeling is not transformed because there is no equivalent in GitHub Actions.
- All artifacts are transformed into an
actions/upload-artifact
, regardless of whether they areshared
or not, so they can be downloaded from any job in the workflow. - Permissions are not transformed because there is no suitable equivalent in GitHub Actions.
- If the Bamboo version is between 7.1.1 and 8.1.1, project and plan variables will not be migrated.
Manual tasks
Certain Bamboo constructs must be migrated manually. These include:
- Masked variables
- Artifact expiry settings
Installing the GitHub Actions Importer CLI extension
-
Instala la extensión de la CLI del GitHub Actions Importer:
Bash gh extension install github/gh-actions-importer
gh extension install github/gh-actions-importer
-
Comprueba que la extensión está instalada:
$ gh actions-importer -h Options: -?, -h, --help Show help and usage information Commands: update Update to the latest version of GitHub Actions Importer. version Display the version of GitHub Actions Importer. configure Start an interactive prompt to configure credentials used to authenticate with your CI server(s). audit Plan your CI/CD migration by analyzing your current CI/CD footprint. forecast Forecast GitHub Actions usage from historical pipeline utilization. dry-run Convert a pipeline to a GitHub Actions workflow and output its yaml file. migrate Convert a pipeline to a GitHub Actions workflow and open a pull request with the changes.
Configuring credentials
The configure
CLI command is used to set required credentials and options for GitHub Actions Importer when working with Bamboo and GitHub.
-
Create a GitHub personal access token (classic). For more information, see Administración de tokens de acceso personal.
Your token must have the
workflow
scope.After creating the token, copy it and save it in a safe location for later use.
-
Create a Bamboo personal access token. For more information, see Personal Access Tokens in the Bamboo documentation.
Your token must have the following permissions, depending on which resources will be transformed.
Resource Type View View Configuration Edit Build Plan Deployment Project Deployment Environment After creating the token, copy it and save it in a safe location for later use.
-
In your terminal, run the GitHub Actions Importer
configure
CLI command:gh actions-importer configure
The
configure
command will prompt you for the following information:- For "Which CI providers are you configuring?", use the arrow keys to select
Bamboo
, press Space to select it, then press Enter. - For "Personal access token for GitHub", enter the value of the personal access token (classic) that you created earlier, and press Enter.
- For "Base url of the GitHub instance", press Enter to accept the default value (
https://github.com
). - For "Personal access token for Bamboo", enter the value for the Bamboo personal access token that you created earlier, and press Enter.
- For "Base url of the Bamboo instance", enter the URL for your Bamboo Server or Bamboo Data Center instance, and press Enter.
An example of the
configure
command is shown below:$ gh actions-importer configure ✔ Which CI providers are you configuring?: Bamboo Enter the following values (leave empty to omit): ✔ Personal access token for GitHub: *************** ✔ Base url of the GitHub instance: https://github.com ✔ Personal access token for Bamboo: ******************** ✔ Base url of the Bamboo instance: https://bamboo.example.com Environment variables successfully updated.
- For "Which CI providers are you configuring?", use the arrow keys to select
-
In your terminal, run the GitHub Actions Importer
update
CLI command to connect to GitHub Packages Container registry and ensure that the container image is updated to the latest version:gh actions-importer update
The output of the command should be similar to below:
Updating ghcr.io/actions-importer/cli:latest... ghcr.io/actions-importer/cli:latest up-to-date
Perform an audit of Bamboo
You can use the audit
command to get a high-level view of all projects in a Bamboo organization.
The audit
command performs the following steps:
- Fetches all of the projects defined in a Bamboo organization.
- Converts each pipeline to its equivalent GitHub Actions workflow.
- Generates a report that summarizes how complete and complex of a migration is possible with GitHub Actions Importer.
Running the audit command
To perform an audit of a Bamboo instance, run the following command in your terminal:
gh actions-importer audit bamboo --output-dir tmp/audit
Inspecting the audit results
Los archivos del directorio de salida especificado contienen los resultados de la auditoría. Consulta el archivo audit_summary.md
para obtener un resumen de los resultados de la auditoría.
El resumen de la auditoría tiene las secciones siguientes.
