-
Notifications
You must be signed in to change notification settings - Fork 0
234 lines (199 loc) · 10.7 KB
/
test-gha-eks.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
---
name: EKS Cluster with an AuroraDB and OpenSearch creation and destruction test
on:
schedule:
- cron: 0 1 * * 2 # At 01:00 on Tuesday.
workflow_dispatch:
inputs:
cluster_name:
description: Cluster name.
required: false
type: string
create_db:
description: Should the aurora db be created
default: 'true'
create_opensearch:
description: Should the opensearch domain be created
default: 'true'
delete_cluster:
description: Whether to delete the cluster.
default: 'true'
db_username:
description: Database username.
required: false
type: string
db_password:
description: Database password.
required: false
type: string
opensearch_username:
description: OpenSearch username.
required: false
type: string
opensearch_password:
description: OpenSearch password.
required: false
type: string
pull_request:
# the paths should be synced with ../labeler.yml
paths:
- modules/fixtures/backend.tf
- modules/fixtures/fixtures.default.eks.tfvars
- modules/fixtures/fixtures.default.aurora.tfvars
- modules/eks-cluster/**.tf
- modules/aurora/**.tf
- .tool-versions
- .github/workflows/test-gha-eks.yml
- .github/actions/*/*.yml
# limit to a single execution per actor of this workflow
concurrency:
group: ${{ github.workflow }}-${{ github.ref }}
cancel-in-progress: true
env:
AWS_PROFILE: infex
AWS_REGION: eu-west-2
# /!\ always use one of the available test region https://github.com/camunda/infraex-common-config
# please keep those synced with tests.yml
TF_STATE_BUCKET: tests-eks-tf-state-eu-central-1
TF_STATE_BUCKET_REGION: eu-central-1
CREATE_DB: ${{ github.event.inputs.create_db || 'true' }}
CREATE_OPENSEARCH: ${{ github.event.inputs.create_opensearch || 'true' }}
jobs:
action-test:
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
with:
ref: ${{ github.head_ref }}
fetch-depth: 0
- name: Install tooling using asdf
uses: asdf-vm/actions/install@05e0d2ed97b598bfce82fd30daf324ae0c4570e6 # v3
- name: Get Cluster Info
id: commit_info
run: |
if [[ -n "${{ inputs.cluster_name }}" ]]; then
cluster_name="${{ inputs.cluster_name }}"
else
cluster_name="cl-$(git rev-parse --short HEAD)-t"
fi
echo "cluster_name=$cluster_name" | tee -a "$GITHUB_OUTPUT"
if [[ -n "${{ inputs.db_username }}" ]]; then
db_username="${{ inputs.db_username }}"
else
db_username="user$(openssl rand -hex 4 | tr -d '/@" ')"
fi
echo "db_username=$db_username" | tee -a "$GITHUB_OUTPUT"
if [[ -n "${{ inputs.db_password }}" ]]; then
db_password="${{ inputs.db_password }}"
else
db_password="$(openssl rand -base64 12 | tr -d '/@" ')"
fi
echo "db_password=$db_password" | tee -a "$GITHUB_OUTPUT"
if [[ -n "${{ inputs.opensearch_username }}" ]]; then
opensearch_username="${{ inputs.opensearch_username }}"
else
opensearch_username="user$(openssl rand -hex 4 | tr -d '/@" ')"
fi
echo "opensearch_username=$opensearch_username" | tee -a "$GITHUB_OUTPUT"
if [[ -n "${{ inputs.opensearch_password }}" ]]; then
opensearch_password="${{ inputs.opensearch_password }}"
else
opensearch_password="$(openssl rand -base64 12 | tr -d '/@" ')"
fi
echo "opensearch_password=$opensearch_password" | tee -a "$GITHUB_OUTPUT"
# Get the current commit hash for the modules revision
tf_modules_revision=$(git rev-parse HEAD)
echo "tf_modules_revision=$tf_modules_revision" | tee -a "$GITHUB_OUTPUT"
- name: Import Secrets
id: secrets
uses: hashicorp/vault-action@d1720f055e0635fd932a1d2a48f87a666a57906c # v3
with:
url: ${{ secrets.VAULT_ADDR }}
method: approle
roleId: ${{ secrets.VAULT_ROLE_ID }}
secretId: ${{ secrets.VAULT_SECRET_ID }}
exportEnv: false
secrets: |
secret/data/products/infrastructure-experience/ci/common AWS_ACCESS_KEY;
secret/data/products/infrastructure-experience/ci/common AWS_SECRET_KEY;
- name: Add profile credentials to ~/.aws/credentials
run: |
aws configure set aws_access_key_id ${{ steps.secrets.outputs.AWS_ACCESS_KEY }} --profile ${{ env.AWS_PROFILE }}
