Skip to content

Adding Main branch and Release terraform apply tests #11

Adding Main branch and Release terraform apply tests

Adding Main branch and Release terraform apply tests #11

Workflow file for this run

name: Main Branch and Release Testing
on:
push:
branches: ["main"]
tags: ["v*.*.*"]
pull_request:
branches: ["main"]
jobs:
tests:
permissions:
id-token: write
contents: read
runs-on: ubuntu-latest
env:
CI: true
STAC_SERVER_TAG: v3.5.0
steps:
- uses: actions/checkout@v4
- uses: actions/setup-node@v4
with:
node-version: '18'
- uses: hashicorp/setup-terraform@v3
with:
terraform_version: "1.7.3"
- name: Setting Pre-Requisites
id: prereqs
run: |
#echo "REPOSITORY_NAME=`echo \"${{ github.ref_name }}\" | tr -d '.' | cut -c1-8`" >> $GITHUB_ENV
echo "REPOSITORY_NAME=main" >> $GITHUB_ENV
- name: Prepararing Environment
id: prep_env
run: |
sed -n '5,$p' default.tfvars > test.tfvars
echo "environment = \"git\"" >> test.tfvars
echo "project_name = \"${REPOSITORY_NAME}\"" >> test.tfvars
sed -i -e 's/deploy_stac_server_opensearch_serverless = false/deploy_stac_server_opensearch_serverless = true/g' test.tfvars
sed -i -e 's/deploy_analytics = true/deploy_analytics = false/g' test.tfvars
cat test.tfvars
echo "Creating terraform backend file ..."
echo 'terraform {' >> test.s3.backend.tf
echo ' backend "s3" {' >> test.s3.backend.tf
echo ' encrypt = true' >> test.s3.backend.tf
echo " bucket = \"${{ secrets.TF_STATE_BUCKET }}\"" >> test.s3.backend.tf
echo " dynamodb_table = \"${{ secrets.TF_STATE_LOCK_TABLE }}\"" >> test.s3.backend.tf
echo " key = \"${REPOSITORY_NAME}-github-test.tfstate\"" >> test.s3.backend.tf
echo " region = \"${{ secrets.AWS_REGION }}\"" >> test.s3.backend.tf
echo ' }' >> test.s3.backend.tf
echo '}' >> test.s3.backend.tf
cat test.s3.backend.tf
- name: Update stac-server lambdas
id: update_stac_lambdas
run: ./scripts/update-lambdas.sh
- name: Configure Terraform Init Credentials
id: init_creds
uses: aws-actions/configure-aws-credentials@v4
with:
aws-region: ${{ secrets.AWS_REGION }}
role-to-assume: ${{ secrets.AWS_ROLE }}
role-session-name: GitHubReleaseInit
- name: Terraform Init
id: tf_init
run: terraform init
- name: Terraform Validate
id: tf_validate
run: terraform validate
- name: Configure Terraform Plan Credentials
id: plan_creds
uses: aws-actions/configure-aws-credentials@v4
with:
aws-region: ${{ secrets.AWS_REGION }}
role-to-assume: ${{ secrets.AWS_ROLE }}
role-session-name: GitHubReleasePlan
- name: Terraform Plan
id: tf_plan
run: terraform plan -var-file="test.tfvars" -out test.tfplan -lock=false
- name: Configure Terraform Apply Credentials
id: apply_creds
uses: aws-actions/configure-aws-credentials@v4
with:
aws-region: ${{ secrets.AWS_REGION }}
role-to-assume: ${{ secrets.AWS_ROLE }}
role-session-name: GitHubReleaseApply
- name: Terraform Apply
id: tf_apply
run: terraform apply -lock=false -input=false test.tfplan
- name: Configure Terraform OpenSearch Cleanup Credentials
id: opensearch_cleanup_creds
if: always()
uses: aws-actions/configure-aws-credentials@v4
with:
aws-region: ${{ secrets.AWS_REGION }}
role-to-assume: ${{ secrets.AWS_ROLE }}
role-session-name: GitHubReleaseOpenSearchCleanup
- name: Deleting OpenSearch Domain
id: delete_opensearch_domain
if: always()
run: |
export stac_opensearch_domain_name=fd-${REPOSITORY_NAME}-git-stac-server
if [[ "$stac_opensearch_domain_name" != "" && !("$stac_opensearch_domain_name" =~ ".aoss.amazonaws.com") && "$stac_opensearch_domain_name" != *"Warning"* ]]; then
echo "We detected a Stac Server OpenSearch Domain $stac_opensearch_domain_name running in FilmDrop environment, will attempt to delete it..."
terraform state rm "module.filmdrop.module.stac-server[0].module.stac-server.aws_opensearch_domain.stac_server_opensearch_domain"
aws opensearch delete-domain --domain-name fd-${REPOSITORY_NAME}-git-stac-server --output text > .opensearch.info
echo "Stac Server OpenSearch Domain $stac_opensearch_domain_name has been deleted..."
fi
- name: Configure Terraform Cleanup Check Credentials
id: cleanup_check_creds
if: always()
uses: aws-actions/configure-aws-credentials@v4
with:
aws-region: ${{ secrets.AWS_REGION }}
role-to-assume: ${{ secrets.AWS_ROLE }}
role-session-name: GitHubReleaseCleanupCheck
- name: Terraform Destroy Pre-Check
id: tf_destroy_plan
if: always()
run: terraform plan -destroy -var-file="test.tfvars" -out test-cleanup.tfplan -lock=false
- name: Configure Terraform Cleanup Credentials
id: cleanup_creds
if: always()
uses: aws-actions/configure-aws-credentials@v4
with:
aws-region: ${{ secrets.AWS_REGION }}
role-to-assume: ${{ secrets.AWS_ROLE }}
role-session-name: GitHubReleaseCleanup
- name: Terraform Destroy
id: tf_destroy_apply
if: always()
run: terraform apply -destroy -lock=false -input=false test-cleanup.tfplan
pre-commit:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: hashicorp/setup-terraform@v3
with:
terraform_version: "1.7.3"
- uses: terraform-linters/setup-tflint@v3
with:
tflint_version: "v0.49.0"
- uses: actions/setup-python@v5
with:
python-version: "3.11"
- name: Install pre-commit
run: pip install pre-commit
- name: Run pre-commit
run: pre-commit run --all-files