forked from Sunbird-Obsrv/obsrv-web-console
-
Notifications
You must be signed in to change notification settings - Fork 1
110 lines (102 loc) · 3.92 KB
/
build_and_deployment.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
name: Obsrv web console service build and deploy workflow
run-name: Workflow run for ${{ github.ref }}
on:
push:
tags:
- '*'
workflow_dispatch:
inputs:
aws-deploy:
type: boolean
required: true
default: false
jobs:
check-tag:
runs-on: ubuntu-latest
outputs:
ALLOWED_TAG: ${{ steps.tag-checker.outputs.TRIGGER_ALLOWED }}
steps:
- name: Check if tag is one in list of current releases
id: tag-checker
run: |
(echo -n TRIGGER_ALLOWED= && echo 'print("${{ github.ref_name }}".split("_")[0] in "${{ vars.CURRENT_RELEASE }}")' | python3) >> "$GITHUB_OUTPUT"
docker-build:
# needs: check-tag
# if: needs.check-tag.outputs.ALLOWED_TAG == 'True'
runs-on: ubuntu-latest
steps:
- name: Login to docker hub
uses: docker/login-action@v2
with:
username: ${{ vars.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
- name: Build docker image and push
uses: docker/build-push-action@v4
with:
push: true
tags: ${{ vars.DOCKERHUB_USERNAME }}/obsrv-web-console:${{ github.ref_name }}
aws-deploy:
needs: [check-tag, docker-build]
# if: needs.check-tag.outputs.ALLOWED_TAG == 'True'
if: needs.check-tag.outputs.ALLOWED_TAG == 'True' && github.event.inputs.aws-deploy == 'True'
runs-on: ubuntu-latest
environment: aws-dev
steps:
- name: Checkout
uses: actions/checkout@v2
- name: Setup Terragrunt
uses: autero1/action-terragrunt@v1.1.0
with:
terragrunt_version: v0.45.8
- name: Terragrunt installation
run: terragrunt --version
- name: Clone the terraform deployment repo
uses: actions/checkout@v3
with:
repository: ${{ vars.DEPLOY_REPO }}
path: deploy
ref: ${{ vars.DEPLOY_REPO_REF }}
- name: Fetch and update kubeconfig file
env:
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
AWS_REGION: ${{ vars.AWS_REGION }}
run: |
aws eks --region ${{ vars.AWS_REGION }} update-kubeconfig --name ${{ vars.KUBERNETES_CLUSTER_NAME }}
- name: Run terraform init and apply
env:
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
AWS_REGION: ${{ vars.AWS_REGION }}
AWS_TERRAFORM_BACKEND_BUCKET_NAME: ${{ vars.AWS_TERRAFORM_BACKEND_BUCKET_NAME }}
AWS_TERRAFORM_BACKEND_BUCKET_REGION: ${{ vars.AWS_TERRAFORM_BACKEND_BUCKET_REGION }}
KUBE_CONFIG_PATH: ~/.kube/config
run: |
cd deploy/terraform/aws
terragrunt init
terragrunt apply -auto-approve --target=module.web_console \
-var web_console_image_repository=${{ vars.DOCKERHUB_USERNAME }} \
-var web_console_image_tag=${{ github.ref_name }}
azure-deploy:
needs: [check-tag, docker-build]
if: needs.check-tag.outputs.ALLOWED_TAG == 'True' && vars.CLOUD_PROVIDER == 'azure'
runs-on: ubuntu-latest
steps:
- name: Clone the terraform deployment repo
uses: actions/checkout@v3
with:
repository: ${{ vars.DEPLOY_REPO }}
path: deploy
ref: ${{ vars.DEPLOY_REPO_REF }}
- name: Run terraform init and apply
env:
ARM_CLIENT_ID: ${{ secrets.ARM_CLIENT_ID }}
ARM_CLIENT_SECRET: ${{ secrets.ARM_CLIENT_SECRET }}
ARM_SUBSCRIPTION_ID: ${{ secrets.ARM_SUBSCRIPTION_ID }}
ARM_TENANT_ID: ${{ secrets.ARM_TENANT_ID }}
run: |
cd deploy/terraform/azure
terragrunt init
terragrunt apply -auto-approve --target=module.dataset_api \
-var dataset_api_container_registry=${{ secrets.DOCKERHUB_USERNAME }} \
-var dataset_api_image_tag=${{ github.ref_name }}