Migrating from CircleCI to Github Actions
Introduction
We are encouraging development teams to move away from CircleCI to Github Actions for build, test and deployments, and have built Github Actions that pretty-much behave the same as CircleCI, but without using external services (eg. quay.io)
This document is a guide to migrationg from CircleCI to Github Actions. Obviously it can’t detail every change that needs to be made, since there may be differences in deployment pipelines from component to component (different environments, approval gates and test regimes) but it’s intended to act as a guide.
It is also a work in progress - if, when following this document you encounter any issues, please raise them in #ask-prisons-digital-sre
Finally this document is intended as a guide to migrating apps built from the Kotlin and Typescript templates, although elements of it may well be useful to migrate other applications.
Moving from CircleCI to Github Actions has a couple of pre-requisities that need to be completed before moving over, and then a couple of ‘on-the-day’ moves to deactivate CircleCI and start using Github Actions. These are covered below.
Prerequisites
These are the same as any project built using the existing templates, mainly:
- You must be a member of a team in the Ministry of Justice GitHub organisation. That team must belong to parent team HMPPS Developers.
Teams are managed by the hmpps-github-teams project.
Updating Cloud Platform namespaces
The key to being able to deploy with Github Actions is storing Kubernetes credentials within Github itself, rather than in Circle CI environment variables or contexts. The good news is that Cloud Platforms can facilitate this by creating service accounts that can populate the environments section of Github, and both apply permissions for approval/deployment (in the same way as contexts did in CircleCI) and store the secrets so that they can be referred to by Github Actions.
Furthermore, these secrets can automatically be rotated, improving security. This section details how to create the service account and populate the environments
Namespaces and mappings
It is assumed that each deployment environment has its own namespace, but this namespace can be shared by a number of components within a product (eg. ui and api).
This is the important bit: for this to make sense, the environments should all match: (links show examples within the template repo)
- The environment created in Github
- The environment in the namespace configuration
- The helm
values-xxx.yaml
filename - The ENVIRONMENT_NAME within the helm
values-xxx.yaml
file
HMPPS Template Module
To simplify deployment to a Cloud Platforms using Github Actions, a Terraform module called cloud-platform-terraform-hmpps-template has been created to orchestrate the main configurations of the github repository (including a service account and the environment secrets required). This also has the benefit of automatically rotating secrets, since it is continually deployed by Terraform.
Within the hmpps-templates-dev Cloud Platform namespace definition there are two files that refer to this module. This can coexist with other configurations within a namespace, although care should be taken to make sure duplicate definitions aren’t created - further information on this is below.
The simplest way to add the moving parts to enable deployment for a repository is to create a copy of either template-kotlin.tf or template-typescript.tf in the namespace, and rename it to the name of the Github Repository to which it will apply.
Then set the following fields appropriate to the repository:
Mandatory fields
github_repo =
“your github repository”application =
“your application”github_team =
“your github team”application_insights_instance =
"dev, preprod or prodsource_template_repo =
“hmpps-template-typescript” or “hmpps-template-kotlin” or “none” This is required to deploy the correct Application Insights configuration
Default fields
is_production = var.is_production
This inherits theis_production
namespace variableenvironment = var.environment
namespace variable for the environment; this must match the environment name used in helm values file e.g. values-dev.yaml
Optional fields
reviewer_teams =
[“List”, “Of”, “Github”, “Teams”] If this is set, only the teams listed will be allowed to deploy to this environment. Comment it out if it’s not needed.
Note: reviewer_teams
is required if is_production
is true.
selected_branch_patterns =
["branch, "patterns/"] If this is set, the selected branches will be allowed to be deployed.protected_branches_only = true
Comment this out if selected branches is in use
Note: One or other of the above needs to be set.
Once this PR has been approved and the Terraform has run, the Github repositories to which this namespace applies will have a corresponding environment entry within the settings:

Potential issues - duplicates and out-of-date github versions
Within the template-typescript.tf there is a definition of a redis instance. If this is defined separately within the terraform files for this namespace (eg. if it is a shared resource across instances), it should be removed from the this definition, since it will otherwise end up failing to deploy due to duplicate definitions.