Pipelines
La sección "Canalizaciones" contiene estadísticas de alto nivel con respecto a la tasa de conversión realizada por GitHub Actions Importer.
A continuación se incluyen algunos términos clave que pueden aparecer en la sección "Canalizaciones":
- En las canalizaciones correctas, el 100 % de las construcciones de canalización y los elementos individuales se convirtieron automáticamente en sus GitHub Actions equivalentes.
- En las canalizaciones parcialmente correctas, se convirtieron todas sus construcciones de canalización, pero algunos elementos individuales no se convirtieron automáticamente en sus GitHub Actions equivalentes.
- Las canalizaciones no admitidas son tipos de definición que no son compatibles con GitHub Actions Importer.
- En las canalizaciones con error, se produjo un error grave al realizar la conversión. Esto puede deberse a uno de los siguientes motivos:
- La canalización se configuró mal originalmente y no es válida.
- GitHub Actions Importer encontró un error interno al convertirla.
- Se produjo una respuesta de red incorrecta que hizo que la canalización fuera inaccesible, lo que a menudo se debe a credenciales no válidas.
Pasos de compilación
La sección "Pasos de compilación" contiene información general sobre los pasos de compilación individuales que se usan en todas las canalizaciones y cuántos se han convertido automáticamente mediante GitHub Actions Importer.
A continuación se incluyen algunos términos clave que pueden aparecer en la sección "Pasos de compilación":
- Un paso de compilación conocido es un paso que se ha convertido automáticamente en una acción equivalente.
- Un paso de compilación desconocido es un paso que no se ha convertido automáticamente en una acción equivalente.
- Un paso de compilación no admitido es un paso que:
- Esencialmente, no es compatible con GitHub Actions.
- Se ha configurado de una manera que es incompatible con GitHub Actions.
- Una acción es una lista de las acciones que se han usado en los flujos de trabajo convertidos. Esto puede ser importante por las siguientes razones:
- Si usas GitHub Enterprise Server, recopilar la lista de acciones que se deben sincronizar con la instancia.
- Definir una lista de permitidos de nivel de organización de las acciones que se usan. Esta lista de acciones es una lista completa de las acciones que puede que los equipos de seguridad o cumplimiento deban revisar.
Tareas manuales
La sección "Tareas manuales" contiene información general sobre las tareas que GitHub Actions Importer no puede completar automáticamente y que debes completar manualmente.
A continuación se incluyen algunos términos clave que pueden aparecer en la sección "Tareas manuales":
- Un secreto es un secreto de nivel de repositorio u organización que se usa en las canalizaciones convertidas. Estos secretos deben crearse manualmente en GitHub Actions para que estas canalizaciones funcionen correctamente. Para más información, consulta Uso de secretos en Acciones de GitHub.
- Un ejecutor autohospedado hace referencia a una etiqueta de un ejecutor al que se hace referencia en una canalización convertida que no es un ejecutor hospedado por GitHub. Tendrás que definir manualmente estos ejecutores para que estas canalizaciones funcionen correctamente.
Archivos
La sección final del informe de auditoría proporciona un manifiesto de todos los archivos que se escribieron en el disco durante la auditoría.
Cada archivo de canalización tiene varios archivos incluidos en la auditoría, entre los que se incluyen:
- La canalización original tal como se definió en GitHub.
- Las respuestas de red usadas para convertir la canalización.
- El archivo del flujo de trabajo convertido.
- Los seguimientos de pila que se pueden usar para solucionar problemas de una conversión de canalización con errores.
Además, el archivo workflow_usage.csv
contiene una lista separada por comas de todas las acciones, los secretos y los ejecutores que usa cada una de las canalizaciones convertidas correctamente. Esto puede ser útil para determinar qué flujos de trabajo usan qué acciones, secretos o ejecutores, así como para realizar revisiones de seguridad.
Forecasting usage
You can use the forecast
command to forecast potential GitHub Actions usage by computing metrics from completed pipeline runs in your Bamboo instance.
Running the forecast command
To perform a forecast of potential GitHub Actions usage, run the following command in your terminal. By default, GitHub Actions Importer includes the previous seven days in the forecast report.
gh actions-importer forecast bamboo --output-dir tmp/forecast_reports
Forecasting a project
To limit the forecast to the plans and deployments environments associated with a project, you can use the --project
option, where the value is set to a build project key.
