Break lines correctly in build step #137
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: release | |
on: | |
push: | |
tags: | |
- 'v*' | |
env: | |
GO_VERSION: 1.21.1 | |
concurrency: | |
group: ${{ github.workflow }}-${{ github.ref }} | |
jobs: | |
pre-build: | |
runs-on: ubuntu-20.04 | |
outputs: | |
tag: ${{ steps.tag.outputs.tag }} | |
steps: | |
- uses: actions/checkout@v3 | |
- name: Get tag | |
id: tag | |
uses: dawidd6/action-get-tag@v1 | |
test: | |
needs: [pre-build] | |
if: ${{ github.ref != 'refs/heads/prod' }} | |
uses: kosli-dev/cli/.github/workflows/test.yml@main | |
with: | |
AWS_ACCOUNT_ID: 772819027869 | |
AWS_REGION: eu-central-1 | |
secrets: | |
github_access_token: ${{ secrets.KOSLI_GITHUB_TOKEN }} | |
gitlab_access_token: ${{ secrets.KOSLI_GITLAB_TOKEN }} | |
azure_access_token: ${{ secrets.KOSLI_AZURE_TOKEN }} | |
bitbucket_password: ${{ secrets.KOSLI_BITBUCKET_PASSWORD }} | |
slack_webhook: ${{ secrets.MERKELY_SLACK_CI_FAILURES_WEBHOOK }} | |
slack_channel: ${{ secrets.MERKELY_SLACK_CI_FAILURES_CHANNEL }} | |
jira_api_token: ${{ secrets.KOSLI_JIRA_API_TOKEN }} | |
docker: | |
needs: [test, pre-build] | |
if: ${{ github.ref != 'refs/heads/prod' }} | |
uses: kosli-dev/cli/.github/workflows/docker.yml@main | |
with: | |
tag: ${{ needs.pre-build.outputs.tag }} | |
platforms: linux/amd64 | |
secrets: | |
slack_webhook: ${{ secrets.MERKELY_SLACK_CI_FAILURES_WEBHOOK }} | |
slack_channel: ${{ secrets.MERKELY_SLACK_CI_FAILURES_CHANNEL }} | |
ghcr_user: ${{ secrets.GHCR_USER }} | |
ghcr_token: ${{ secrets.GHCR_TOKEN }} | |
kosli_api_token: ${{ secrets.KOSLI_API_TOKEN }} | |
snyk_token: ${{ secrets.SNYK_TOKEN }} | |
goreleaser: | |
needs: [test] | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v3 | |
with: | |
fetch-depth: 0 | |
- name: Set up Go | |
uses: actions/setup-go@v3 | |
with: | |
go-version: ${{ env.GO_VERSION }} | |
- name: Run GoReleaser | |
uses: goreleaser/goreleaser-action@v2 | |
with: | |
version: latest | |
args: release --clean | |
env: | |
GITHUB_TOKEN: ${{ secrets.GHCR_TOKEN }} | |
FURY_TOKEN: ${{ secrets.FURY_TOKEN }} | |
docs-gen: | |
needs: [goreleaser, pre-build] | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v3 | |
with: | |
fetch-depth: 0 # needed to be able to generate legacy versions reference. | |
- name: Set up Go | |
uses: actions/setup-go@v3 | |
with: | |
go-version: ${{ env.GO_VERSION }} | |
- name: Generate docs | |
env: | |
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | |
# legacy-ref should happen first as it has the side effect of deleting generated files outside the legacy_ref | |
run: | | |
make legacy-ref-docs | |
make cli-docs | |
- name: Generate json | |
run: | | |
echo '{"currentversion": "${{ needs.pre-build.outputs.tag }}"}' > docs.kosli.com/assets/metadata.json | |
- name: Deploy | |
uses: s0/git-publish-subdir-action@develop | |
env: | |
REPO: self | |
