Use timestamp
Signed-off-by: addjuarez <addiajuarez@gmail.com>
This commit is contained in:
parent
f1dd26960c
commit
20f543b11e
|
@ -9,14 +9,9 @@ terraform {
|
|||
}
|
||||
}
|
||||
|
||||
provider "aws" {
|
||||
region = "us-east-1"
|
||||
default_tags {
|
||||
tags = {
|
||||
Purpose = "AutomatedTesting"
|
||||
Timestamp = "${timestamp()}"
|
||||
}
|
||||
}
|
||||
variable "TIMESTAMP" {
|
||||
type = string
|
||||
description = "Timestamp of the github worklow run."
|
||||
}
|
||||
|
||||
variable "UNIQUE_ID" {
|
||||
|
@ -24,6 +19,16 @@ variable "UNIQUE_ID" {
|
|||
description = "Unique Id of the github worklow run."
|
||||
}
|
||||
|
||||
provider "aws" {
|
||||
region = "us-east-1"
|
||||
default_tags {
|
||||
tags = {
|
||||
Purpose = "AutomatedTesting"
|
||||
Timestamp = "${var.TIMESTAMP}"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_sns_topic" "testTopic" {
|
||||
name = "testTopic-${var.UNIQUE_ID}"
|
||||
tags = {
|
||||
|
|
|
@ -225,6 +225,10 @@ jobs:
|
|||
echo "$CERT_NAME=$CERT_FILE" >> $GITHUB_ENV
|
||||
done
|
||||
|
||||
- name: Get current time
|
||||
run: |
|
||||
echo "CURRENT_TIME=$(date --rfc-3339=date)" >> ${GITHUB_ENV}
|
||||
|
||||
- name: Setup Terraform
|
||||
uses: hashicorp/setup-terraform@v2
|
||||
if: matrix.terraform-dir != ''
|
||||
|
@ -251,12 +255,12 @@ jobs:
|
|||
|
||||
- name: Terraform Plan
|
||||
id: plan
|
||||
run: terraform plan -no-color -var="UNIQUE_ID=${{env.UNIQUE_ID}}"
|
||||
run: terraform plan -no-color -var="UNIQUE_ID=${{env.UNIQUE_ID}}" -var="TIMESTAMP=${{env.CURRENT_TIME}}"
|
||||
working-directory: "./.github/infrastructure/terraform/certification/${{ matrix.terraform-dir }}"
|
||||
if: matrix.terraform-dir != ''
|
||||
|
||||
- name: Terraform Apply
|
||||
run: terraform apply -auto-approve -var="UNIQUE_ID=${{env.UNIQUE_ID}}"
|
||||
run: terraform apply -auto-approve -var="UNIQUE_ID=${{env.UNIQUE_ID}}" -var="TIMESTAMP=${{env.CURRENT_TIME}}"
|
||||
working-directory: "./.github/infrastructure/terraform/certification/${{ matrix.terraform-dir }}"
|
||||
if: matrix.terraform-dir != ''
|
||||
continue-on-error: true
|
||||
|
@ -379,7 +383,7 @@ jobs:
|
|||
|
||||
- name: Terraform Destroy
|
||||
continue-on-error: true
|
||||
run: terraform destroy -auto-approve -var="UNIQUE_ID=${{env.UNIQUE_ID}}"
|
||||
run: terraform destroy -auto-approve -var="UNIQUE_ID=${{env.UNIQUE_ID}}" -var="TIMESTAMP=${{env.CURRENT_TIME}}"
|
||||
working-directory: "./.github/infrastructure/terraform/certification/${{ matrix.terraform-dir }}"
|
||||
if: matrix.terraform-dir != ''
|
||||
|
||||
|
|
|
@ -48,19 +48,6 @@ jobs:
|
|||
id: pr-components
|
||||
run: |
|
||||
PR_COMPONENTS=$(yq -I0 --tojson eval - << EOF
|
||||
- bindings.cron
|
||||
- bindings.http
|
||||
- bindings.influx
