fix: fixing car ownership input descriptor errors (#194) #148
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Build and deploy | |
on: | |
push: | |
branches: ['develop'] | |
paths-ignore: ['devops/**'] | |
workflow_dispatch: | |
jobs: | |
cancel-previous: | |
name: 'Cancel Previous Runs' | |
runs-on: ubuntu-latest | |
timeout-minutes: 3 | |
steps: | |
- uses: styfle/[email protected] | |
with: | |
access_token: ${{ github.token }} | |
unique_id: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Generate unique id | |
id: unique_id | |
run: echo "::set-output name=id::$(uuidgen)" | |
outputs: | |
unique_id: ${{ steps.unique_id.outputs.id }} | |
install-build-and-push: | |
runs-on: ubuntu-latest | |
needs: [cancel-previous, unique_id] | |
steps: | |
- name: Get GHA environment name | |
id: env_vars | |
run: | | |
echo "Running on branch ${{ github.ref }}" | |
if [ "${{ github.ref }}" = "refs/heads/develop" ]; then | |
echo "::set-output name=aws_region::${{ secrets.AWS_REGION }}" | |
echo "::set-output name=aws_access_key_id_ssi::${{ secrets.DEV_AWS_ACCESS_KEY_ID }}" | |
echo "::set-output name=aws_secret_key_ssi::${{ secrets.DEV_AWS_SECRET_ACCESS_KEY }}" | |
echo "::set-output name=aws_ecr_repository_ssi::${{ secrets.DEV_ECR_REPOSITORY }}" | |
echo "::set-output name=aws_access_key_id_idc::${{ secrets.DEV_AWS_ACCESS_KEY_ID_IDC }}" | |
echo "::set-output name=aws_secret_key_idc::${{ secrets.DEV_AWS_SECRET_ACCESS_KEY_IDC }}" | |
echo "::set-output name=aws_ecr_repository_idc::${{ secrets.DEV_ECR_REPOSITORY_IDC }}" | |
echo "::set-output name=argocd_url::${{ secrets.DEV_ARGOCD_URL }}" | |
echo "::set-output name=argocd_username::${{ secrets.DEV_ARGOCD_USERNAME }}" | |
echo "::set-output name=argocd_password::${{ secrets.DEV_ARGOCD_PASS }}" | |
else | |
echo "Branch ${{ github.ref }} is not configured for deployment" | |
exit 1 | |
fi | |
- uses: actions/checkout@v2 | |
- name: Get the tag version | |
id: get_version | |
run: echo ::set-output name=VERSION::${GITHUB_REF#refs/tags/} | |
- name: Bump version and push tag | |
id: tag_version | |
uses: mathieudutour/[email protected] | |
with: | |
github_token: ${{ secrets.GITHUB_TOKEN }} | |
release_branches: develop | |
custom_release_rules: major:major:Major Changes,minor:minor:Minor Changes,chore:patch:Chores | |
- name: Create a GitHub release | |
uses: ncipollo/release-action@v1 | |
with: | |
tag: ${{ steps.tag_version.outputs.new_tag }} | |
name: Release ${{ steps.tag_version.outputs.new_tag }} | |
body: ${{ steps.tag_version.outputs.changelog }} | |
- name: Configure AWS credentials IDC | |
uses: aws-actions/configure-aws-credentials@v1 | |
with: | |
aws-access-key-id: ${{ steps.env_vars.outputs.aws_access_key_id_idc }} | |
aws-secret-access-key: ${{ steps.env_vars.outputs.aws_secret_key_idc }} | |
aws-region: ${{ steps.env_vars.outputs.aws_region }} | |
- name: Login to Amazon ECR | |
id: login-ecr-idc | |
uses: aws-actions/amazon-ecr-login@v1 | |
- name: Build & push docker images IDC | |
env: | |
BUILD_ID: ${{ steps.tag_version.outputs.new_tag }} | |
ECR_REGISTRY: ${{ steps.login-ecr-idc.outputs.registry }} | |
run: | | |
docker build -t $ECR_REGISTRY/${{ steps.env_vars.outputs.aws_ecr_repository_idc }}:$BUILD_ID -f apps/input-descriptor-to-credential/Dockerfile . | |
docker push $ECR_REGISTRY/${{ steps.env_vars.outputs.aws_ecr_repository_idc }}:$BUILD_ID | |
- name: Logout of Amazon ECR | |
if: always() | |
run: docker logout ${{ steps.login-ecr-idc.outputs.registry }} | |
- name: Deploy IDC | |
uses: clowdhaus/argo-cd-action/@v1.9.0 | |
id: argocd_login_idc | |
with: | |
command: login ${{ steps.env_vars.outputs.argocd_url }} | |
options: --insecure --password ${{ steps.env_vars.outputs.argocd_password }} --username ${{ steps.env_vars.outputs.argocd_username }} | |
- name: ArgoCD overvrite IDC values.yaml | |
uses: clowdhaus/argo-cd-action/@v1.9.0 | |
id: argocd_image_tag_overwrite_idc | |
with: | |
command: app set input-descriptor-credential | |
options: -p image.tag=${{ steps.tag_version.outputs.new_tag }} |