🔧 Update engineer access in analytical-platform-ingestion
accounts
#3535
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: "Terraform: New environment" | |
on: | |
push: | |
branches: | |
- main | |
paths: | |
- '.github/workflows/new-environment.yml' | |
- 'terraform/environments/*.tf' | |
- 'environments/**.json' | |
- 'terraform/environments/bootstrap/**' | |
- '!**.md' | |
pull_request: | |
branches: | |
- main | |
types: [opened, edited, reopened, synchronize] | |
paths: | |
- '.github/workflows/new-environment.yml' | |
- 'terraform/environments/*.tf' | |
- 'environments/**.json' | |
workflow_dispatch: | |
env: | |
TF_IN_AUTOMATION: true | |
AWS_REGION: "eu-west-2" | |
ENVIRONMENT_MANAGEMENT: ${{ secrets.MODERNISATION_PLATFORM_ENVIRONMENTS }} | |
API_KEY: ${{ secrets.GOV_UK_NOTIFY_API_KEY }} | |
TEMPLATE_ID: "1f0f5ccc-0f67-4ee2-942f-6e48804828ea" | |
EXPECTED_TEMPLATE_VERSION: "1" # Update with your expected template version | |
permissions: | |
id-token: write # This is required for requesting the JWT | |
contents: read # This is required for actions/checkout | |
defaults: | |
run: | |
shell: bash | |
jobs: | |
check-environments-deployment-plan: | |
runs-on: ubuntu-latest | |
if: github.ref != 'refs/heads/main' && github.event_name != 'workflow_dispatch' | |
env: | |
TF_VAR_github_token: ${{ secrets.MODERNISATION_PAT_MULTIREPO }} | |
steps: | |
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 | |
- name: Set Account Number | |
run: | | |
ACCOUNT_NUMBER=$(jq -r -e '.aws_organizations_root_account_id' <<< $ENVIRONMENT_MANAGEMENT) | |
echo "::add-mask::$ACCOUNT_NUMBER" | |
echo ACCOUNT_NUMBER=$ACCOUNT_NUMBER >> $GITHUB_ENV | |
- name: Configure AWS Credentials | |
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2 | |
with: | |
role-to-assume: "arn:aws:iam::${{ env.ACCOUNT_NUMBER }}:role/ModernisationPlatformGithubActionsRole" | |
role-session-name: githubactionsrolesession | |
aws-region: ${{ env.AWS_REGION }} | |
- uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v3.1.2 | |
with: | |
terraform_version: "~1" | |
terraform_wrapper: false | |
- name: Run terraform plan for root terraform/environments | |
run: | | |
terraform --version | |
# Test if this is a PR or PULL event | |
#USE IF RUNNING IN GITHUB ACTIONS | |
if [ ! -z ${{ github.event.pull_request.number }} ] | |
then | |
#USE IF USING ACT | |
# if [ ! -z ${PULL_REQUEST_NUMBER} ] | |
# then | |
#CONFIGURE TERRAFORM | |
bash scripts/terraform-init.sh terraform/environments | |
#RUN TERRAFORM PLAN | |
PLAN=`bash scripts/terraform-plan.sh terraform/environments | tee /dev/stderr | grep '^Plan: \|^No changes.'` | |
PLAN="> TERRAFORM PLAN RESULT - ACCOUNTS-TO-CREATE/MODIFY/DELETE - | |
${PLAN}" | |
bash scripts/update-pr-comments.sh "${PLAN}" | |
fi | |
env: | |
SECRET: ${{ secrets.GITHUB_TOKEN }} | |
GITHUB_REPOSITORY: ${{ secrets.GITHUB_REPOSITORY }} | |
PULL_REQUEST_NUMBER: ${{ github.event.pull_request.number }} | |
create-environment: | |
runs-on: ubuntu-latest | |
if: github.event.ref == 'refs/heads/main' || github.event_name == 'workflow_dispatch' | |
env: | |
TF_VAR_github_token: ${{ secrets.MODERNISATION_PAT_MULTIREPO }} | |
steps: | |
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 | |
- name: Set Account Number | |
run: | | |
ACCOUNT_NUMBER=$(jq -r -e '.aws_organizations_root_account_id' <<< $ENVIRONMENT_MANAGEMENT) | |
echo "::add-mask::$ACCOUNT_NUMBER" | |
echo ACCOUNT_NUMBER=$ACCOUNT_NUMBER >> $GITHUB_ENV | |
- name: Configure AWS Credentials | |
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2 | |
with: | |
role-to-assume: "arn:aws:iam::${{ env.ACCOUNT_NUMBER }}:role/ModernisationPlatformGithubActionsRole" | |
role-session-name: githubactionsrolesession | |
aws-region: ${{ env.AWS_REGION }} | |
- uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v3.1.2 | |
with: | |
terraform_version: "~1" | |
terraform_wrapper: false | |
- name: Run terraform init in terraform/environments | |
run: bash scripts/terraform-init.sh terraform/environments | |
- name: Run terraform plan in terraform/environments | |
run: bash scripts/terraform-plan.sh terraform/environments | |
- name: Run terraform apply in terraform/environments | |
run: bash scripts/terraform-apply.sh terraform/environments | |
- name: Slack failure notification | |
uses: slackapi/slack-github-action@485a9d42d3a73031f12ec201c457e2162c45d02d # v2.0.0 | |
with: | |
webhook-type: incoming-webhook | |
payload: | | |
{"blocks":[{"type": "section","text": {"type": "mrkdwn","text": ":no_entry: Failed GitHub Action:"}},{"type": "section","fields":[{"type": "mrkdwn","text": "*Workflow:*\n<${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}|${{ github.workflow }}>"},{"type": "mrkdwn","text": "*Job:*\n${{ github.job }}"},{"type": "mrkdwn","text": "*Repo:*\n${{ github.repository }}"}]}]} | |
env: | |
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }} | |
if: ${{ failure() }} | |
provision-workspaces: | |
runs-on: ubuntu-latest | |
if: github.event.ref == 'refs/heads/main' || github.event_name == 'workflow_dispatch' | |
needs: [create-environment] | |
steps: | |
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 | |
- name: Set Account Number | |
run: | | |
ACCOUNT_NUMBER=$(jq -r -e '.modernisation_platform_account_id' <<< $ENVIRONMENT_MANAGEMENT) | |
echo "::add-mask::$ACCOUNT_NUMBER" | |
echo ACCOUNT_NUMBER=$ACCOUNT_NUMBER >> $GITHUB_ENV | |
- name: Configure AWS Credentials | |
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2 | |
with: | |
role-to-assume: "arn:aws:iam::${{ env.ACCOUNT_NUMBER }}:role/github-actions-apply" | |
role-session-name: githubactionsrolesession | |
aws-region: ${{ env.AWS_REGION }} | |
- uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v3.1.2 | |
with: | |
terraform_version: "~1" | |
terraform_wrapper: false | |
- name: Provision workspaces in terraform/environments/bootstrap/* | |
run: bash scripts/provision-terraform-workspaces.sh bootstrap | |
- name: Provision workspaces in terraform/environments/* | |
run: bash scripts/provision-terraform-workspaces.sh all-environments | |
- name: Provision Member Component Workspaces | |
run: bash scripts/provision-member-component-workspaces.sh | |
- name: Slack failure notification | |
uses: slackapi/slack-github-action@485a9d42d3a73031f12ec201c457e2162c45d02d # v2.0.0 | |
with: | |
webhook-type: incoming-webhook | |
payload: | | |
{"blocks":[{"type": "section","text": {"type": "mrkdwn","text": ":no_entry: Failed GitHub Action:"}},{"type": "section","fields":[{"type": "mrkdwn","text": "*Workflow:*\n<${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}|${{ github.workflow }}>"},{"type": "mrkdwn","text": "*Job:*\n${{ github.job }}"},{"type": "mrkdwn","text": "*Repo:*\n${{ github.repository }}"}]}]} | |
env: | |
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }} | |
if: ${{ failure() }} | |
delegate-access: | |
runs-on: ubuntu-latest | |
if: github.event.ref == 'refs/heads/main' || github.event_name == 'workflow_dispatch' | |
needs: [provision-workspaces] | |
steps: | |
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 | |
with: | |
fetch-depth: 0 | |
- name: Set Account Number | |
run: | | |
ACCOUNT_NUMBER=$(jq -r -e '.aws_organizations_root_account_id' <<< $ENVIRONMENT_MANAGEMENT) | |
echo "::add-mask::$ACCOUNT_NUMBER" | |
echo ACCOUNT_NUMBER=$ACCOUNT_NUMBER >> $GITHUB_ENV | |
- name: Configure AWS Credentials | |
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2 | |
with: | |
