-
Notifications
You must be signed in to change notification settings - Fork 0
230 lines (208 loc) · 10.4 KB
/
terraform-plan.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
name: Terraform plan check
on:
pull_request:
branches: ["main"]
permissions:
id-token: write
contents: read
pull-requests: write
issues: write
env:
ARM_CLIENT_ID: ${{ secrets.AZURE_CLIENT_ID }}
ARM_SUBSCRIPTION_ID: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
ARM_TENANT_ID: ${{ secrets.AZURE_TENANT_ID }}
ARM_USE_OIDC: true
TF_VAR_subscription_id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
TF_VAR_local_admin_user: ${{ secrets.localAdminUser }}
TF_VAR_hci_0_local_admin_user: ${{ secrets.localAdminUser }}
TF_VAR_local_admin_password: ${{ secrets.localAdminPassword }}
TF_VAR_hci_0_local_admin_password: ${{ secrets.localAdminPassword }}
TF_VAR_domain_admin_user: ${{ secrets.domainAdminUser }}
TF_VAR_domain_admin_password: ${{ secrets.domainAdminPassword }}
TF_VAR_deployment_user_password: ${{ secrets.deploymentUserPassword }}
TF_VAR_hci_0_deployment_user_password: ${{ secrets.deploymentUserPassword }}
TF_VAR_service_principal_id: ${{ secrets.servicePrincipalId }}
TF_VAR_hci_0_service_principal_id: ${{ secrets.servicePrincipalId }}
TF_VAR_service_principal_secret: ${{ secrets.servicePrincipalSecret }}
TF_VAR_hci_0_service_principal_secret: ${{ secrets.servicePrincipalSecret }}
TF_VAR_rp_service_principal_object_id: ${{ secrets.rpServicePrincipalObjectId }}
TF_VAR_vm_admin_password: ${{ secrets.vmAdminPassword }}
TF_VAR_domain_join_password: ${{ secrets.domainJoinPassword }}
jobs:
provide_paths:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v3
with:
fetch-depth: 0
- name: Check diff to see what content is changed
id: check_diff
run: |
## the || true is to avoid the exit code 1 of grep when no tf files are changed
changedFiles=$(git diff --name-only origin/main HEAD -- | grep ".tf" || true)
if [ -z "$changedFiles" ]; then
echo "No terraform files are changed"
echo "isModuleChanged=false" >> $GITHUB_OUTPUT
echo "planNeeded=false" >> $GITHUB_OUTPUT
exit 0
fi
echo "changedFiles=$changedFiles"
if [[ $changedFiles == *"modules"* ]]; then
echo "changedFiles contain modules"
echo "isModuleChanged=true" >> $GITHUB_OUTPUT
else
echo "changedFiles do not contain modules"
echo "isModuleChanged=false" >> $GITHUB_OUTPUT
fi
## get changed directories
echo "generate directory based on changed files"
directories=$(echo "$changedFiles" | xargs -n 1 dirname | sort -u | tr '\n' ' ')
echo "directory=$directories" >> $GITHUB_OUTPUT
- name: Set matrix
id: set-matrix
run: |
array=()
if !${{ steps.check_diff.outputs.planNeeded }}; then
echo "No directories to process, no need to plan"
echo "planNeeded=false" >> $GITHUB_OUTPUT
exit 0
fi
if ${{ steps.check_diff.outputs.isModuleChanged }}; then
echo "the module is changed, so generate the matrix based on the stages and sites"
readarray -t stages < ./.stages
for count in "${!stages[@]}"; do
stage=${stages[$count]}
pushd ./$stage > /dev/null
for d in */ ; do
if [[ $d == "*/" ]]; then
break
fi
group=$(echo "$d" | sed 's/\///g' | sed 's/ /_/g')
array+=("$stage/$group")
break
done
popd > /dev/null
done
fi
echo "also generate the matrix based on the changed directories"
IFS=' ' read -ra dirs <<< "${{ steps.check_diff.outputs.directory }}"
for i in "${dirs[@]}"; do
if [[ "$i" != ".azure" && "$i" != *"module"* ]]
then
array+=("$i")
fi
done
if [ ${#array[@]} -eq 0 ]; then
echo "No directories to process"
echo "planNeeded=false" >> $GITHUB_OUTPUT
else
echo "planNeeded=true" >> $GITHUB_OUTPUT
fi
echo "remove duplicates directory and sort"
sorted_array=($(echo "${array[@]}" | tr ' ' '\n' | sort -u | tr '\n' ' '))
echo "check directories is exist"
checkarray=()
for i in "${sorted_array[@]}"; do
if [ -d "$i" ]; then