BRANCH: docs-main | |
FOLDER: docs.kosli.com | |
TARGET_DIR: docs.kosli.com | |
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | |
MESSAGE: "Release: {msg}" | |
upload-evidence-reporter-package: | |
needs: [pre-build, goreleaser] | |
runs-on: ubuntu-20.04 | |
outputs: | |
kosli_cli_version: ${{ steps.upload-package.outputs.kosli_cli_version }} | |
permissions: | |
id-token: write | |
contents: read | |
steps: | |
- uses: actions/checkout@v3 | |
- name: Configure AWS credentials | |
uses: aws-actions/configure-aws-credentials@v2 | |
with: | |
role-to-assume: arn:aws:iam::${{ secrets.KOSLI_REPORTER_SOURCES_AWS_ACCOUNT_ID }}:role/${{ github.event.repository.name }} | |
aws-region: ${{ secrets.KOSLI_REPORTER_SOURCES_AWS_REGION }} | |
role-duration-seconds: 900 | |
role-session-name: ${{ github.event.repository.name }} | |
- name: Upload evidence reporter lambda package | |
id: upload-package | |
env: | |
TAG: ${{ needs.pre-build.outputs.tag }} | |
S3_NAME: ${{ secrets.KOSLI_REPORTER_SOURCES_S3_NAME }} | |
run: | | |
KOSLI_CLI_VERSION="${TAG:1}" | |
echo "kosli_cli_version=$KOSLI_CLI_VERSION" >> $GITHUB_OUTPUT | |
curl -Lo kosli_${KOSLI_CLI_VERSION}_linux_amd64.tar.gz https://github.com/kosli-dev/cli/releases/download/${TAG}/kosli_${KOSLI_CLI_VERSION}_linux_amd64.tar.gz | |
tar -xf kosli_${KOSLI_CLI_VERSION}_linux_amd64.tar.gz -C . && rm kosli_${KOSLI_CLI_VERSION}_linux_amd64.tar.gz | |
zip -j kosli_evidence_reporter_${KOSLI_CLI_VERSION}.zip deployment/evidence-reporter-src/* kosli | |
aws s3 cp kosli_evidence_reporter_${KOSLI_CLI_VERSION}.zip s3://${{ secrets.KOSLI_REPORTER_SOURCES_S3_NAME }}/kosli_evidence_reporter_${TAG}.zip | |
upload-kosli-reporter-package-prod: | |
needs: [pre-build, goreleaser] | |
uses: kosli-dev/cli/.github/workflows/upload-reporter-package.yml@main | |
with: | |
tag: ${{ needs.pre-build.outputs.tag }} | |
s3_name: reporter-lambda-dacef8339fbd41ce31c346f854a85d0c74f7c4e8 | |
AWS_ACCOUNT_ID: 772819027869 | |
AWS_REGION: eu-central-1 | |
deploy-evidence-reporters: | |
runs-on: ubuntu-20.04 | |
needs: [upload-evidence-reporter-package] | |
steps: | |
- name: Repository Dispatch | |
uses: peter-evans/repository-dispatch@v2 | |
with: | |
token: ${{ secrets.KOSLI_REPORTER_REPO_ACCESS_TOKEN }} | |
repository: kosli-dev/terraform-evidence-reporter | |
event-type: deploy-evidence-reporter | |
client-payload: '{"kosli_cli_version": "${{ needs.upload-evidence-reporter-package.outputs.kosli_cli_version }}"}' | |
deploy-production-reporters: | |
runs-on: ubuntu-20.04 | |
needs: [pre-build, upload-kosli-reporter-package-prod] | |
steps: | |
- name: Repository Dispatch | |
uses: peter-evans/repository-dispatch@v2 | |
with: | |
token: ${{ secrets.KOSLI_REPORTER_REPO_ACCESS_TOKEN }} | |
repository: kosli-dev/kosli-reporter | |
event-type: deploy-reporter | |
client-payload: '{"env": "production", "tag": "${{ needs.pre-build.outputs.tag }}"}' |