|
||||
- bindings.kafka-wurstmeister
|
||||
- bindings.kafka-confluent
|
||||
- bindings.mqtt-emqx
|
||||
- bindings.mqtt-mosquitto
|
||||
- bindings.mqtt-vernemq
|
||||
- bindings.postgres
|
||||
- bindings.redis.v6
|
||||
- bindings.redis.v7
|
||||
- bindings.kubemq
|
||||
- bindings.rabbitmq
|
||||
- pubsub.aws.snssqs.docker
|
||||
- pubsub.hazelcast
|
||||
- pubsub.in-memory
|
||||
|
@ -74,23 +61,6 @@ jobs:
|
|||
- pubsub.kafka-wurstmeister
|
||||
- pubsub.kafka-confluent
|
||||
- pubsub.kubemq
|
||||
- secretstores.kubernetes
|
||||
- secretstores.localenv
|
||||
- secretstores.localfile
|
||||
- secretstores.hashicorp.vault
|
||||
- state.cassandra
|
||||
- state.memcached
|
||||
- state.mongodb
|
||||
- state.mysql.mysql
|
||||
- state.mysql.mariadb
|
||||
- state.postgresql
|
||||
- state.redis.v6
|
||||
- state.redis.v7
|
||||
- state.sqlserver
|
||||
- state.in-memory
|
||||
- state.cockroachdb
|
||||
- workflows.temporal
|
||||
- state.rethinkdb
|
||||
EOF
|
||||
)
|
||||
echo "::set-output name=pr-components::$PR_COMPONENTS"
|
||||
|
@ -118,37 +88,6 @@ jobs:
|
|||
CRON_COMPONENTS=$(yq -I0 --tojson eval - << EOF
|
||||
- component: state.azure.blobstorage
|
||||
required-secrets: AzureBlobStorageAccessKey,AzureBlobStorageAccount
|
||||
- component: state.azure.cosmosdb
|
||||
required-secrets: AzureCosmosDBMasterKey,AzureCosmosDBUrl,AzureCosmosDB,AzureCosmosDBCollection
|
||||
- component: state.azure.sql
|
||||
required-secrets: AzureResourceGroupName, AzureSqlServerName, AzureSqlServerConnectionString
|
||||
- component: state.azure.tablestorage.storage
|
||||
required-secrets: AzureBlobStorageAccessKey,AzureBlobStorageAccount
|
||||
- component: state.azure.tablestorage.cosmosdb
|
||||
required-secrets: AzureCosmosDBTableAPI,AzureCosmosDBTableAPIMasterKey
|
||||
- component: pubsub.azure.eventhubs
|
||||
required-secrets: AzureEventHubsPubsubNamespaceConnectionString,AzureEventHubsPubsubConsumerGroup,AzureBlobStorageAccessKey,AzureBlobStorageAccount,AzureEventHubsPubsubContainer
|
||||
- component: pubsub.azure.servicebus.topics
|
||||
required-secrets: AzureServiceBusConnectionString
|
||||
- component: pubsub.azure.servicebus.queues
|
||||
required-secrets: AzureServiceBusConnectionString
|
||||
- component: bindings.azure.blobstorage
|
||||
required-secrets: AzureBlobStorageAccessKey,AzureBlobStorageAccount
|
||||
- component: bindings.azure.eventgrid
|
||||
required-secrets: AzureEventGridNgrokToken,AzureEventGridAccessKey,AzureEventGridTopicEndpoint,AzureEventGridScope,AzureEventGridClientSecret,AzureEventGridClientId,AzureEventGridTenantId,AzureEventGridSubscriptionId
|
||||
- component: bindings.azure.eventhubs
|
||||