role-to-assume: "arn:aws:iam::${{ env.ACCOUNT_NUMBER }}:role/ModernisationPlatformGithubActionsRole" | |
role-session-name: githubactionsrolesession | |
aws-region: ${{ env.AWS_REGION }} | |
- uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v3.1.2 | |
with: | |
terraform_version: "~1" | |
terraform_wrapper: false | |
- name: get new account(s) | |
id: new_account | |
run: | | |
files=$(git diff --name-only --diff-filter=AM @^ -- 'environments/*.json' | uniq | sed 's#environments/##' | sed 's/\.json$//' | tr '\n' ',' | awk '{$1=$1};1') | |
echo "files=$files" >> $GITHUB_OUTPUT | |
- name: Run delegate access | |
run: | | |
IFS=',' read -r -a accounts <<< "${{ steps.new_account.outputs.files }}" | |
if [[ ${#accounts[@]} -gt 0 ]]; then | |
for i in "${accounts[@]}"; do | |
echo "[+] Running delegate-access baseline for account ${i}" | |
bash scripts/terraform-init.sh terraform/environments/bootstrap/delegate-access | |
bash scripts/setup-baseline.sh terraform/environments/bootstrap/delegate-access "${i}" plan | |
bash scripts/setup-baseline.sh terraform/environments/bootstrap/delegate-access "${i}" apply | |
done | |
else | |
echo "[+] There were no AWS member accounts to process" | |
fi | |
- name: Slack failure notification | |
uses: slackapi/slack-github-action@485a9d42d3a73031f12ec201c457e2162c45d02d # v2.0.0 | |
with: | |
webhook-type: incoming-webhook | |
payload: | | |
{"blocks":[{"type": "section","text": {"type": "mrkdwn","text": ":no_entry: Failed GitHub Action:"}},{"type": "section","fields":[{"type": "mrkdwn","text": "*Workflow:*\n<${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}|${{ github.workflow }}>"},{"type": "mrkdwn","text": "*Job:*\n${{ github.job }}"},{"type": "mrkdwn","text": "*Repo:*\n${{ github.repository }}"}]}]} | |
env: | |
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }} | |
if: ${{ failure() }} | |
remove-default-vpc: | |
runs-on: ubuntu-latest | |
if: github.event.ref == 'refs/heads/main' || github.event_name == 'workflow_dispatch' | |
needs: [delegate-access] | |
steps: | |
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 | |
with: | |
fetch-depth: 0 | |
- name: Configure AWS Credentials | |
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2 | |
with: | |
role-to-assume: "arn:aws:iam::${{ secrets.MODERNISATION_PLATFORM_ACCOUNT_NUMBER }}:role/github-actions-apply" | |
role-session-name: githubactionsrolesession | |
aws-region: ${{ env.AWS_REGION }} | |
- name: Retrieve Secrets from AWS Secrets Manager | |
uses: aws-actions/aws-secretsmanager-get-secrets@fbd65ea98e018858715f591f03b251f02b2316cb #v2.0.8 | |
with: | |
secret-ids: | | |
AWS_ENVIRONMENTS,environment_management | |
SLACK_WEBHOOK_URL,slack_webhook_url | |
- name: get new account(s) | |
id: new_account | |
run: | | |
files=$(git diff --name-only --diff-filter=AM @^ -- 'environments/*.json' | uniq | sed 's#environments/##' | sed 's/\.json$//' | tr '\n' ',' | awk '{$1=$1};1') | |
echo "files=$files" >> $GITHUB_OUTPUT | |
- name: Remove Default VPC | |
run: | | |
IFS=',' read -r -a accounts <<< "${{ steps.new_account.outputs.files }}" | |
if [[ ${#accounts[@]} -gt 0 ]]; then | |
for i in "${accounts[@]}"; do | |
environments=$(jq -r '.environments[].name' "environments/${i}.json") | |
for env in $environments; do | |
key="${i}-${env}" | |
account_number=$(echo "$AWS_ENVIRONMENTS" | jq -r ".account_ids[\"$key\"]") | |
echo "[+] Running remove-default-vpc for account ${account_number}" | |
# bash ./scripts/internal/remove-default-vpc/remove_default_vpc_new_account.sh $account_number | |
done | |
done | |
else | |
echo "[+] There were no AWS member accounts to process" | |
fi | |
- name: Slack failure notification | |
uses: slackapi/slack-github-action@485a9d42d3a73031f12ec201c457e2162c45d02d # v2.0.0 | |
with: | |