checkarray+=("$i")
fi
done
json=$(jq --compact-output --null-input '$ARGS.positional' --args -- "${checkarray[@]}")
echo "matrix=$json"
echo "matrix=$json" >> $GITHUB_OUTPUT
outputs:
matrix: ${{ steps.set-matrix.outputs.matrix }}
planNeeded: ${{ steps.check_diff.outputs.planNeeded }}
terraform_plan_comments:
runs-on: ubuntu-latest
needs: provide_paths
if: needs.provide_paths.outputs.planNeeded != 'false'
strategy:
matrix:
path: ${{fromJson(needs.provide_paths.outputs.matrix)}}
steps:
- name: Checkout
uses: actions/checkout@v3
- name: Log in to Azure using OIDC
uses: azure/login@v1
with:
client-id: ${{ secrets.AZURE_CLIENT_ID }}
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
# Install node
- uses: actions/setup-node@v4
with:
node-version: latest
- run: node --version
# Install the latest version of Terraform CLI
- name: Setup Terraform
uses: hashicorp/setup-terraform@v2
with:
terraform_wrapper: false
# Initialize a new or existing Terraform working directory by creating initial files, loading any remote state, downloading modules, etc.
- name: Terraform Init
id: init
run: terraform init
working-directory: ${{ matrix.path }}
- name: Terraform Fmt
id: fmt
run: terraform fmt -check
working-directory: ${{ matrix.path }}
continue-on-error: true
- name: Terraform Validate
id: validate
run: terraform validate -no-color
working-directory: ${{ matrix.path }}
- run: mkdir -p "${{ runner.temp }}/${{ matrix.path }}"
# Generates an execution plan for Terraform
- name: Terraform Plan
id: plan
run: terraform plan -input=false -lock=false -out "${{ runner.temp }}/${{ matrix.path }}/terraform.plan"
working-directory: ${{ matrix.path }}
- run: terraform show -no-color "${{ runner.temp }}/${{ matrix.path }}/terraform.plan" > "${{ runner.temp }}/${{ matrix.path }}/terraform.text"
working-directory: ${{ matrix.path }}
# generate json output
- run: |
# this is a known issue for ahmadnassri/action-terraform-report when plan result is no change
terraform show -json ${{ runner.temp }}/${{ matrix.path }}/terraform.plan > ${{ runner.temp }}/${{ matrix.path }}/tf-temp.json
# check if the .resource_changes is null in the tf.plan file and if it is,
# add an empty array to the json file else don't do anything.
if [ "$(jq '.resource_changes' ${{ runner.temp }}/${{ matrix.path }}/tf-temp.json)" == "null" ]; then
echo "resource_changes is null"
jq --argjson to_add '{"resource_changes":[]}' '. * $to_add' ${{ runner.temp }}/${{ matrix.path }}/tf-temp.json > ${{ runner.temp }}/${{ matrix.path }}/terraform.json
else
echo "resource_changes is not null"
cp ${{ runner.temp }}/${{ matrix.path }}/tf-temp.json ${{ runner.temp }}/${{ matrix.path }}/terraform.json
fi
working-directory: ${{ matrix.path }}
if: steps.plan.outcome == 'success'
- name: Update Pull Request
uses: actions/github-script@v7
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
script: |
const output = `#### Terraform plan run for \`${{ matrix.path }}\`
#### Terraform Initialization 🤖\`${{ steps.init.outcome }}\`
#### Terraform Format and Style 🖌\`${{ steps.fmt.outcome }}\`
#### You can run terraform fmt to fix the formatting issues
#### Terraform Validation 🤖\`${{ steps.validate.outcome }}\`
#### Terraform Plan 🤖\`${{ steps.plan.outcome }}\`
*Pushed by: @${{ github.actor }}, Action: \`${{ github.event_name }}\`*`;
github.rest.issues.createComment({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
body: output
})
if: always()
- uses: ahmadnassri/action-terraform-report@v3
with:
# tell the action the plan outputs
terraform-text: ${{ runner.temp }}/${{ matrix.path }}/terraform.text
terraform-json: ${{ runner.temp }}/${{ matrix.path }}/terraform.json
remove-stale-reports: false
if: steps.plan.outcome == 'success'
- name: Terraform Plan Status
if: steps.plan.outcome == 'failure'
run: exit 1