Skip to content

Switch 18f deprecated tool for ssb. #268

Switch 18f deprecated tool for ssb.

Switch 18f deprecated tool for ssb. #268

Workflow file for this run

---
name: plan
on:
pull_request:
env:
AWS_ACCESS_KEY_ID: "${{ secrets.AWS_ACCESS_KEY_ID }}"
AWS_SECRET_ACCESS_KEY: "${{ secrets.AWS_SECRET_ACCESS_KEY }}"
BUCKET: "${{ secrets.BUCKET }}"
REGION: "${{ secrets.REGION }}"
KEY: "ssb-tfstate"
ENCRYPT: "true"
jobs:
plan-staging:
name: plan (staging)
runs-on: ubuntu-latest
environment: staging
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
TF_VAR_cf_username: ${{ secrets.TF_VAR_cf_username }}
TF_VAR_cf_password: ${{ secrets.TF_VAR_cf_password }}
TF_VAR_aws_access_key_id: ${{ secrets.TF_VAR_aws_access_key_id }}
TF_VAR_aws_secret_access_key: ${{ secrets.TF_VAR_aws_secret_access_key }}
steps:
- name: checkout
uses: actions/checkout@v3
- name: prep applications
run: |
./app-setup-smtp.sh
./app-setup-sms.sh
- name: terraform plan (staging)
uses: dflook/terraform-plan@v1
with:
path: .
label: staging
workspace: staging
var_file: terraform.staging.tfvars
backend_config: >
bucket=${{ env.BUCKET }},
key=${{ env.KEY }},
region=${{ env.REGION }},
encrypt=${{ env.ENCRYPT }},
access_key=${{ env.AWS_ACCESS_KEY_ID }},
secret_key=${{ env.AWS_SECRET_ACCESS_KEY }}
plan-production:
name: plan (production)
runs-on: ubuntu-latest
environment: production
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
TF_VAR_cf_username: ${{ secrets.TF_VAR_cf_username }}
TF_VAR_cf_password: ${{ secrets.TF_VAR_cf_password }}
TF_VAR_aws_access_key_id: ${{ secrets.TF_VAR_aws_access_key_id }}
TF_VAR_aws_secret_access_key: ${{ secrets.TF_VAR_aws_secret_access_key }}
steps:
- name: checkout
uses: actions/checkout@v3
- name: prep applications
run: |
./app-setup-smtp.sh
./app-setup-sms.sh
- name: terraform plan (production)
uses: dflook/terraform-plan@v1
with:
path: .
label: production
workspace: default
var_file: terraform.production.tfvars
backend_config: >
bucket=${{ env.BUCKET }},
key=${{ env.KEY }},
region=${{ env.REGION }},
encrypt=${{ env.ENCRYPT }},
access_key=${{ env.AWS_ACCESS_KEY_ID }},
secret_key=${{ env.AWS_SECRET_ACCESS_KEY }}