-
Notifications
You must be signed in to change notification settings - Fork 1
57 lines (48 loc) · 1.73 KB
/
tf_plan_dispatch.yaml
File metadata and controls
57 lines (48 loc) · 1.73 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
name: Manual Terraform Plan
on:
workflow_dispatch:
env:
TF_VAR_aws_account_id: ${{ secrets.AWS_ACCOUNT_ID }}
TF_VAR_aws_region: ${{ secrets.AWS_REGION }}
TF_VAR_github_actions_role_arn: ${{ secrets.GH_ACTIONS_ROLE_ARN }}
TF_VAR_service_url_registration_api_solana: ${{ secrets.SERVICE_URL_REGISTRATION_API_SOLANA }}
TF_VAR_service_api_key_registration_api_solana: ${{ secrets.SERVICE_API_KEY_REGISTRATION_API_SOLANA }}
TF_VAR_tech_floripa_certificate_validate_url: ${{ secrets.TECH_FLORIPA_CERTIFICATE_VALIDATE_URL }}
TF_VAR_api_key_value: ${{ secrets.API_KEY_VALUE }}
TFPLAN_S3_BUCKET: tech-floripa-plan-artifacts
GH_TOKEN: ${{ github.token }}
permissions:
contents: read
pull-requests: write
id-token: write
jobs:
plan:
strategy:
matrix:
include:
- dir: terraform
env: shared
- dir: terraform/env/dev
env: dev
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
- uses: hashicorp/setup-terraform@v3
- uses: aws-actions/configure-aws-credentials@v4
with:
role-to-assume: ${{ env.TF_VAR_github_actions_role_arn }}
aws-region: ${{ env.TF_VAR_aws_region }}
role-session-name: TerraformPlanSession-${{ matrix.env }}
- name: Terraform Init
run: terraform init -input=false -upgrade=false
working-directory: ${{ matrix.dir }}
- name: Terraform Plan
run: |
set -euo pipefail
terraform plan -input=false -out=tfplan
terraform show -no-color tfplan > plan-output.txt
echo "## Terraform Plan (${{ matrix.env }})"
echo '```hcl'
cat plan-output.txt
echo '```'
working-directory: ${{ matrix.dir }}