-
Notifications
You must be signed in to change notification settings - Fork 3
71 lines (60 loc) · 2.14 KB
/
release.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
name: Release
on:
push:
branches: [main]
jobs:
deploy:
name: Deploy
runs-on: ubuntu-latest
environment:
name: production
url: https://www.dunkman.me
env:
AWS_DEFAULT_REGION: us-east-1
HUGO_ENV: production
steps:
- name: Checkout code
uses: actions/checkout@v2
- uses: actions/cache@v3
with:
path: terraform/.terraform
key: v1-${{ hashFiles('terraform/.terraform.lock.hcl') }}
- uses: actions/cache@v3
with:
path: metascraper/cache
key: v1-${{ hashFiles('metascraper/yarn.lock') }}
- name: Decrypt private contents
run: make decrypt
env:
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
SOPS_KMS_ARN: "${{ secrets.SOPS_KMS_ARN }}"
- name: Build site
run: make build
- name: Scan infrastructure for security issues
run: make tfsec
- name: Initialize terraform
run: make terraform-init
env:
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
- name: Plan infrastructure changes
if: ${{ env.AWS_ACCESS_KEY_ID != '' }}
run: make terraform-plan
env:
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
TF_VAR_friends_and_family_passcode: "${{ secrets.FRIENDS_AND_FAMILY_PASSCODE }}"
- name: Apply infrastructure changes
if: ${{ env.AWS_ACCESS_KEY_ID != '' }}
run: make terraform-apply
env:
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
TF_VAR_friends_and_family_passcode: "${{ secrets.FRIENDS_AND_FAMILY_PASSCODE }}"
- name: Deploy site
if: ${{ env.AWS_ACCESS_KEY_ID != '' }}
run: make deploy
env:
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}