Skip to content

Adding refactorm for AZURE_STORAGE_CONNECTION_STRING #2206

Adding refactorm for AZURE_STORAGE_CONNECTION_STRING

Adding refactorm for AZURE_STORAGE_CONNECTION_STRING #2206

name: Delete v2 Review App
on:
pull_request:
types: [closed]
branches: [main]
env:
SERVICE_SHORT: att
jobs:
delete-v2-review-app:
name: Delete v2 Review App ${{ github.event.pull_request.number }}
concurrency: deploy_v2_review_${{ github.event.pull_request.number }}
if: ${{ contains(github.event.pull_request.labels.*.name, 'deploy_v2') || contains(github.event.pull_request.labels.*.name, 'dependencies') }}
runs-on: ubuntu-latest
environment: review_aks
steps:
- name: Checkout
uses: actions/checkout@v4
- uses: azure/login@v2
with:
creds: ${{ secrets.AZURE_CREDENTIALS }}
- name: Set Environment variables
run: |
terraform_version=$(awk '/{/{f=/^terraform/;next}f' terraform/aks/provider.tf | grep -o [0-9\.]*)
echo "TERRAFORM_VERSION=$terraform_version" >> $GITHUB_ENV
PR_NUMBER=${{ github.event.pull_request.number }}
TF_STATE_FILE=pr-$PR_NUMBER.tfstate
echo "DEPLOY_ENV=review_aks-$PR_NUMBER" >> $GITHUB_ENV
echo "PR_NUMBER=$PR_NUMBER" >> $GITHUB_ENV
echo "TF_STATE_FILE=$TF_STATE_FILE" >> $GITHUB_ENV
tf_vars_file=terraform/aks/workspace_variables/review_aks.tfvars.json
echo "KEY_VAULT_NAME=$(jq -r '.key_vault_name' "${tf_vars_file}")" >> $GITHUB_ENV
echo "KEY_VAULT_APP_SECRET_NAME=$(jq -r '.key_vault_app_secret_name' "${tf_vars_file}")" >> $GITHUB_ENV
echo "KEY_VAULT_INFRA_SECRET_NAME=$(jq -r '.key_vault_infra_secret_name' "${tf_vars_file}")" >> $GITHUB_ENV
tf_backend_vars_file=terraform/aks/workspace_variables/review_aks_backend.tfvars
STORAGE_ACCOUNT_RG="s189t01-att-rv-rg"
echo "STORAGE_ACCOUNT_RG=$STORAGE_ACCOUNT_RG" >> $GITHUB_ENV
. ./global_config/review_aks.sh
echo "STORAGE_ACCOUNT_NAME=${RESOURCE_NAME_PREFIX}${SERVICE_SHORT}tfstate${CONFIG_SHORT}sa" >> $GITHUB_ENV
STORAGE_CONN_STR=$(az storage account show-connection-string \
--resource-group "$STORAGE_ACCOUNT_RG" \
--name "$STORAGE_ACCOUNT_NAME" \
--query 'connectionString' \
--output tsv)
echo "::add-mask::$STORAGE_CONN_STR"
echo "AZURE_STORAGE_CONNECTION_STRING=$STORAGE_CONN_STR" >> $GITHUB_ENV
pr_state_file=$(az storage blob list \
--container-name att-tfstate \
--connection-string "$STORAGE_CONN_STR" \
--prefix "$TF_STATE_FILE" \
--query "[].name" \
--output tsv)
if [ -n "$pr_state_file" ]; then echo "TF_STATE_EXISTS=true" >> $GITHUB_ENV; fi
- name: Use Terraform ${{ env.TERRAFORM_VERSION }}
uses: hashicorp/setup-terraform@v3
with:
terraform_version: ${{ env.TERRAFORM_VERSION }}
- name: Validate Azure Key Vault secrets
if: env.TF_STATE_EXISTS == 'true'
uses: DFE-Digital/github-actions/validate-key-vault-secrets@master
with:
KEY_VAULT: ${{ env.KEY_VAULT_NAME }}
SECRETS: |
${{ env.KEY_VAULT_APP_SECRET_NAME }}
${{ env.KEY_VAULT_INFRA_SECRET_NAME }}
- uses: DFE-Digital/github-actions/set-kubelogin-environment@master
with:
azure-credentials: ${{ secrets.AZURE_CREDENTIALS }}
- name: Terraform destroy
if: env.TF_STATE_EXISTS == 'true'
run: make ci review_aks destroy
env:
APP_NAME: ${{ env.PR_NUMBER }}
IMAGE_TAG: ignored
- name: Delete tf state file
if: env.TF_STATE_EXISTS == 'true'
run: |
az storage blob delete \
--container-name att-tfstate \
--name "${{ env.TF_STATE_FILE }}" \
--connection-string "${{ env.AZURE_STORAGE_CONNECTION_STRING }}"
- name: Update ${{ env.DEPLOY_ENV }} status
if: always() && env.TF_STATE_EXISTS == 'true'
id: deactivate-env
uses: bobheadxi/deployments@v1
with:
env: ${{ env.DEPLOY_ENV }}
step: deactivate-env
token: ${{ secrets.GITHUB_TOKEN }}
desc: The deployment for ${{ env.DEPLOY_ENV }} has been removed.
- uses: actions/github-script@v7
name: Remove environment entity
if: always() && (steps.deactivate-env.outcome == 'success')
with:
github-token: ${{ secrets.ACTIONS_API_ACCESS_TOKEN }}
script: |
const environment = process.env.DEPLOY_ENV || ''
if (environment) {
github.rest.repos.deleteAnEnvironment({
owner: context.repo.owner,
repo: context.repo.repo,
environment_name: environment
}).then(res => {
console.log(`The environment ${environment} was removed successfully.`)
}).catch(err => {
core.setFailed(err.message)
})
} else {
core.setFailed('An environment was not passed for deletion.')
}
env:
DEPLOY_ENV: ${{env.DEPLOY_ENV}}