Terraform V2 Plan #45
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Terraform V2 Plan | |
on: workflow_dispatch | |
env: | |
TF_VERSION: 1.1.4 | |
KEYCLOAK_V2_DEV_URL: https://dev.loginproxy.gov.bc.ca | |
KEYCLOAK_V2_TEST_URL: https://test.loginproxy.gov.bc.ca | |
KEYCLOAK_V2_PROD_URL: https://loginproxy.gov.bc.ca | |
jobs: | |
terraform: | |
runs-on: ubuntu-22.04 | |
timeout-minutes: 30 | |
steps: | |
- uses: hmarr/debug-action@v2 | |
- name: Checkout Terraform Modules | |
if: steps.count.outputs.count != '0' | |
uses: actions/checkout@v3 | |
with: | |
repository: bcgov/sso-terraform-modules | |
ref: main | |
- id: tf-modules | |
if: steps.count.outputs.count != '0' | |
name: Get Terraform Modules Latest SHA | |
run: echo "latest-sha=$(git rev-parse --short HEAD)" >> $GITHUB_OUTPUT | |
shell: bash | |
- uses: actions/checkout@v2 | |
- name: Setup Terraform | |
uses: bcgov/sso-requests-actions/actions/setup-terraform@v0.66.0 | |
with: | |
context: ./terraform-v2 | |
tf-version: ${{ env.TF_VERSION }} | |
tf-s3-bucket: xgr00q-prod-keycloak | |
tf-s3-bucket-key: keycloak/gold | |
tf-s3-dynamodb-table: xgr00q-prod-state-locking | |
tf-s3-access-key: ${{ secrets.TF_S3_ACCESS_KEY }} | |
tf-s3-secret-key: ${{ secrets.TF_S3_SECRET_KEY }} | |
tf-s3-role-arn: ${{ secrets.TF_S3_ROLE_ARN }} | |
kc-provider-version: 5.0.0 | |
kc-dev-url: ${{ env.KEYCLOAK_V2_DEV_URL }} | |
kc-test-url: ${{ env.KEYCLOAK_V2_TEST_URL }} | |
kc-prod-url: ${{ env.KEYCLOAK_V2_PROD_URL }} | |
kc-dev-username: ${{ secrets.KEYCLOAK_V2_DEV_USERNAME }} | |
kc-test-username: ${{ secrets.KEYCLOAK_V2_TEST_USERNAME }} | |
kc-prod-username: ${{ secrets.KEYCLOAK_V2_PROD_USERNAME }} | |
kc-dev-password: ${{ secrets.KEYCLOAK_V2_DEV_PASSWORD }} | |
kc-test-password: ${{ secrets.KEYCLOAK_V2_TEST_PASSWORD }} | |
kc-prod-password: ${{ secrets.KEYCLOAK_V2_PROD_PASSWORD }} | |
test-siteminder-signing-certificate: ${{ secrets.TEST_SITEMINDER_SIGNING_CERTIFICATE }} | |
prod-siteminder-signing-certificate: ${{ secrets.PROD_SITEMINDER_SIGNING_CERTIFICATE }} | |
dev-azureidir-tenant-id: ${{ secrets.DEV_AZUREIDIR_TENANT_ID }} | |
dev-azureidir-client-id: ${{ secrets.DEV_AZUREIDIR_CLIENT_ID }} | |
dev-azureidir-client-secret: ${{ secrets.DEV_AZUREIDIR_CLIENT_SECRET }} | |
test-azureidir-tenant-id: ${{ secrets.TEST_AZUREIDIR_TENANT_ID }} | |
test-azureidir-client-id: ${{ secrets.TEST_AZUREIDIR_CLIENT_ID }} | |
test-azureidir-client-secret: ${{ secrets.TEST_AZUREIDIR_CLIENT_SECRET }} | |
prod-azureidir-tenant-id: ${{ secrets.PROD_AZUREIDIR_TENANT_ID }} | |
prod-azureidir-client-id: ${{ secrets.PROD_AZUREIDIR_CLIENT_ID }} | |
prod-azureidir-client-secret: ${{ secrets.PROD_AZUREIDIR_CLIENT_SECRET }} | |
dev-github-client-id: ${{ secrets.DEV_GITHUB_CLIENT_ID }} | |
dev-github-client-secret: ${{ secrets.DEV_GITHUB_CLIENT_SECRET }} | |
dev-digitalcredential-client-id: ${{ secrets.DEV_DIGITALCREDENTIAL_CLIENT_ID }} | |
dev-digitalcredential-client-secret: ${{ secrets.DEV_DIGITALCREDENTIAL_CLIENT_SECRET }} | |
test-github-client-id: ${{ secrets.TEST_GITHUB_CLIENT_ID }} | |
test-github-client-secret: ${{ secrets.TEST_GITHUB_CLIENT_SECRET }} | |
test-digitalcredential-client-id: ${{ secrets.TEST_DIGITALCREDENTIAL_CLIENT_ID }} | |
test-digitalcredential-client-secret: ${{ secrets.TEST_DIGITALCREDENTIAL_CLIENT_SECRET }} | |
prod-github-client-id: ${{ secrets.PROD_GITHUB_CLIENT_ID }} | |
prod-github-client-secret: ${{ secrets.PROD_GITHUB_CLIENT_SECRET }} | |
prod-digitalcredential-client-id: ${{ secrets.PROD_DIGITALCREDENTIAL_CLIENT_ID }} | |
prod-digitalcredential-client-secret: ${{ secrets.PROD_DIGITALCREDENTIAL_CLIENT_SECRET }} | |
plan: true | |
tf-modules-cache-key: ${{ steps.tf-modules.outputs.latest-sha }} |