-
Notifications
You must be signed in to change notification settings - Fork 2
156 lines (145 loc) · 7.04 KB
/
deployment_plan.yaml
File metadata and controls
156 lines (145 loc) · 7.04 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
name: Terraform Plan
run-name: Terraform plan ${{ inputs.workspace }}${{ inputs.id }} by @${{ github.actor }}
on:
workflow_dispatch:
inputs:
workspace:
description: "The workspace to terraform against"
required: true
type: choice
options:
- dev
- prod
id:
description: "Unique id for environment (optional, PR number, issue number etc.)"
required: true
type: string
dibbs-ecr-viewer-version:
description: "dibbs-ecr-viewer docker image tag"
required: true
type: string
default: "8.2.1"
dibbs-ecr-viewer-config-name:
description: "Sets CONFIG_NAME on dibbs-ecr-viewer"
required: true
type: choice
options:
- AWS_PG_NON_INTEGRATED
- AWS_PG_DUAL
- AWS_SQLSERVER_NON_INTEGRATED
- AWS_SQLSERVER_DUAL
- AWS_INTEGRATED
dibbs-ecr-viewer-auth-provider:
description: "Sets AUTH_PROVIDER on dibbs-ecr-viewer"
required: true
type: choice
options:
- ad
- none
concurrency:
group: ${{ inputs.workspace }}${{ inputs.id }}-terraform
cancel-in-progress: false
permissions:
id-token: write
contents: read
env:
workspace: ${{ inputs.workspace }}
jobs:
terraform:
name: Run Terraform
runs-on: ubuntu-latest
if: ${{ inputs.workspace }} == 'dev' || ${{ inputs.workspace }} == 'prod'
defaults:
run:
shell: bash
# this may need to be updated if you change the directory you are working with
# ./terraform/implementation/dev || ./terraform/implementation/prod for example
# this practice is recommended to keep the terraform code organized while reducing the risk of conflicts
working-directory: ./terraform/implementation/ecs
steps:
- name: Check Out Changes
uses: actions/checkout@v4
- name: Setup Terraform
uses: hashicorp/setup-terraform@v3
with:
terraform_version: "1.9.8"
- name: configure aws credentials
if: ${{ inputs.workspace }} == 'prod'
uses: aws-actions/configure-aws-credentials@v4
with:
role-to-assume: ${{ secrets.AWS_ROLE_ARN }}
role-session-name: githubDeploymentWorkflow
aws-region: ${{ vars.AWS_REGION }}
- name: configure aws credentials
if: ${{ inputs.workspace }} == 'dev'
uses: aws-actions/configure-aws-credentials@v4
with:
role-to-assume: ${{ secrets.AWS_DEV_ROLE_ARN }}
role-session-name: githubDeploymentWorkflow
aws-region: ${{ vars.AWS_REGION }}
- name: Set auth secrets for AD
if: ${{ inputs.dibbs-ecr-viewer-auth-provider == 'ad' }}
run: |
echo "AUTH_PROVIDER=ad" >> $GITHUB_ENV
echo "AUTH_CLIENT_ID=${{ secrets.AD_AUTH_CLIENT_ID }}" >> $GITHUB_ENV
echo "AUTH_ISSUER=${{ secrets.AD_AUTH_ISSUER }}" >> $GITHUB_ENV
echo "AUTH_SECRET=${{ secrets.AD_AUTH_SECRET }}" >> $GITHUB_ENV
echo "AUTH_CLIENT_SECRET=${{ secrets.AD_AUTH_CLIENT_SECRET }}" >> $GITHUB_ENV
- name: Set auth secrets for Keycloak
if: ${{ inputs.dibbs-ecr-viewer-auth-provider == 'keycloak' }}
run: |
echo "AUTH_PROVIDER=keycloak" >> $GITHUB_ENV
echo "AUTH_CLIENT_ID=${{ secrets.KEYCLOAK_AUTH_CLIENT_ID }}" >> $GITHUB_ENV
echo "AUTH_ISSUER=${{ secrets.KEYCLOAK_AUTH_ISSUER }}" >> $GITHUB_ENV
