Skip to content

Terraform V2 Plan

Terraform V2 Plan #45

name: Terraform V2 Plan
on: workflow_dispatch
env:
TF_VERSION: 1.1.4
KEYCLOAK_V2_DEV_URL: https://dev.loginproxy.gov.bc.ca
KEYCLOAK_V2_TEST_URL: https://test.loginproxy.gov.bc.ca
KEYCLOAK_V2_PROD_URL: https://loginproxy.gov.bc.ca
jobs:
terraform:
runs-on: ubuntu-22.04
timeout-minutes: 30
steps:
- uses: hmarr/debug-action@v2
- name: Checkout Terraform Modules
if: steps.count.outputs.count != '0'
uses: actions/checkout@v3
with:
repository: bcgov/sso-terraform-modules
ref: main
- id: tf-modules
if: steps.count.outputs.count != '0'
name: Get Terraform Modules Latest SHA
run: echo "latest-sha=$(git rev-parse --short HEAD)" >> $GITHUB_OUTPUT
shell: bash
- uses: actions/checkout@v2
- name: Setup Terraform
uses: bcgov/sso-requests-actions/actions/setup-terraform@v0.66.0
with:
context: ./terraform-v2
tf-version: ${{ env.TF_VERSION }}
tf-s3-bucket: xgr00q-prod-keycloak
tf-s3-bucket-key: keycloak/gold
tf-s3-dynamodb-table: xgr00q-prod-state-locking
tf-s3-access-key: ${{ secrets.TF_S3_ACCESS_KEY }}
tf-s3-secret-key: ${{ secrets.TF_S3_SECRET_KEY }}
tf-s3-role-arn: ${{ secrets.TF_S3_ROLE_ARN }}
kc-provider-version: 5.0.0
kc-dev-url: ${{ env.KEYCLOAK_V2_DEV_URL }}
kc-test-url: ${{ env.KEYCLOAK_V2_TEST_URL }}
kc-prod-url: ${{ env.KEYCLOAK_V2_PROD_URL }}
kc-dev-username: ${{ secrets.KEYCLOAK_V2_DEV_USERNAME }}
kc-test-username: ${{ secrets.KEYCLOAK_V2_TEST_USERNAME }}
kc-prod-username: ${{ secrets.KEYCLOAK_V2_PROD_USERNAME }}
kc-dev-password: ${{ secrets.KEYCLOAK_V2_DEV_PASSWORD }}
kc-test-password: ${{ secrets.KEYCLOAK_V2_TEST_PASSWORD }}
kc-prod-password: ${{ secrets.KEYCLOAK_V2_PROD_PASSWORD }}
test-siteminder-signing-certificate: ${{ secrets.TEST_SITEMINDER_SIGNING_CERTIFICATE }}
prod-siteminder-signing-certificate: ${{ secrets.PROD_SITEMINDER_SIGNING_CERTIFICATE }}
dev-azureidir-tenant-id: ${{ secrets.DEV_AZUREIDIR_TENANT_ID }}
dev-azureidir-client-id: ${{ secrets.DEV_AZUREIDIR_CLIENT_ID }}
dev-azureidir-client-secret: ${{ secrets.DEV_AZUREIDIR_CLIENT_SECRET }}
test-azureidir-tenant-id: ${{ secrets.TEST_AZUREIDIR_TENANT_ID }}
test-azureidir-client-id: ${{ secrets.TEST_AZUREIDIR_CLIENT_ID }}
test-azureidir-client-secret: ${{ secrets.TEST_AZUREIDIR_CLIENT_SECRET }}
prod-azureidir-tenant-id: ${{ secrets.PROD_AZUREIDIR_TENANT_ID }}
prod-azureidir-client-id: ${{ secrets.PROD_AZUREIDIR_CLIENT_ID }}
prod-azureidir-client-secret: ${{ secrets.PROD_AZUREIDIR_CLIENT_SECRET }}
dev-github-client-id: ${{ secrets.DEV_GITHUB_CLIENT_ID }}
dev-github-client-secret: ${{ secrets.DEV_GITHUB_CLIENT_SECRET }}
dev-digitalcredential-client-id: ${{ secrets.DEV_DIGITALCREDENTIAL_CLIENT_ID }}
dev-digitalcredential-client-secret: ${{ secrets.DEV_DIGITALCREDENTIAL_CLIENT_SECRET }}
test-github-client-id: ${{ secrets.TEST_GITHUB_CLIENT_ID }}
test-github-client-secret: ${{ secrets.TEST_GITHUB_CLIENT_SECRET }}
test-digitalcredential-client-id: ${{ secrets.TEST_DIGITALCREDENTIAL_CLIENT_ID }}
test-digitalcredential-client-secret: ${{ secrets.TEST_DIGITALCREDENTIAL_CLIENT_SECRET }}
prod-github-client-id: ${{ secrets.PROD_GITHUB_CLIENT_ID }}
prod-github-client-secret: ${{ secrets.PROD_GITHUB_CLIENT_SECRET }}
prod-digitalcredential-client-id: ${{ secrets.PROD_DIGITALCREDENTIAL_CLIENT_ID }}
prod-digitalcredential-client-secret: ${{ secrets.PROD_DIGITALCREDENTIAL_CLIENT_SECRET }}
plan: true
tf-modules-cache-key: ${{ steps.tf-modules.outputs.latest-sha }}