-
Notifications
You must be signed in to change notification settings - Fork 2
51 lines (46 loc) · 1.44 KB
/
pr.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
on:
pull_request:
branches:
- main
defaults:
run:
# todo: adapt cwd
working-directory: staging-cluster
jobs:
plan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- uses: hashicorp/setup-terraform@v2
- uses: aquasecurity/tfsec-action@v1.0.0
id: tfsec
with:
additional_args: "--out tfsec.xml"
soft_fail: true
format: junit
- uses: mikepenz/action-junit-report@v3
if: always()
with:
report_paths: 'tfsec.xml'
- name: Terraform Init
id: init
run: terraform init -upgrade
env:
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
- name: Terraform Validate
id: validate
run: terraform validate -no-color
- name: Setup Kubeconfig
id: kubeconfig
run: |
curl -X GET "https://kaas.cloudpunks.io/api/v2/projects/j26n8v9zmw/clusters/xm6ff2rfvq/kubeconfig" \
-H "accept: application/octet-stream" -H "Authorization: Bearer ${{ secrets.SA_SERVICE_CLUSTER }}" > .kubeconfig
chmod go-r .kubeconfig
export KUBECONFIG=.kubeconfig
- name: Terraform Plan
id: plan
run: terraform plan -no-color
env:
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}