mirror of
https://github.com/GSA/notifications-api.git
synced 2025-12-26 10:21:33 -05:00
85 lines
2.8 KiB
YAML
85 lines
2.8 KiB
YAML
name: Deploy to prototype environment
|
|
|
|
on:
|
|
workflow_run:
|
|
workflows: [ Run checks ]
|
|
types:
|
|
- completed
|
|
branches: [ main ] # Redundant, workflow_run events are only triggered on default branch (`main`)
|
|
|
|
permissions:
|
|
contents: read
|
|
|
|
jobs:
|
|
deploy:
|
|
runs-on: ubuntu-latest
|
|
if: ${{ github.event.workflow_run.conclusion == 'success' }}
|
|
|
|
steps:
|
|
- name: Install container dependencies
|
|
run: |
|
|
sudo apt-get update \
|
|
&& sudo apt-get install -y --no-install-recommends \
|
|
libcurl4-openssl-dev
|
|
|
|
- uses: actions/checkout@v3
|
|
with:
|
|
fetch-depth: 2
|
|
|
|
- name: Check for changes to Terraform
|
|
id: changed-terraform-files
|
|
uses: tj-actions/changed-files@v1.1.2
|
|
with:
|
|
files: terraform/staging
|
|
- name: Terraform init
|
|
if: steps.changed-terraform-files.outputs.any_changed == 'true'
|
|
working-directory: terraform/staging
|
|
env:
|
|
AWS_ACCESS_KEY_ID: ${{ secrets.TERRAFORM_STATE_ACCESS_KEY }}
|
|
AWS_SECRET_ACCESS_KEY: ${{ secrets.TERRAFORM_STATE_SECRET_ACCESS_KEY }}
|
|
run: terraform init
|
|
- name: Terraform apply
|
|
if: steps.changed-terraform-files.outputs.any_changed == 'true'
|
|
working-directory: terraform/staging
|
|
env:
|
|
AWS_ACCESS_KEY_ID: ${{ secrets.TERRAFORM_STATE_ACCESS_KEY }}
|
|
AWS_SECRET_ACCESS_KEY: ${{ secrets.TERRAFORM_STATE_SECRET_ACCESS_KEY }}
|
|
TF_VAR_cf_user: ${{ secrets.CLOUDGOV_USERNAME }}
|
|
TF_VAR_cf_password: ${{ secrets.CLOUDGOV_PASSWORD }}
|
|
run: terraform apply -auto-approve -input=false
|
|
|
|
- name: Set up Python 3.9
|
|
uses: actions/setup-python@v3
|
|
with:
|
|
python-version: "3.9"
|
|
|
|
- name: Install application dependencies
|
|
run: make bootstrap
|
|
|
|
- name: Deploy to cloud.gov
|
|
uses: 18f/cg-deploy-action@main
|
|
env:
|
|
DANGEROUS_SALT: ${{ secrets.PROD_DANGEROUS_SALT }}
|
|
SECRET_KEY: ${{ secrets.PROD_SECRET_KEY }}
|
|
ADMIN_CLIENT_SECRET: ${{ secrets.PROD_ADMIN_CLIENT_SECRET }}
|
|
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
|
|
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
|
|
with:
|
|
cf_username: ${{ secrets.cloudgov_username }}
|
|
cf_password: ${{ secrets.cloudgov_password }}
|
|
cf_org: gsa-10x-prototyping
|
|
cf_space: 10x-notifications
|
|
push_arguments: >-
|
|
--var env=staging
|
|
--var DANGEROUS_SALT="$DANGEROUS_SALT"
|
|
--var SECRET_KEY="$SECRET_KEY"
|
|
--var ADMIN_CLIENT_SECRET="$ADMIN_CLIENT_SECRET"
|
|
--var AWS_ACCESS_KEY_ID="$AWS_ACCESS_KEY_ID"
|
|
--var AWS_SECRET_ACCESS_KEY="$AWS_SECRET_ACCESS_KEY"
|
|
|
|
bail:
|
|
runs-on: ubuntu-latest
|
|
if: ${{ github.event.workflow_run.conclusion == 'failure' }}
|
|
steps:
|
|
- run: echo 'Checks failed, not deploying'
|