|
| 1 | +# To avoid https://github.com/aws/aws-cli/issues/5262 |
| 2 | +env: |
| 3 | + AWS_EC2_METADATA_DISABLED: true |
| 4 | + |
1 | 5 | jobs:
|
| 6 | + get-modules: |
| 7 | + runs-on: ubuntu-20.04 |
| 8 | + outputs: |
| 9 | + matrix: ${{steps.list_dirs.outputs.matrix}} |
| 10 | + # Modified from https://stackoverflow.com/a/67180216 to filter just directory names |
| 11 | + # and to filter out scripts dir and to disables bless-ca |
| 12 | + steps: |
| 13 | + - uses: actions/checkout@v2 |
| 14 | + - id: list_dirs |
| 15 | + run: echo "::set-output name=matrix::$(ls -d */|sed -e 's/\///'|grep -v 'bless-ca\|scripts'|jq -cnR '[inputs | select(length>0)]')" |
| 16 | + |
2 | 17 | check-mod:
|
3 | 18 | name: check-mod
|
4 | 19 | runs-on: ubuntu-latest
|
@@ -26,75 +41,11 @@ jobs:
|
26 | 41 | test:
|
27 | 42 | name: test ${{ matrix.module }}
|
28 | 43 | runs-on: ubuntu-latest
|
| 44 | + needs: get-modules |
29 | 45 | strategy:
|
30 | 46 | fail-fast: false
|
31 | 47 | matrix:
|
32 |
| - module: |
33 |
| - - aws-acm-cert |
34 |
| - - aws-aurora |
35 |
| - - aws-aurora-mysql |
36 |
| - - aws-aurora-postgres |
37 |
| - - aws-cloudfront-domain-redirect |
38 |
| - - aws-cloudfront-logs-bucket |
39 |
| - - aws-cloudwatch-log-group |
40 |
| - - aws-cloudwatch-log-retention-manager |
41 |
| - - aws-default-vpc-security |
42 |
| - - aws-ecs-job |
43 |
| - - aws-ecs-job-fargate |
44 |
| - - aws-ecs-service |
45 |
| - - aws-ecs-service-fargate |
46 |
| - - aws-efs-volume |
47 |
| - - aws-iam-ecs-task-role |
48 |
| - - aws-iam-group-assume-role |
49 |
| - - aws-iam-group-console-login |
50 |
| - - aws-iam-instance-profile |
51 |
| - - aws-iam-password-policy |
52 |
| - - aws-iam-policy-cwlogs |
53 |
| - - aws-iam-role |
54 |
| - - aws-iam-role-bless |
55 |
| - - aws-iam-role-cloudfront-poweruser |
56 |
| - - aws-iam-role-crossacct |
57 |
| - - aws-iam-role-ec2-poweruser |
58 |
| - - aws-iam-role-ecs-poweruser |
59 |
| - - aws-iam-role-infraci |
60 |
| - - aws-iam-role-poweruser |
61 |
| - - aws-iam-role-readonly |
62 |
| - - aws-iam-role-route53domains-poweruser |
63 |
| - - aws-iam-role-security-audit |
64 |
| - - aws-iam-secrets-reader-policy |
65 |
| - - aws-lambda-edge-add-security-headers |
66 |
| - - aws-lambda-function |
67 |
| - - aws-param |
68 |
| - - aws-params-reader-policy |
69 |
| - - aws-params-secrets-setup |
70 |
| - - aws-params-writer |
71 |
| - - aws-redis-node |
72 |
| - - aws-redis-replication-group |
73 |
| - - aws-s3-private-bucket |
74 |
| - - aws-s3-public-bucket |
75 |
| - - aws-single-page-static-site |
76 |
| - - aws-sns-lambda |
77 |
| - - aws-ssm-params |
78 |
| - - aws-ssm-params-writer |
79 |
| - # - bless-ca/test |
80 |
| - - github-webhooks-to-s3 |
81 |
| - - module-template |
82 |
| - - snowflake-account-grant-all |
83 |
| - - snowflake-database-grant-all |
84 |
| - - snowflake-external-table-grant-all |
85 |
| - - snowflake-file-format-grant-all |
86 |
| - - snowflake-function-grant-all |
87 |
| - - snowflake-integration-grant-all |
88 |
| - - snowflake-materialized-view-grant-all |
89 |
| - - snowflake-procedure-grant-all |
90 |
| - - snowflake-resource-monitor-grant-all |
91 |
| - - snowflake-schema-grant-all |
92 |
| - - snowflake-sequence-grant-all |
93 |
| - - snowflake-stage-grant-all |
94 |
| - - snowflake-stream-grant-all |
95 |
| - - snowflake-table-grant-all |
96 |
| - - snowflake-view-grant-all |
97 |
| - - snowflake-warehouse-grant-all |
| 48 | + module: ${{fromJson(needs.get-modules.outputs.matrix)}} |
98 | 49 | steps:
|
99 | 50 | - uses: actions/checkout@v2
|
100 | 51 | - id: filter
|
|
0 commit comments