webhook-type: incoming-webhook | |
payload: | | |
{"blocks":[{"type": "section","text": {"type": "mrkdwn","text": ":no_entry: Failed GitHub Action:"}},{"type": "section","fields":[{"type": "mrkdwn","text": "*Workflow:*\n<${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}|${{ github.workflow }}>"},{"type": "mrkdwn","text": "*Job:*\n${{ github.job }}"},{"type": "mrkdwn","text": "*Repo:*\n${{ github.repository }}"}]}]} | |
env: | |
SLACK_WEBHOOK_URL: ${{ env.SLACK_WEBHOOK_URL }} | |
if: ${{ failure() }} | |
secure-baselines: | |
runs-on: ubuntu-latest | |
if: github.event.ref == 'refs/heads/main' || github.event_name == 'workflow_dispatch' | |
needs: [delegate-access] | |
steps: | |
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 | |
with: | |
fetch-depth: 0 | |
- name: Set Account Number | |
run: | | |
ACCOUNT_NUMBER=$(jq -r -e '.modernisation_platform_account_id' <<< $ENVIRONMENT_MANAGEMENT) | |
echo "::add-mask::$ACCOUNT_NUMBER" | |
echo ACCOUNT_NUMBER=$ACCOUNT_NUMBER >> $GITHUB_ENV | |
- name: Configure AWS Credentials | |
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2 | |
with: | |
role-to-assume: "arn:aws:iam::${{ env.ACCOUNT_NUMBER }}:role/github-actions-apply" | |
role-session-name: githubactionsrolesession | |
aws-region: ${{ env.AWS_REGION }} | |
- uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v3.1.2 | |
with: | |
terraform_version: "~1" | |
terraform_wrapper: false | |
- name: get new account(s) | |
id: new_account | |
run: | | |
files=$(git diff --name-only --diff-filter=AM @^ -- 'environments/*.json' | uniq | sed 's#environments/##' | sed 's/\.json$//' | tr '\n' ',' | awk '{$1=$1};1') | |
echo "files=$files" >> $GITHUB_OUTPUT | |
- name: Run secure baselines | |
run: | | |
IFS=',' read -r -a accounts <<< "${{ steps.new_account.outputs.files }}" | |
if [[ ${#accounts[@]} -gt 0 ]]; then | |
for i in "${accounts[@]}"; do | |
echo "[+] Running secure baseline for account ${i}" | |
bash scripts/terraform-init.sh terraform/environments/bootstrap/secure-baselines | |
bash scripts/setup-baseline.sh terraform/environments/bootstrap/secure-baselines "${i}" plan | |
bash scripts/setup-baseline.sh terraform/environments/bootstrap/secure-baselines "${i}" apply | |
done | |
else | |
echo "[+] There were no AWS member accounts to process" | |
fi | |
- name: Slack failure notification | |
uses: slackapi/slack-github-action@485a9d42d3a73031f12ec201c457e2162c45d02d # v2.0.0 | |
with: | |
webhook-type: incoming-webhook | |
payload: | | |
{"blocks":[{"type": "section","text": {"type": "mrkdwn","text": ":no_entry: Failed GitHub Action:"}},{"type": "section","fields":[{"type": "mrkdwn","text": "*Workflow:*\n<${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}|${{ github.workflow }}>"},{"type": "mrkdwn","text": "*Job:*\n${{ github.job }}"},{"type": "mrkdwn","text": "*Repo:*\n${{ github.repository }}"}]}]} | |
env: | |
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }} | |
if: ${{ failure() }} | |
single-sign-on: | |
runs-on: ubuntu-latest | |
if: github.event.ref == 'refs/heads/main' || github.event_name == 'workflow_dispatch' | |
needs: [provision-workspaces, delegate-access] | |
steps: | |
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 | |
with: | |
fetch-depth: 0 | |
- name: Set Account Number | |
run: | | |
ACCOUNT_NUMBER=$(jq -r -e '.modernisation_platform_account_id' <<< $ENVIRONMENT_MANAGEMENT) | |
echo "::add-mask::$ACCOUNT_NUMBER" | |
echo ACCOUNT_NUMBER=$ACCOUNT_NUMBER >> $GITHUB_ENV | |
- name: Configure AWS Credentials | |
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2 | |
with: | |
role-to-assume: "arn:aws:iam::${{ env.ACCOUNT_NUMBER }}:role/github-actions-apply" | |
role-session-name: githubactionsrolesession | |
aws-region: ${{ env.AWS_REGION }} | |
- uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v3.1.2 | |
with: | |
terraform_version: "~1" | |
terraform_wrapper: false | |
- name: get new account(s) | |
id: new_account | |
run: | | |
files=$(git diff --name-only --diff-filter=AM @^ -- 'environments/*.json' | uniq | sed 's#environments/##' | sed 's/\.json$//' | tr '\n' ',' | awk '{$1=$1};1') | |
echo "files=$files" >> $GITHUB_OUTPUT | |
- name: Run single sign on | |
run: | | |
IFS=',' read -r -a accounts <<< "${{ steps.new_account.outputs.files }}" | |
if [[ ${#accounts[@]} -gt 0 ]]; then | |
for i in "${accounts[@]}"; do | |
echo "[+] Running single sign on baseline for account ${i}" | |
bash scripts/terraform-init.sh terraform/environments/bootstrap/single-sign-on | |
bash scripts/setup-baseline.sh terraform/environments/bootstrap/single-sign-on "${i}" plan | |
bash scripts/setup-baseline.sh terraform/environments/bootstrap/single-sign-on "${i}" apply | |
done | |
else | |
echo "[+] There were no AWS member accounts to process" | |
fi | |
- name: Slack failure notification | |
uses: slackapi/slack-github-action@485a9d42d3a73031f12ec201c457e2162c45d02d # v2.0.0 | |
with: | |
webhook-type: incoming-webhook | |
payload: | | |
{"blocks":[{"type": "section","text": {"type": "mrkdwn","text": ":no_entry: Failed GitHub Action:"}},{"type": "section","fields":[{"type": "mrkdwn","text": "*Workflow:*\n<${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}|${{ github.workflow }}>"},{"type": "mrkdwn","text": "*Job:*\n${{ github.job }}"},{"type": "mrkdwn","text": "*Repo:*\n${{ github.repository }}"}]}]} | |
env: | |
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }} | |
if: ${{ failure() }} | |
environment_json_changes_notification: | |
runs-on: ubuntu-latest | |
if: github.event.ref == 'refs/heads/main' | |
needs: [single-sign-on] | |
steps: | |
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 | |
with: | |
fetch-depth: 0 | |
- name: Get modified JSON files | |
id: environment_json_changes | |
run: | | |
files=$(git diff --name-only --diff-filter=M @^ -- 'environments/*.json' | uniq | sed 's#environments/##' | base64 ) | |
echo "files=$files" >> $GITHUB_OUTPUT | |
- name: Install Python | |
if: steps.environment_json_changes.outputs.files != '' | |
uses: actions/setup-python@39cd14951b08e74b54015e9e001cdefcf80e669f # v5.1.1 | |
with: | |
python-version: '3.10' | |
- name: Install the client | |
if: steps.environment_json_changes.outputs.files != '' | |
run: pip install notifications-python-client | |
- name: Send notification to Slack | |
if: steps.environment_json_changes.outputs.files != '' | |
run: | | |
DECODED_FILES=$(echo ${{ steps.environment_json_changes.outputs.files }} | base64 --decode) | |
for file in $DECODED_FILES; do | |
FILE_PATH="https://github.com/${GITHUB_REPOSITORY}/blob/main/environments/${file}" | |
slack_channel=$(jq -r '.tags["slack-channel"] // empty' "environments/$file") | |
if [[ -z "$slack_channel" ]]; then | |
echo "No Slack channel specified in the $file or the field does not exist. Skipping." | |
continue | |
fi | |
echo "Slack channel found: $slack_channel" | |
webhook_url=$(echo $SLACK_WEBHOOKS | jq -r --arg channel "$slack_channel" '.[$channel]') | |
if [[ -z "$webhook_url" || "$webhook_url" == "null" ]]; then | |
echo "No webhook URL found for channel $slack_channel. Skipping notification." | |
continue | |
fi | |
echo "Webhook URL found for channel $slack_channel" | |
PAYLOAD=$(cat <<EOF | |
{ | |
"text": "The JSON file <${FILE_PATH}|${file}> has been changed." | |
} | |
EOF | |
) | |
curl -X POST -H 'Content-type: application/json' --data "$PAYLOAD" "$webhook_url" | |
done | |
env: | |
SLACK_WEBHOOKS: ${{ secrets.SLACK_WEBHOOKS }} | |
SLACK_WEBHOOK_TYPE: INCOMING_WEBHOOK | |