required-secrets: AzureEventHubsBindingsConnectionString,AzureEventHubsBindingsConsumerGroup,AzureBlobStorageAccessKey,AzureBlobStorageAccount,AzureEventHubsBindingsContainer
|
||||
- component: bindings.azure.servicebusqueues
|
||||
required-secrets: AzureServiceBusConnectionString
|
||||
- component: bindings.azure.storagequeues
|
||||
required-secrets: AzureBlobStorageAccessKey,AzureBlobStorageAccount,AzureBlobStorageQueue
|
||||
- component: secretstores.azure.keyvault.certificate
|
||||
required-secrets: AzureKeyVaultName,AzureKeyVaultSecretStoreTenantId,AzureKeyVaultSecretStoreClientId
|
||||
required-certs: AzureKeyVaultSecretStoreCert
|
||||
- component: secretstores.azure.keyvault.serviceprincipal
|
||||
required-secrets: AzureKeyVaultName,AzureKeyVaultSecretStoreTenantId,AzureKeyVaultSecretStoreServicePrincipalClientId,AzureKeyVaultSecretStoreServicePrincipalClientSecret
|
||||
- component: bindings.azure.cosmosdb
|
||||
required-secrets: AzureCosmosDBMasterKey,AzureCosmosDBUrl,AzureCosmosDB,AzureCosmosDBCollection
|
||||
- component: pubsub.aws.snssqs.terraform
|
||||
terraform-dir: pubsub/aws/snssqs
|
||||
EOF
|
||||
|
@ -260,6 +199,10 @@ jobs:
|
|||
echo "$CERT_NAME=$CERT_FILE" >> $GITHUB_ENV
|
||||
done
|
||||
|
||||
- name: Get current time
|
||||
run: |
|
||||
echo "CURRENT_TIME=$(date --rfc-3339=date)" >> ${GITHUB_ENV}
|
||||
|
||||
- name: Setup Terraform
|
||||
uses: hashicorp/setup-terraform@v2
|
||||
if: matrix.terraform-dir != ''
|
||||
|
@ -286,12 +229,12 @@ jobs:
|
|||
|
||||
- name: Terraform Plan
|
||||
id: plan
|
||||
run: terraform plan -no-color -var="UNIQUE_ID=${{env.UNIQUE_ID}}"
|
||||
run: terraform plan -no-color -var="UNIQUE_ID=${{env.UNIQUE_ID}}" -var="TIMESTAMP=${{env.CURRENT_TIME}}"
|
||||
working-directory: "./.github/infrastructure/terraform/conformance/${{ matrix.terraform-dir }}"
|
||||
if: matrix.terraform-dir != ''
|
||||
|
||||
- name: Terraform Apply
|
||||
run: terraform apply -auto-approve -var="UNIQUE_ID=${{env.UNIQUE_ID}}"
|
||||
- name: Terraform Apply
|
||||
run: terraform apply -auto-approve -var="UNIQUE_ID=${{env.UNIQUE_ID}}" -var="TIMESTAMP=${{env.CURRENT_TIME}}"
|
||||
working-directory: "./.github/infrastructure/terraform/conformance/${{ matrix.terraform-dir }}"
|
||||
if: matrix.terraform-dir != ''
|
||||
continue-on-error: true
|
||||
|
@ -520,7 +463,7 @@ jobs:
|
|||
|
||||
- name: Terraform Destroy
|
||||
continue-on-error: true
|
||||
run: terraform destroy -auto-approve -var="UNIQUE_ID=${{env.UNIQUE_ID}}"
|
||||
run: terraform destroy -auto-approve -var="UNIQUE_ID=${{env.UNIQUE_ID}}" -var="TIMESTAMP=${{env.CURRENT_TIME}}"
|
||||
working-directory: "./.github/infrastructure/terraform/conformance/${{ matrix.terraform-dir }}"
|
||||
if: matrix.terraform-dir != ''
|
||||
|
||||
|
|
Loading…
Reference in New Issue