-
Notifications
You must be signed in to change notification settings - Fork 0
191 lines (161 loc) · 6.46 KB
/
apply.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
name: Terraform Workflow
on:
push:
branches:
- main
paths:
- 'terraform/**'
- '.github/workflows/**'
- '!**/README.md'
- '!argocd-app/**'
- 'argocd-app/values.yaml'
pull_request:
branches:
- main
paths:
- 'terraform/**'
- '.github/workflows/**'
- '!**/README.md'
- '!argocd-app/**'
- 'argocd-app/values.yaml'
workflow_dispatch:
inputs:
destroy:
description: 'Destroy the infrastructure?'
type: boolean
required: true
default: false
jobs:
terraform:
runs-on: ubuntu-latest
defaults:
run:
shell: bash
working-directory: ./terraform
env:
WORKING_DIR: ./terraform
permissions:
contents: 'read'
id-token: 'write'
pull-requests: 'write'
steps:
- name: Checkout code
uses: actions/checkout@v4
- id: 'auth'
name: 'Authenticate to Google Cloud'
uses: 'google-github-actions/auth@v1'
with:
# Replace with values from setup.sh
workload_identity_provider: 'projects/734911192367/locations/global/workloadIdentityPools/deb-pool/providers/github-actions'
service_account: 'deb-sa@wizeline-deb.iam.gserviceaccount.com'
- name: Setup Terraform
uses: hashicorp/setup-terraform@v2
with:
terraform_version: '1.5.7'
terraform_wrapper: false
- name: Terraform Init
id: init
run: terraform init
- name: Terraform Format
id: fmt
if: github.event_name != 'workflow_dispatch'
run: terraform fmt -check
- name: Terraform Validate
id: validate
if: github.event_name != 'workflow_dispatch'
run: terraform validate
- name: Terraform Plan
id: plan
if: github.event_name != 'workflow_dispatch'
run: |
terraform plan \
-no-color \
-input=false
continue-on-error: true
# Add a comment to pull requests with plan results
- name: Add Plan Comment
if: github.event_name == 'pull_request'
uses: actions/github-script@v6
env:
PLAN: "terraform\n${{ steps.plan.outputs.stdout }}"
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
script: |
// 1. Retrieve existing bot comments for the PR
const { data: comments } = await github.rest.issues.listComments({
owner: context.repo.owner,
repo: context.repo.repo,
issue_number: context.issue.number,
})
const botComment = comments.find(comment => {
return comment.user.type === 'Bot' && comment.body.includes('Terraform Format and Style')
})
// 2. Prepare format of the comment
const output = `#### Terraform Format and Style 🖌\`${{ steps.fmt.outcome }}\`
#### Terraform Initialization ⚙️\`${{ steps.init.outcome }}\`
#### Terraform Validation 🤖\`${{ steps.validate.outcome }}\`
<details><summary>Validation Output</summary>
\`\`\`\n
${{ steps.validate.outputs.stdout }}
\`\`\`
</details>
#### Terraform Plan 📖\`${{ steps.plan.outcome }}\`
<details><summary>Show Plan</summary>
\`\`\`\n
${process.env.PLAN}
\`\`\`
</details>
*Pusher: @${{ github.actor }}, Action: \`${{ github.event_name }}\`, Working Directory: \`${{ env.WORKING_DIR }}\`, Workflow: \`${{ github.workflow }}\`*`;
// 3. If we have a comment, update it, otherwise create a new one
if (botComment) {
github.rest.issues.updateComment({
owner: context.repo.owner,
repo: context.repo.repo,
comment_id: botComment.id,
body: output
})
} else {
github.rest.issues.createComment({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
body: output
})
}
- name: Check Plan Outcome
if: steps.plan.outcome == 'failure'
run: exit 1
- name: Terraform Apply
if: github.ref == 'refs/heads/main' && github.event_name == 'push'
run: |
terraform apply \
-input=false \
-auto-approve
- name: Set up Cloud SDK
if: github.ref == 'refs/heads/main' && github.event_name == 'push'
uses: 'google-github-actions/setup-gcloud@v1'
- name: Install Required Plugin for kubectl
if: github.ref == 'refs/heads/main' && github.event_name == 'push'
run: gcloud components install gke-gcloud-auth-plugin
- name: Set GKE credentials as env variables
id: set_gke_creds
if: github.ref == 'refs/heads/main' && github.event_name == 'push'
run: |
echo "GKE_CLUSTER_NAME=$(terraform output -raw gke_cluster_name)" >> $GITHUB_OUTPUT
echo "GKE_CLUSTER_LOCATION=$(terraform output -raw gke_cluster_location)" >> $GITHUB_OUTPUT
- name: Get GKE credentials
if: github.ref == 'refs/heads/main' && github.event_name == 'push'
run: |
gcloud container clusters get-credentials \
${{ steps.set_gke_creds.outputs.GKE_CLUSTER_NAME }} \
--location=${{ steps.set_gke_creds.outputs.GKE_CLUSTER_LOCATION }}
- name: Apply ArgoCD ApplicationSet
if: github.ref == 'refs/heads/main' && github.event_name == 'push'
run: |
kubectl apply -f ../argocd-app/multi-app/applicationset.yaml -n argocd
- name: Terraform Destroy (Manual Trigger)
if: github.event_name == 'workflow_dispatch' && github.ref == 'refs/heads/main' && github.event.inputs.destroy == 'true'
run: |
terraform destroy \
-input=false \
-auto-approve