- name: Validate Notify Template Version | |
env: | |
API_KEY: ${{ secrets.GOV_UK_NOTIFY_API_KEY }} | |
TEMPLATE_ID: ${{ env.TEMPLATE_ID }} | |
EXPECTED_TEMPLATE_VERSION: ${{ env.EXPECTED_TEMPLATE_VERSION }} | |
if: steps.environment_json_changes.outputs.files != '' | |
run: | | |
python <<EOF | |
from notifications_python_client.notifications import NotificationsAPIClient | |
import sys | |
api_key = "${{ secrets.GOV_UK_NOTIFY_API_KEY }}" | |
template_id = "${{ env.TEMPLATE_ID }}" | |
expected_version = int("${{ env.EXPECTED_TEMPLATE_VERSION }}") | |
client = NotificationsAPIClient(api_key) | |
try: | |
template_details = client.get_template(template_id) | |
actual_version = template_details.get("version") | |
if actual_version != expected_version: | |
print(f"Error: Template version mismatch! Expected: {expected_version}, Actual: {actual_version}") | |
sys.exit(1) | |
print(f"Template version {actual_version} validated successfully.") | |
except Exception as e: | |
print(f"Failed to fetch template details: {e}") | |
sys.exit(1) | |
EOF | |
- name: Send notification to Email | |
if: steps.environment_json_changes.outputs.files != '' | |
run: | | |
DECODED_FILES=$(echo ${{ steps.environment_json_changes.outputs.files }} | base64 --decode) | |
python ./scripts/json-changes-notifier.py $DECODED_FILES | |
member-bootstrap: | |
runs-on: ubuntu-latest | |
if: github.event.ref == 'refs/heads/main' || github.event_name == 'workflow_dispatch' | |
needs: [single-sign-on] | |
steps: | |
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 | |
with: | |
fetch-depth: 0 | |
- name: Set Account Number | |
run: | | |
ACCOUNT_NUMBER=$(jq -r -e '.modernisation_platform_account_id' <<< $ENVIRONMENT_MANAGEMENT) | |
echo "::add-mask::$ACCOUNT_NUMBER" | |
echo ACCOUNT_NUMBER=$ACCOUNT_NUMBER >> $GITHUB_ENV | |
- name: Configure AWS Credentials | |
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2 | |
with: | |
role-to-assume: "arn:aws:iam::${{ env.ACCOUNT_NUMBER }}:role/github-actions-apply" | |
role-session-name: githubactionsrolesession | |
aws-region: ${{ env.AWS_REGION }} | |
- uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v3.1.2 | |
with: | |
terraform_version: "~1" | |
terraform_wrapper: false | |
- name: get new account(s) | |
id: new_account | |
run: | | |
files=$(git diff --name-only --diff-filter=AM @^ -- 'environments/*.json' | uniq | sed 's#environments/##' | sed 's/\.json$//' | tr '\n' ',' | awk '{$1=$1};1') | |
echo "files=$files" >> $GITHUB_OUTPUT | |
- name: Run secure baselines | |
run: | | |
IFS=',' read -r -a accounts <<< "${{ steps.new_account.outputs.files }}" | |
if [[ ${#accounts[@]} -gt 0 ]]; then | |
for i in "${accounts[@]}"; do | |
echo "[+] Running secure baseline for account ${i}" | |
bash scripts/terraform-init.sh terraform/environments/bootstrap/member-bootstrap | |
bash scripts/setup-baseline.sh terraform/environments/bootstrap/member-bootstrap "${i}" plan | |
bash scripts/setup-baseline.sh terraform/environments/bootstrap/member-bootstrap "${i}" apply | |
done | |
else | |
echo "[+] There were no AWS member accounts to process" | |
fi | |
- name: Slack failure notification | |
uses: slackapi/slack-github-action@485a9d42d3a73031f12ec201c457e2162c45d02d # v2.0.0 | |
with: | |
webhook-type: incoming-webhook | |
payload: | | |
{"blocks":[{"type": "section","text": {"type": "mrkdwn","text": ":no_entry: Failed GitHub Action:"}},{"type": "section","fields":[{"type": "mrkdwn","text": "*Workflow:*\n<${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}|${{ github.workflow }}>"},{"type": "mrkdwn","text": "*Job:*\n${{ github.job }}"},{"type": "mrkdwn","text": "*Repo:*\n${{ github.repository }}"}]}]} | |
env: | |
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }} | |
if: ${{ failure() }} |