-
Notifications
You must be signed in to change notification settings - Fork 9
96 lines (81 loc) · 3.74 KB
/
delete-v2-review-app.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
name: Delete v2 Review App
on:
pull_request:
types: [closed]
branches: [main]
permissions:
deployments: write
jobs:
delete-v2-review-app:
name: Delete v2 Review App ${{ github.event.pull_request.number }}
concurrency: deploy_v2_review_${{ github.event.pull_request.number }}
if: contains(github.event.pull_request.labels.*.name, 'deploy_v2')
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/checkout@v4
- name: Set Environment variables
run: |
terraform_version=$(awk '/{/{f=/^terraform/;next}f' terraform/aks/providers.tf | grep -o [0-9\.]*)
PR_NUMBER=${{ github.event.pull_request.number }}
echo "PR_NUMBER=$PR_NUMBER" >> $GITHUB_ENV
echo "DEPLOY_ENV=review_aks" >> $GITHUB_ENV
echo "TF_STATE_FILE=pr-$PR_NUMBER.tfstate" >> $GITHUB_ENV
echo "TERRAFORM_VERSION=$terraform_version" >> $GITHUB_ENV
echo "USE_DB_SETUP_COMMAND=false" >> $GITHUB_ENV
pr_state_file=$(az storage blob list -c ptt-tfstate \
--connection-string $AZURE_STORAGE_CONNECTION_STRING \
--prefix pr-$PR_NUMBER.tfstate --query "[].name" -o tsv)
if [ ! -z "$pr_state_file" ]; then echo "TF_STATE_EXISTS=true" >> $GITHUB_ENV; fi;
tf_vars_file=terraform/aks/workspace_variables/review_aks.tfvars.json
echo "key_vault_name=$(jq -r '.key_vault_name' ${tf_vars_file})" >> $GITHUB_ENV
echo "key_vault_app_secret_name=$(jq -r '.key_vault_app_secret_name' ${tf_vars_file})" >> $GITHUB_ENV
echo "key_vault_infra_secret_name=$(jq -r '.key_vault_infra_secret_name' ${tf_vars_file})" >> $GITHUB_ENV
env:
AZURE_STORAGE_CONNECTION_STRING: ${{ secrets.AZURE_STORAGE_CONNECTION_STRING_REVIEW_AKS }}
- name: Setup Terraform ${{ env.TERRAFORM_VERSION }}
uses: hashicorp/setup-terraform@v3
with:
terraform_version: ${{ env.TERRAFORM_VERSION }}
- uses: azure/login@v2
if: env.TF_STATE_EXISTS == 'true'
with:
creds: ${{ secrets[format('AZURE_CREDENTIALS_REVIEW_AKS')] }}
- name: Validate Azure Key Vault secrets
if: env.TF_STATE_EXISTS == 'true'
uses: DFE-Digital/github-actions/validate-key-vault-secrets@master
with:
KEY_VAULT: ${{ env.key_vault_name }}
SECRETS: |
${{ env.key_vault_app_secret_name }}
${{ env.key_vault_infra_secret_name }}
- uses: DFE-Digital/github-actions/set-kubelogin-environment@master
with:
azure-credentials: ${{ secrets[format('AZURE_CREDENTIALS_REVIEW_AKS')] }}
- name: Terraform Destroy
if: env.TF_STATE_EXISTS == 'true'
run: make ci review_aks destroy
env:
APP_NAME: ${{ env.PR_NUMBER }}
- name: Delete tf state file
if: env.TF_STATE_EXISTS == 'true'
run: |
az storage blob delete -c ptt-tfstate --name ${{ env.TF_STATE_FILE }} \
--connection-string $AZURE_STORAGE_CONNECTION_STRING
env:
AZURE_STORAGE_CONNECTION_STRING: ${{ secrets.AZURE_STORAGE_CONNECTION_STRING_REVIEW_AKS }}
- name: Update ${{ matrix.environment }} status
id: deactivate-env
if: ${{ always() && env.TF_STATE_EXISTS == 'true' }}
uses: bobheadxi/deployments@v1
with:
step: deactivate-env
token: ${{ secrets.GITHUB_TOKEN }}
env: review_aks-${{ env.PR_NUMBER }}
- name: Delete review_aks-${{ env.PR_NUMBER }} environment
if: always() && (steps.deactivate-env.outcome == 'success')
uses: bobheadxi/deployments@v1
with:
step: delete-env
token: ${{ secrets.ACTIONS_API_ACCESS_TOKEN }}
env: review_aks-${{ env.PR_NUMBER }}