aws configure set aws_secret_access_key ${{ steps.secrets.outputs.AWS_SECRET_KEY }} --profile ${{ env.AWS_PROFILE }}
aws configure set region ${{ env.AWS_REGION }} --profile ${{ env.AWS_PROFILE }}
- name: Create EKS Cluster
timeout-minutes: 45
uses: ./.github/actions/eks-manage-cluster
id: create_eks_cluster
with:
cluster-name: ${{ steps.commit_info.outputs.cluster_name }}
aws-region: ${{ env.AWS_REGION }}
additional-terraform-vars: '{"np_capacity_type": "SPOT", "np_instance_types": ["t2.medium"]}'
s3-backend-bucket: ${{ env.TF_STATE_BUCKET }}
s3-bucket-region: ${{ env.TF_STATE_BUCKET_REGION }}
tf-modules-revision: ${{ steps.commit_info.outputs.tf_modules_revision }}
- name: After EKS creation infos
id: after_cluster_creation_infos
run: |
vpc_id=$(echo '${{ steps.create_eks_cluster.outputs.all-terraform-outputs }}' | jq -c -r '.vpc_id.value')
echo "vpc_id=$vpc_id" | tee -a "$GITHUB_OUTPUT"
private_subnet_ids=$(echo '${{ steps.create_eks_cluster.outputs.all-terraform-outputs }}' | jq -c -r '.private_subnet_ids.value')
echo "private_subnet_ids=$private_subnet_ids" | tee -a "$GITHUB_OUTPUT"
private_vpc_cidr_blocks=$(echo '${{ steps.create_eks_cluster.outputs.all-terraform-outputs }}' | jq -c -r '.private_vpc_cidr_blocks.value')
echo "private_vpc_cidr_blocks=$private_vpc_cidr_blocks" | tee -a "$GITHUB_OUTPUT"
availability_zones=$(aws ec2 describe-subnets --filters "Name=vpc-id,Values=${vpc_id}" --query 'Subnets[].AvailabilityZone' --output json | jq 'unique' -c)
echo "availability_zones=$availability_zones" | tee -a "$GITHUB_OUTPUT"
- name: Create Aurora Cluster
timeout-minutes: 20
uses: ./.github/actions/aurora-manage-cluster
id: create_aurora_cluster
if: env.CREATE_DB == 'true'
with:
cluster-name: ${{ steps.commit_info.outputs.cluster_name }}
username: ${{ steps.commit_info.outputs.db_username }}
password: ${{ steps.commit_info.outputs.db_password }}
aws-region: ${{ env.AWS_REGION }}
s3-backend-bucket: ${{ env.TF_STATE_BUCKET }}
s3-bucket-region: ${{ env.TF_STATE_BUCKET_REGION }}
tf-modules-revision: ${{ steps.commit_info.outputs.tf_modules_revision }}
vpc-id: ${{ steps.after_cluster_creation_infos.outputs.vpc_id }}
subnet-ids: ${{ steps.after_cluster_creation_infos.outputs.private_subnet_ids }}
cidr-blocks: ${{ steps.after_cluster_creation_infos.outputs.private_vpc_cidr_blocks }}
availability-zones: ${{ steps.after_cluster_creation_infos.outputs.availability_zones }}
- name: Deploy OpenSearch Domain
uses: ./.github/actions/opensearch-manage-cluster
id: deploy_opensearch_domain
if: env.CREATE_OPENSEARCH == 'true'
with:
domain-name: ${{ steps.commit_info.outputs.cluster_name }}-opensearch
aws-region: ${{ env.AWS_REGION }}
vpc-id: ${{ steps.after_cluster_creation_infos.outputs.vpc_id }}
subnet-ids: ${{ steps.after_cluster_creation_infos.outputs.private_subnet_ids }}
cidr-blocks: ${{ steps.after_cluster_creation_infos.outputs.private_vpc_cidr_blocks }}
additional-terraform-vars: |
{
"advanced_security_master_user_name": "${{ steps.commit_info.outputs.opensearch_username }}",
"advanced_security_master_user_password": "${{ steps.commit_info.outputs.opensearch_password }}",
"advanced_security_internal_user_database_enabled": true
}
s3-backend-bucket: ${{ env.TF_STATE_BUCKET }}
s3-bucket-region: ${{ env.TF_STATE_BUCKET_REGION }}
tf-modules-revision: ${{ steps.commit_info.outputs.tf_modules_revision }}
- name: Delete Resources
timeout-minutes: 120
if: always() && !(github.event_name == 'workflow_dispatch' && inputs.delete_cluster == 'false')
uses: ./.github/actions/eks-cleanup-resources
with:
tf-bucket: ${{ env.TF_STATE_BUCKET }}
tf-bucket-region: ${{ env.TF_STATE_BUCKET_REGION }}
max-age-hours: 0
target: ${{ steps.commit_info.outputs.cluster_name }}
- name: Notify in Slack in case of failure
id: slack-notification
if: failure() && github.event_name == 'schedule'
uses: camunda/infraex-common-config/.github/actions/report-failure-on-slack@1b6af8e7117e4e9bdf777911b7a724879b59fcfe # 1.2.4
with:
vault_addr: ${{ secrets.VAULT_ADDR }}
vault_role_id: ${{ secrets.VAULT_ROLE_ID }}
vault_secret_id: ${{ secrets.VAULT_SECRET_ID }}