For example:
gh actions-importer forecast bamboo --project PAN --output-dir tmp/forecast_reports
Inspecting the forecast report
The forecast_report.md
file in the specified output directory contains the results of the forecast.
Listed below are some key terms that can appear in the forecast report:
- The job count is the total number of completed jobs.
- The pipeline count is the number of unique pipelines used.
- Execution time describes the amount of time a runner spent on a job. This metric can be used to help plan for the cost of GitHub-hosted runners.
- This metric is correlated to how much you should expect to spend in GitHub Actions. This will vary depending on the hardware used for these minutes. You can use the GitHub Actions pricing calculator to estimate the costs.
- Queue time metrics describe the amount of time a job spent waiting for a runner to be available to execute it.
- Concurrent jobs metrics describe the amount of jobs running at any given time. This metric can be used to
Perform a dry-run migration of a Bamboo pipeline
You can use the dry-run
command to convert a Bamboo pipeline to an equivalent GitHub Actions workflow. A dry-run creates the output files in a specified directory, but does not open a pull request to migrate the pipeline.
Running a dry-run migration for a build plan
To perform a dry run of migrating your Bamboo build plan to GitHub Actions, run the following command in your terminal, replacing :my_plan_slug
with the plan's project and plan key in the format <projectKey>-<planKey>
(for example: PAN-SCRIP
).
gh actions-importer dry-run bamboo build --plan-slug :my_plan_slug --output-dir tmp/dry-run
Running a dry-run migration for a deployment project
To perform a dry run of migrating your Bamboo deployment project to GitHub Actions, run the following command in your terminal, replacing :my_deployment_project_id
with the ID of the deployment project you are converting.
gh actions-importer dry-run bamboo deployment --deployment-project-id :my_deployment_project_id --output-dir tmp/dry-run
You can view the logs of the dry run and the converted workflow files in the specified output directory.
Si hay elementos que GitHub Actions Importer no pudo convertir automáticamente, como pasos de compilación desconocidos o una canalización parcialmente correcta, es posible que quieras crear transformadores personalizados para personalizar aún más el proceso de conversión. Para más información, consulta Extending GitHub Actions Importer with custom transformers.
Perform a production migration of a Bamboo pipeline
You can use the migrate
command to convert a Bamboo pipeline and open a pull request with the equivalent GitHub Actions workflow.
Running the migrate command for a build plan
To migrate a Bamboo build plan to GitHub Actions, run the following command in your terminal, replacing the target-url
value with the URL for your GitHub repository, and :my_plan_slug
with the plan's project and plan key in the format <projectKey>-<planKey>
.
gh actions-importer migrate bamboo build --plan-slug :my_plan_slug --target-url :target_url --output-dir tmp/migrate
The command's output includes the URL to the pull request that adds the converted workflow to your repository. An example of a successful output is similar to the following:
$ gh actions-importer migrate bamboo build --plan-slug :PROJECTKEY-PLANKEY --target-url https://github.com/octo-org/octo-repo --output-dir tmp/migrate
[2022-08-20 22:08:20] Logs: 'tmp/migrate/log/actions-importer-20220916-014033.log'
[2022-08-20 22:08:20] Pull request: 'https://github.com/octo-org/octo-repo/pull/1'
Running the migrate command for a deployment project
To migrate a Bamboo deployment project to GitHub Actions, run the following command in your terminal, replacing the target-url
value with the URL for your GitHub repository, and :my_deployment_project_id
with the ID of the deployment project you are converting.
gh actions-importer migrate bamboo deployment --deployment-project-id :my_deployment_project_id --target-url :target_url --output-dir tmp/migrate
The command's output includes the URL to the pull request that adds the converted workflow to your repository. An example of a successful output is similar to the following:
$ gh actions-importer migrate bamboo deployment --deployment-project-id 123 --target-url https://github.com/octo-org/octo-repo --output-dir tmp/migrate
[2023-04-20 22:08:20] Logs: 'tmp/migrate/log/actions-importer-20230420-014033.log'
[2023-04-20 22:08:20] Pull request: 'https://github.com/octo-org/octo-repo/pull/1'
Inspección de la solicitud de incorporación de cambios
La salida de una ejecución correcta del comando migrate
contiene un vínculo a la nueva solicitud de incorporación de cambios que agrega el flujo de trabajo convertido al repositorio.