It may also be that the required version of the github module within the resources/versions.tf
file of the existing namespace may be too old - this needs to be set to ">= 6.5.0"
(as per the template namespace)- it will not affect any existing terraform modules, but it’s required for this one to work.
Creating the build/test/deploy workflow
A boilerplate Github workflow file can be found in the appropriate template repository:
- HMPPS Kotlin Template: pipeline.yml
- HMPPS Typescript Template: pipeline.yml
migrate-repo.sh script
A script has been written that is intended to ‘get you working’ based on the template pipelines with the same deployment environments as the existing CircleCI config.
This can be run from your project with this command:
/bin/bash -c "$(curl -fsSL https://github.com/ministryofjustice/hmpps-github-actions/raw/refs/heads/main/migrate-repo.sh)"
In short, the script does a number of things, including:
- migrating the build/test/deploy steps (including basic branch filtering and specific configurations) for each environment
- configuring basic equivalents to the ‘executors’ (for example postgres and localstack) to enable integration testing
- removing the build/test/deploy job from CircleCI so it doesn’t run both CircleCI and Github jobs at the same time
More information about this script is available in the repository: hmpps-github-actions/docs/workflow-migration.md
Whether or not you choose to run the migration script (it will make a backup of the exisiting CircleCI config file so it can be reverted if necessary), it is strongly recommended that you refer to the original config to make sure that Github Actions is doing what CircleCI used to do.
In general, it should be fairly obvious which changes should be made to the the pipeline file so it behaves in a similar manner.
Removing CircleCI
Here are the processes required to remove CircleCI from the process, and replace the elements with Github Actions.
- Remove
.circleci/config.yml
- On the Github site:
- within Settings -> Webhooks, delete https://circleci.com/hooks/github
- within Settings -> Branches -> main, there will be some status checks that include
ci/circleci:
- for each status check, there will be a corresponding one for Github Actions - enter the status check names in the search box and add the non-CircleCI response
- then remove the circle CI one
That completes the move of the app to Github Actions
Appendix - Application Insights
There is a new method by which the Application Insights secret is deployed. This uses an SSM value that’s referenced within an appinsights.tf
resource within the hmpps-templates-dev namespace definition.
This creates a secret called application-insights within the namespace with the corresponding access key.
With existing (CircleCI deployed) apps, the Application Insights secret is added to the application’s secrets during the bootstrap process, and referred to in the Helm values.yaml
configuration:
env: APPLICATIONINSIGHTS_CONNECTION_STRING: "InstrumentationKey=$(APPINSIGHTS_INSTRUMENTATIONKEY)" . . namespace_secrets: hmpps-your-application: APPINSIGHTS_INSTRUMENTATIONKEY: 'APPINSIGHTS_INSTRUMENTATIONKEY' . .
To use the Terraform managed secret (which new projects use by default), it’s a simple case of adding the appinsights.tf
file to your namespaces (ensuring that your var.environment is set to either dev, preprod or prod) and then modifying the values.yaml
file to move the secret to its own application - application-insights
namespace_secrets: hmpps-your-application: EXISTING_ENV: EXISTING_SECRET_VALUE . . application-insights: APPLICATIONINSIGHTS_CONNECTION_STRING: "APPLICATIONINSIGHTS_CONNECTION_STRING" . .
Note that if your application is fairly old then it could be you just reference APPINSIGHTS_INSTRUMENTATIONKEY
and don’t reference APPLICATIONINSIGHTS_CONNECTION_STRING
at all in your configuration.
For backend applications that use the application insights java agent it is fine to use the new configuration with the latest java agent.
For frontend applications you will have to switch to using the APPLICATIONINSIGHTS_CONNECTION_STRING
instead. See the template typescript project for how to switch over. This needs to happen before
March 2025 anyway since the old style key will stop being supported past that date.
Edit this page here.