mirror of
https://github.com/GSA/notifications-api.git
synced 2025-12-25 09:51:42 -05:00
80 lines
2.7 KiB
YAML
80 lines
2.7 KiB
YAML
name: Deploy to staging environment
|
|
|
|
on:
|
|
workflow_run:
|
|
workflows: [ Run checks ]
|
|
types:
|
|
- completed
|
|
branches: [ main ] # Redundant, workflow_run events are only triggered on default branch (`main`)
|
|
|
|
permissions:
|
|
contents: read
|
|
|
|
jobs:
|
|
deploy:
|
|
runs-on: ubuntu-latest
|
|
if: ${{ github.event.workflow_run.conclusion == 'success' }}
|
|
|
|
environment: staging
|
|
steps:
|
|
- uses: actions/checkout@v3
|
|
with:
|
|
fetch-depth: 2
|
|
|
|
- name: Check for changes to Terraform
|
|
id: changed-terraform-files
|
|
uses: tj-actions/changed-files@v1.1.2
|
|
with:
|
|
files: terraform/staging
|
|
- name: Terraform init
|
|
if: steps.changed-terraform-files.outputs.any_changed == 'true'
|
|
working-directory: terraform/staging
|
|
env:
|
|
AWS_ACCESS_KEY_ID: ${{ secrets.TERRAFORM_STATE_ACCESS_KEY }}
|
|
AWS_SECRET_ACCESS_KEY: ${{ secrets.TERRAFORM_STATE_SECRET_ACCESS_KEY }}
|
|
run: terraform init
|
|
- name: Terraform apply
|
|
if: steps.changed-terraform-files.outputs.any_changed == 'true'
|
|
working-directory: terraform/staging
|
|
env:
|
|
AWS_ACCESS_KEY_ID: ${{ secrets.TERRAFORM_STATE_ACCESS_KEY }}
|
|
AWS_SECRET_ACCESS_KEY: ${{ secrets.TERRAFORM_STATE_SECRET_ACCESS_KEY }}
|
|
TF_VAR_cf_user: ${{ secrets.CLOUDGOV_USERNAME }}
|
|
TF_VAR_cf_password: ${{ secrets.CLOUDGOV_PASSWORD }}
|
|
run: terraform apply -auto-approve -input=false
|
|
|
|
- uses: ./.github/actions/setup-project
|
|
- name: Install application dependencies
|
|
run: make bootstrap
|
|
|
|
- name: Create requirements.txt because Cloud Foundry does a weird pipenv thing
|
|
run: pipenv requirements > requirements.txt
|
|
|
|
- name: Deploy to cloud.gov
|
|
uses: 18f/cg-deploy-action@main
|
|
env:
|
|
DANGEROUS_SALT: ${{ secrets.DANGEROUS_SALT }}
|
|
SECRET_KEY: ${{ secrets.SECRET_KEY }}
|
|
ADMIN_CLIENT_SECRET: ${{ secrets.ADMIN_CLIENT_SECRET }}
|
|
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
|
|
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
|
|
with:
|
|
cf_username: ${{ secrets.CLOUDGOV_USERNAME }}
|
|
cf_password: ${{ secrets.CLOUDGOV_PASSWORD }}
|
|
cf_org: gsa-10x-prototyping
|
|
cf_space: 10x-notifications
|
|
push_arguments: >-
|
|
--vars-file deploy-config/staging.yml
|
|
--var DANGEROUS_SALT="$DANGEROUS_SALT"
|
|
--var SECRET_KEY="$SECRET_KEY"
|
|
--var ADMIN_CLIENT_SECRET="$ADMIN_CLIENT_SECRET"
|
|
--var AWS_ACCESS_KEY_ID="$AWS_ACCESS_KEY_ID"
|
|
--var AWS_SECRET_ACCESS_KEY="$AWS_SECRET_ACCESS_KEY"
|
|
|
|
bail:
|
|
runs-on: ubuntu-latest
|
|
if: ${{ github.event.workflow_run.conclusion == 'failure' }}
|
|
steps:
|
|
- uses: actions/github-script@v6
|
|
script: core.setFailed('Checks failed, not deploying')
|