Entre algunos elementos importantes de la solicitud de incorporación de cambios se incluyen los siguientes:
- En la descripción de la solicitud de incorporación de cambios, una sección denominada Pasos manuales, que enumera los pasos que debes completar manualmente para poder finalizar la migración de las canalizaciones a GitHub Actions. Por ejemplo, esta sección puede indicarte que crees los secretos usados en los flujos de trabajo.
- El archivo de flujos de trabajo convertidos. Selecciona la pestaña Archivos cambiados de la solicitud de incorporación de cambios para ver el archivo de flujo de trabajo que se agregará al repositorio de GitHub.
Cuando hayas terminado de inspeccionar la solicitud de incorporación de cambios, puedes combinarla para agregar el flujo de trabajo al repositorio de GitHub.
Reference
This section contains reference information on environment variables, optional arguments, and supported syntax when using GitHub Actions Importer to migrate from Bamboo.
Using environment variables
GitHub Actions Importer usa variables de entorno para su configuración de autenticación. Estas variables se establecen al seguir el proceso de configuración mediante el comando configure
. Para más información, consulta la sección Configuración de credenciales.
GitHub Actions Importer uses the following environment variables to connect to your Bamboo instance:
GITHUB_ACCESS_TOKEN
: The personal access token (classic) used to create pull requests with a converted workflow (requiresrepo
andworkflow
scopes).GITHUB_INSTANCE_URL
: The URL to the target GitHub instance (for example,https://github.com
).BAMBOO_ACCESS_TOKEN
: The Bamboo personal access token used to authenticate with your Bamboo instance.BAMBOO_INSTANCE_URL
: The URL to the Bamboo instance (for example,https://bamboo.example.com
).
These environment variables can be specified in a .env.local
file that is loaded by GitHub Actions Importer when it is run.
Optional arguments
Hay argumentos opcionales que puedes usar con los subcomandos de GitHub Actions Importer para personalizar la migración.
--source-file-path
You can use the --source-file-path
argument with the dry-run
or migrate
subcommands.
By default, GitHub Actions Importer fetches pipeline contents from the Bamboo instance. The --source-file-path
argument tells GitHub Actions Importer to use the specified source file path instead.
For example:
gh actions-importer dry-run bamboo build --plan-slug IN-COM -o tmp/bamboo --source-file-path ./path/to/my/bamboo/file.yml
--config-file-path
You can use the --config-file-path
argument with the audit
, dry-run
, and migrate
subcommands.
By default, GitHub Actions Importer fetches pipeline contents from the Bamboo instance. The --config-file-path
argument tells GitHub Actions Importer to use the specified source files instead.
Audit example
In this example, GitHub Actions Importer uses the specified YAML configuration file to perform an audit.
gh actions-importer audit bamboo -o tmp/bamboo --config-file-path "./path/to/my/bamboo/config.yml"
To audit a Bamboo instance using a config file, the config file must be in the following format, and each repository_slug
must be unique:
source_files:
- repository_slug: IN/COM
path: path/to/one/source/file.yml
- repository_slug: IN/JOB
path: path/to/another/source/file.yml
Dry run example
In this example, GitHub Actions Importer uses the specified YAML configuration file as the source file to perform a dry run.
The repository slug is built using the --plan-slug
option. The source file path is matched and pulled from the specified source file.
gh actions-importer dry-run bamboo build --plan-slug IN-COM -o tmp/bamboo --config-file-path "./path/to/my/bamboo/config.yml"
Supported syntax for Bamboo pipelines
The following table shows the type of properties that GitHub Actions Importer is currently able to convert.
