Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update github actions all dependencies (major) #1670

Merged
merged 2 commits into from
Nov 22, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/ci_auth_artifact.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ jobs:
rm -rf auth_function_packaging

- name: Auth function upload zip file artifact
uses: actions/upload-artifact@v3
uses: actions/upload-artifact@v4
with:
name: fam-auth-function-zip
path: ./infrastructure/server/fam_auth_function.zip
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/release-please-hotfix.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ jobs:
release-please:
runs-on: ubuntu-latest
steps:
- uses: google-github-actions/release-please-action@v3
- uses: google-github-actions/release-please-action@v4
with:
release-type: simple
package-name: release-please-action
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/release-please.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ jobs:
release-please:
runs-on: ubuntu-latest
steps:
- uses: google-github-actions/release-please-action@v3
- uses: google-github-actions/release-please-action@v4
with:
release-type: simple
package-name: release-please-action
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/reusable_data_model_gen.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ jobs:
outputs:
user: ${{ steps.data.outputs.user }}
pass: ${{ steps.data.outputs.pass }}
runs-on: ubuntu-22.04
runs-on: ubuntu-24.04
timeout-minutes: 1
steps:
- name: Generate random username and password
Expand All @@ -24,7 +24,7 @@ jobs:

schemaspy:
name: Generate Documentation
runs-on: ubuntu-22.04
runs-on: ubuntu-24.04
needs: [vars]
services:
postgres:
Expand Down
144 changes: 72 additions & 72 deletions .github/workflows/reusable_terraform_frontend.yml
Original file line number Diff line number Diff line change
@@ -1,87 +1,87 @@
name: Run Terraform (Frontend)

on:
workflow_call:
inputs:
environment_name:
required: true
type: string
tf_subcommand:
required: true
type: string
secrets:
licenceplate:
required: true
workflow_call:
inputs:
environment_name:
required: true
type: string
tf_subcommand:
required: true
type: string
secrets:
licenceplate:
required: true

env:
TF_VERSION: 1.2.2
TG_VERSION: 0.37.1
TG_SRC_PATH: terraform-frontend
TG_SERVER_SRC_PATH: terraform
AWS_REGION: ca-central-1
TF_VERSION: 1.2.2
TG_VERSION: 0.37.1
TG_SRC_PATH: terraform-frontend
TG_SERVER_SRC_PATH: terraform
AWS_REGION: ca-central-1

jobs:
aws-frontend-deployment:
name: Run Terraform to Deploy Frontend
runs-on: ubuntu-latest
environment: ${{ inputs.environment_name }}
aws-frontend-deployment:
name: Run Terraform to Deploy Frontend
runs-on: ubuntu-latest
environment: ${{ inputs.environment_name }}

env:
AWS_OIDC_GHA_ROLE: ${{ vars.FAM_GHA_ROLE }} # AWS-GHA OIDC auth role.
env:
AWS_OIDC_GHA_ROLE: ${{ vars.FAM_GHA_ROLE }} # AWS-GHA OIDC auth role.

steps:
- name: Checkout
uses: actions/checkout@v4
steps:
- name: Checkout
uses: actions/checkout@v4

- name: Build Frontend
working-directory: frontend
run: |
npm run install-frontend
npm run build
mkdir ../infrastructure/frontend/dist
rsync -r dist/* ../infrastructure/frontend/dist
- name: Build Frontend
working-directory: frontend
run: |
npm run install-frontend
npm run build
mkdir ../infrastructure/frontend/dist
rsync -r dist/* ../infrastructure/frontend/dist

- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@v4
with:
role-to-assume: ${{ env.AWS_OIDC_GHA_ROLE }}
role-session-name: frontend-${{ inputs.environment_name }}-deployment
aws-region: ${{ env.AWS_REGION }}
- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@v4
with:
role-to-assume: ${{ env.AWS_OIDC_GHA_ROLE }}
role-session-name: frontend-${{ inputs.environment_name }}-deployment
aws-region: ${{ env.AWS_REGION }}

- name: Setup Terragrunt
uses: autero1/action-terragrunt@v1.3.2
with:
terragrunt_version: ${{ env.TG_VERSION }}
- name: Setup Terragrunt
uses: autero1/action-terragrunt@v3.0.2
with:
terragrunt-version: ${{ env.TG_VERSION }}

- id: terragrunt-server-output
name: Terragrunt Server Output
working-directory: ${{ env.TG_SERVER_SRC_PATH }}/${{ inputs.environment_name }}
env:
licenceplate: ${{ secrets.licenceplate }}
target_env: ${{ inputs.environment_name }}
run: |
# Run terraform
cat > github.auto.tfvars <<EOF
oidc_idir_idp_client_secret = "NA"
oidc_bceid_business_idp_client_secret = "NA"
db_cluster_snapshot_identifier = "NA"
execute_flyway = false
EOF
terragrunt run-all output -json > ../../infrastructure/frontend/dist/env.json
- id: terragrunt-server-output
name: Terragrunt Server Output
working-directory: ${{ env.TG_SERVER_SRC_PATH }}/${{ inputs.environment_name }}
env:
licenceplate: ${{ secrets.licenceplate }}
target_env: ${{ inputs.environment_name }}
run: |
# Run terraform
cat > github.auto.tfvars <<EOF
oidc_idir_idp_client_secret = "NA"
oidc_bceid_business_idp_client_secret = "NA"
db_cluster_snapshot_identifier = "NA"
execute_flyway = false
EOF
terragrunt run-all output -json > ../../infrastructure/frontend/dist/env.json

- id: terragrunt-server-output-test
working-directory: infrastructure/frontend/dist
name: Terragrunt Server Output Verify
run: |
echo "printing out contents of env.json"
echo "===================================="
cat env.json
echo "===================================="
- id: terragrunt-server-output-test
working-directory: infrastructure/frontend/dist
name: Terragrunt Server Output Verify
run: |
echo "printing out contents of env.json"
echo "===================================="
cat env.json
echo "===================================="

- name: Terragrunt ${{ inputs.tf_subcommand }}
working-directory: ${{ env.TG_SRC_PATH }}/${{ inputs.environment_name }}
env:
licenceplate: ${{ secrets.licenceplate }}
target_env: ${{ inputs.environment_name }}
run: |
terragrunt run-all ${{ inputs.tf_subcommand }} --terragrunt-non-interactive
- name: Terragrunt ${{ inputs.tf_subcommand }}
working-directory: ${{ env.TG_SRC_PATH }}/${{ inputs.environment_name }}
env:
licenceplate: ${{ secrets.licenceplate }}
target_env: ${{ inputs.environment_name }}
run: |
terragrunt run-all ${{ inputs.tf_subcommand }} --terragrunt-non-interactive
Loading
Loading