echo "AUTH_SECRET=${{ secrets.KEYCLOAK_AUTH_SECRET }}" >> $GITHUB_ENV
echo "AUTH_CLIENT_SECRET=${{ secrets.KEYCLOAK_AUTH_CLIENT_SECRET }}" >> $GITHUB_ENV
- name: Terraform
env:
BUCKET: ${{ secrets.TFSTATE_BUCKET }}
DYNAMODB_TABLE: ${{ secrets.TFSTATE_DYNAMODB_TABLE }}
OWNER: ${{ vars.OWNER }}
PROJECT: ${{ vars.PROJECT }}
REGION: ${{ vars.AWS_REGION }}
SSH_KEY_NAME: "GITHUB_ACTIONS"
ROUTE53_HOSTED_ZONE_ID: ${{ secrets.ROUTE53_HOSTED_ZONE_ID }}
WORKSPACE: ${{ env.workspace }}${{ inputs.id }}
DIBBS_ECR_VIEWER_VERSION: ${{ inputs.dibbs-ecr-viewer-version }}
DIBBS_CONFIG_NAME: ${{ inputs.dibbs-ecr-viewer-config-name }}
METADATA_DATABASE_MIGRATION_SECRET: ${{ secrets.METADATA_DATABASE_MIGRATION_SECRET }}
VPC_CIDR: "176.${{ inputs.id }}.0.0/16"
shell: bash
run: |
echo "owner = \"$OWNER\"" >> $WORKSPACE.tfvars
echo "project = \"$PROJECT\"" >> $WORKSPACE.tfvars
echo "region = \"$REGION\"" >> $WORKSPACE.tfvars
echo "private_subnets = [\"176.${{ inputs.id }}.1.0/24\",\"176.${{ inputs.id }}.3.0/24\"]" >> $WORKSPACE.tfvars
echo "public_subnets = [\"176.${{ inputs.id }}.2.0/24\",\"176.${{ inputs.id }}.4.0/24\"]" >> $WORKSPACE.tfvars
echo "vpc_cidr = \"$VPC_CIDR\"" >> $WORKSPACE.tfvars
echo "route53_hosted_zone_id = \"$ROUTE53_HOSTED_ZONE_ID\"" >> $WORKSPACE.tfvars
echo "phdi_version = \"$DIBBS_ECR_VIEWER_VERSION\"" >> $WORKSPACE.tfvars
echo "dibbs_config_name = \"$DIBBS_CONFIG_NAME\"" >> $WORKSPACE.tfvars
echo "secrets_manager_metadata_database_migration_secret_version = \"$METADATA_DATABASE_MIGRATION_SECRET\"" >> $WORKSPACE.tfvars
if [ $DIBBS_CONFIG_NAME == "AWS_PG_NON_INTEGRATED" ] || [ $DIBBS_CONFIG_NAME == "AWS_PG_DUAL" ]; then
echo "database_type = \"postgresql\"" >> $WORKSPACE.tfvars
elif [ $DIBBS_CONFIG_NAME == "AWS_SQLSERVER_NON_INTEGRATED" ] || [ $DIBBS_CONFIG_NAME == "AWS_SQLSERVER_DUAL" ]; then
echo "database_type = \"sqlserver\"" >> $WORKSPACE.tfvars
fi
if [ $DIBBS_CONFIG_NAME == "AWS_PG_NON_INTEGRATED" ] || [ $DIBBS_CONFIG_NAME == "AWS_SQLSERVER_NON_INTEGRATED" ] || [ $DIBBS_CONFIG_NAME == "AWS_PG_DUAL" ] || [ $DIBBS_CONFIG_NAME == "AWS_SQLSERVER_DUAL" ]; then
echo "auth_provider = \"$AUTH_PROVIDER\"" >> $WORKSPACE.tfvars
echo "auth_client_id = \"$AUTH_CLIENT_ID\"" >> $WORKSPACE.tfvars
echo "auth_issuer = \"$AUTH_ISSUER\"" >> $WORKSPACE.tfvars
echo "auth_url = \"https://$WORKSPACE.dibbs.cloud/ecr-viewer/api/auth\"" >> $WORKSPACE.tfvars
echo "secrets_manager_auth_secret_version = \"$AUTH_SECRET\"" >> $WORKSPACE.tfvars
echo "secrets_manager_auth_client_secret_version = \"$AUTH_CLIENT_SECRET\"" >> $WORKSPACE.tfvars
elif [ $DIBBS_CONFIG_NAME == "AWS_INTEGRATED" ]; then
echo "secrets_manager_auth_secret_version = \"$AUTH_SECRET\"" >> $WORKSPACE.tfvars
echo "secrets_manager_auth_client_secret_version = \"$AUTH_CLIENT_SECRET\"" >> $WORKSPACE.tfvars
fi
terraform init \
-var-file="$WORKSPACE.tfvars" \
-backend-config "bucket=$BUCKET" \
-backend-config "dynamodb_table=$DYNAMODB_TABLE" \
-backend-config "region=$REGION" \
|| (echo "terraform init failed, exiting..." && exit 1)
terraform workspace new "$WORKSPACE" || terraform workspace select "$WORKSPACE"
terraform plan -var-file="$WORKSPACE.tfvars"