Bamboo | GitHub Actions | Status |
---|---|---|
environments | jobs | Supported |
environments.<environment_id> | jobs.<job_id> | Supported |
<job_id>.artifacts | jobs.<job_id>.steps.actions/upload-artifact | Supported |
<job_id>.artifact-subscriptions | jobs.<job_id>.steps.actions/download-artifact | Supported |
<job_id>.docker | jobs.<job_id>.container | Supported |
<job_id>.final-tasks | jobs.<job_id>.steps.if | Supported |
<job_id>.requirements | jobs.<job_id>.runs-on | Supported |
<job_id>.tasks | jobs.<job_id>.steps | Supported |
<job_id>.variables | jobs.<job_id>.env | Supported |
stages | jobs.<job_id>.needs | Supported |
stages.<stage_id>.final | jobs.<job_id>.if | Supported |
stages.<stage_id>.jobs | jobs | Supported |
stages.<stage_id>.jobs.<job_id> | jobs.<job_id> | Supported |
stages.<stage_id>.manual | jobs.<job_id>.environment | Supported |
triggers | on | Supported |
dependencies | jobs.<job_id>.steps.<gh cli step> | Partially Supported |
branches | Not applicable | Unsupported |
deployment.deployment-permissions | Not applicable | Unsupported |
environment-permissions | Not applicable | Unsupported |
notifications | Not applicable | Unsupported |
plan-permissions | Not applicable | Unsupported |
release-naming | Not applicable | Unsupported |
repositories | Not applicable | Unsupported |
For more information about supported Bamboo concept and plugin mappings, see the github/gh-actions-importer
repository.
Environment variable mapping
GitHub Actions Importer uses the mapping in the table below to convert default Bamboo environment variables to the closest equivalent in GitHub Actions.
Bamboo | GitHub Actions |
---|---|
bamboo.agentId | ${{ github.runner_name }} |
bamboo.agentWorkingDirectory | ${{ github.workspace }} |
bamboo.buildKey | ${{ github.workflow }}-${{ github.job }} |
bamboo.buildNumber | ${{ github.run_id }} |
bamboo.buildPlanName | ${{ github.repository }}-${{ github.workflow }}-${{ github.job } |
bamboo.buildResultKey | ${{ github.workflow }}-${{ github.job }}-${{ github.run_id }} |
bamboo.buildResultsUrl | ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }} |
bamboo.build.working.directory | ${{ github.workspace }} |
bamboo.deploy.project | ${{ github.repository }} |
bamboo.ManualBuildTriggerReason.userName | ${{ github.actor }} |
bamboo.planKey | ${{ github.workflow }} |
bamboo.planName | ${{ github.repository }}-${{ github.workflow }} |
bamboo.planRepository.branchDisplayName | ${{ github.ref }} |
bamboo.planRepository.<position>.branch | ${{ github.ref }} |
bamboo.planRepository.<position>.branchName | ${{ github.ref }} |
bamboo.planRepository.<position>.name | ${{ github.repository }} |
bamboo.planRepository.<position>.repositoryUrl | ${{ github.server }}/${{ github.repository }} |
bamboo.planRepository.<position>.revision | ${{ github.sha }} |
bamboo.planRepository.<position>.username | ${{ github.actor}} |
bamboo.repository.branch.name | ${{ github.ref }} |
bamboo.repository.git.branch | ${{ github.ref }} |
bamboo.repository.git.repositoryUrl | ${{ github.server }}/${{ github.repository }} |
bamboo.repository.pr.key | ${{ github.event.pull_request.number }} |
bamboo.repository.pr.sourceBranch | ${{ github.event.pull_request.head.ref }} |
bamboo.repository.pr.targetBranch | ${{ github.event.pull_request.base.ref }} |
bamboo.resultsUrl | ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }} |
bamboo.shortJobKey | ${{ github.job }} |
bamboo.shortJobName | ${{ github.job }} |
bamboo.shortPlanKey | ${{ github.workflow }} |
bamboo.shortPlanName | ${{ github.workflow }} |
Nota:
Unknown variables are transformed to ${{ env.<variableName> }}
and must be replaced or added under env
for proper operation. For example, ${bamboo.jira.baseUrl}
will become ${{ env.jira_baseUrl }}
.
System Variables
System variables used in tasks are transformed to the equivalent bash shell variable and are assumed to be available. For example, ${system.<variable.name>}
will be transformed to $variable_name
. We recommend you verify this to ensure proper operation of the workflow.
Legal notice
Algunas partes se han adaptado a partir de https://github.com/github/gh-actions-importer/ con licencia MIT:
MIT License
Copyright (c) 2022 GitHub
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.