3
3
push :
4
4
branches : apply-nic-napv5
5
5
env :
6
- AWS_REGION : us-east-1
6
+ # AWS_REGION: us-east-1
7
+ TF_VAR_AWS_S3_BUCKET_NAME : ${{ secrets.TF_VAR_AWS_S3_BUCKET_NAME }}
8
+ TF_VAR_AWS_REGION : ${{ secrets.TF_VAR_AWS_REGION }}
7
9
jobs :
8
10
terraform_bootstrap :
9
11
name : " Bootstrap S3/DynamoDB"
21
23
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
22
24
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
23
25
aws-session-token : ${{ secrets.AWS_SESSION_TOKEN }}
24
- aws-region : ${{ env.AWS_REGION }}
26
+ aws-region : ${{ secrets.TF_VAR_AWS_REGION }}
25
27
26
28
- name : Setup Terraform
27
29
uses : hashicorp/setup-terraform@v3
@@ -66,15 +68,17 @@ jobs:
66
68
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
67
69
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
68
70
aws-session-token : ${{ secrets.AWS_SESSION_TOKEN }}
69
- aws-region : ${{ env.AWS_REGION }}
71
+ aws-region : ${{ secrets.TF_VAR_AWS_REGION }}
70
72
71
73
- name : Setup Terraform
72
74
uses : hashicorp/setup-terraform@v3
73
75
74
76
75
77
- name : Initialize Terraform (S3 Backend)
76
78
run : |
77
- terraform init
79
+ terraform init \
80
+ -backend-config="bucket=${{ secrets.TF_VAR_AWS_S3_BUCKET_NAME }}" \
81
+ -backend-config="region=${{ secrets.TF_VAR_AWS_REGION }}"
78
82
79
83
- name : Terraform Plan
80
84
if : github.event_name == 'pull_request' || github.event_name == 'push'
94
98
- name : Terraform Apply
95
99
if : github.event_name == 'push' && github.ref == 'refs/heads/apply-nic-napv5' && steps.check_changes.outputs.has_changes == 'true'
96
100
run : terraform apply -auto-approve tfplan
97
-
98
101
99
102
terraform_eks :
100
103
name : " AWS EKS"
@@ -113,14 +116,17 @@ jobs:
113
116
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
114
117
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
115
118
aws-session-token : ${{ secrets.AWS_SESSION_TOKEN }}
116
- aws-region : ${{ env.AWS_REGION }}
119
+ aws-region : ${{ secrets.TF_VAR_AWS_REGION }}
117
120
118
121
- name : Setup Terraform
119
122
uses : hashicorp/setup-terraform@v3
120
123
121
124
122
125
- name : Terraform Init
123
- run : terraform init
126
+ run : |
127
+ terraform init \
128
+ -backend-config="bucket=${{ secrets.TF_VAR_AWS_S3_BUCKET_NAME }}" \
129
+ -backend-config="region=${{ secrets.TF_VAR_AWS_REGION }}"
124
130
125
131
- name : Terraform Plan
126
132
if : github.event_name == 'pull_request' || github.event_name == 'push'
@@ -158,13 +164,16 @@ jobs:
158
164
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
159
165
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
160
166
aws-session-token : ${{ secrets.AWS_SESSION_TOKEN }}
161
- aws-region : ${{ env.AWS_REGION }}
167
+ aws-region : ${{ secrets.TF_VAR_AWS_REGION }}
162
168
163
169
- name : Setup Terraform
164
170
uses : hashicorp/setup-terraform@v3
165
171
166
172
- name : Terraform Init
167
- run : terraform init
173
+ run : |
174
+ terraform init \
175
+ -backend-config="bucket=${{ secrets.TF_VAR_AWS_S3_BUCKET_NAME }}" \
176
+ -backend-config="region=${{ secrets.TF_VAR_AWS_REGION }}"
168
177
169
178
- name : Terraform Plan
170
179
if : github.event_name == 'pull_request' || github.event_name == 'push'
@@ -208,14 +217,17 @@ jobs:
208
217
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
209
218
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
210
219
aws-session-token : ${{ secrets.AWS_SESSION_TOKEN }}
211
- aws-region : ${{ env.AWS_REGION }}
220
+ aws-region : ${{ secrets.TF_VAR_AWS_REGION }}
212
221
213
222
- name : Setup Terraform
214
223
uses : hashicorp/setup-terraform@v3
215
224
216
225
217
226
- name : Terraform Init (EKS)
218
- run : terraform init
227
+ run : |
228
+ terraform init \
229
+ -backend-config="bucket=${{ secrets.TF_VAR_AWS_S3_BUCKET_NAME }}" \
230
+ -backend-config="region=${{ secrets.TF_VAR_AWS_REGION }}"
219
231
working-directory : ./eks-cluster
220
232
221
233
- name : Print EKS Terraform Outputs
@@ -306,7 +318,10 @@ jobs:
306
318
kubectl cp ${{ github.workspace }}/policy/compiled_policy.tgz $NGINX_POD:/etc/app_protect/bundles/compiled_policy.tgz -n nginx-ingress
307
319
308
320
- name : Terraform Init
309
- run : terraform init
321
+ run : |
322
+ terraform init \
323
+ -backend-config="bucket=${{ secrets.TF_VAR_AWS_S3_BUCKET_NAME }}" \
324
+ -backend-config="region=${{ secrets.TF_VAR_AWS_REGION }}"
310
325
311
326
- name : Terraform Plan
312
327
run : |
@@ -343,13 +358,16 @@ jobs:
343
358
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
344
359
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
345
360
aws-session-token : ${{ secrets.AWS_SESSION_TOKEN }}
346
- aws-region : ${{ env.AWS_REGION }}
361
+ aws-region : ${{ secrets.TF_VAR_AWS_REGION }}
347
362
348
363
- name : Setup Terraform
349
364
uses : hashicorp/setup-terraform@v3
350
365
351
366
- name : Terraform Init
352
- run : terraform init
367
+ run : |
368
+ terraform init \
369
+ -backend-config="bucket=${{ secrets.TF_VAR_AWS_S3_BUCKET_NAME }}" \
370
+ -backend-config="region=${{ secrets.TF_VAR_AWS_REGION }}"
353
371
354
372
- name : Terraform Validate
355
373
run : terraform validate -no-color
@@ -383,4 +401,4 @@ jobs:
383
401
else
384
402
echo "external_name=$EXTERNAL_NAME" >> $GITHUB_ENV
385
403
echo "NGINX Ingress External Name : $EXTERNAL_NAME"
386
- fi
404
+ fi
0 commit comments