UML-2732: Run Lambda in container image and enable integration tests #7
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: "[Workflow] Pull Request Path" | |
concurrency: | |
group: ${{ github.ref }}-${{ github.workflow }} | |
on: | |
pull_request: | |
branches: | |
- main | |
permissions: | |
actions: read | |
checks: read | |
contents: write | |
deployments: none | |
issues: none | |
packages: none | |
pull-requests: write | |
repository-projects: none | |
security-events: write | |
statuses: none | |
defaults: | |
run: | |
shell: bash | |
jobs: | |
pr_label: | |
runs-on: ubuntu-latest | |
name: Label PR | |
steps: | |
- uses: actions/labeler@main | |
with: | |
configuration-path: ".github/labeller.yml" | |
repo-token: "${{ secrets.GITHUB_TOKEN }}" | |
sync-labels: true | |
branch_name: | |
name: "Generate a safe branch name" | |
uses: ministryofjustice/opg-github-workflows/.github/workflows/data-parse-branch-name.yml@main | |
set_variables: | |
name: output workflow variables | |
runs-on: ubuntu-latest | |
outputs: | |
environment_terraform_version: ${{ steps.terraform_version_environment.outputs.version }} | |
semver_tag: ${{ steps.semver_tag.outputs.created_tag }} | |
steps: | |
- name: Set terraform version - environment | |
id: terraform_version_environment | |
uses: ministryofjustice/opg-github-actions/.github/actions/[email protected] | |
with: | |
terraform_directory: "./terraform/environment" | |
- name: "Semver tag" | |
id: semver_tag | |
uses: ministryofjustice/opg-github-actions/.github/actions/[email protected] | |
with: | |
prerelease: true | |
with_v: true | |
github_token: ${{ secrets.GITHUB_TOKEN }} | |
terraform_environment_lint: | |
name: Terraform - Environment - Lint | |
needs: | |
- set_variables | |
uses: ministryofjustice/opg-github-workflows/.github/workflows/[email protected] | |
with: | |
terraform_version: ${{ needs.set_variables.outputs.environment_terraform_version }} | |
tflint_check: false | |
directory: "./terraform/environment" | |
python_unit_tests: | |
name: Python Unit Tests | |
needs: | |
- set_variables | |
uses: ./.github/workflows/_python_unit_tests.yml | |
docker_build_scan_push: | |
name: Build, Scan and Push | |
needs: | |
- set_variables | |
uses: ./.github/workflows/_docker_build_scan_push.yml | |
with: | |
build_latest: false | |
semver_tag: ${{ needs.set_variables.outputs.semver_tag }} | |
secrets: inherit | |
# terraform_checks: | |
# runs-on: ubuntu-latest | |
# needs: build_and_test | |
# env: | |
# TF_VAR_pagerduty_token: ${{ secrets.PAGERDUTY_TOKEN }} | |
# strategy: | |
# max-parallel: 1 | |
# matrix: | |
# include: | |
# - environment: "development" | |
# - environment: "preproduction" | |
# - environment: "production" | |
# - environment: "integration" | |
# steps: | |
# - uses: actions/checkout@v4 | |
# - name: Configure AWS Credentials For Terraform | |
# uses: aws-actions/configure-aws-credentials@v4 | |
# with: | |
# aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
# aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
# aws-region: eu-west-1 | |
# role-session-name: GitHubActionsTerraform | |
# - uses: hashicorp/setup-terraform@v3 | |
# with: | |
# terraform_version: 1.2.4 | |
# - name: Retrieve Artifact | |
# uses: actions/download-artifact@v4 | |
# with: | |
# name: opg-data-lpa | |
# - name: unzip | |
# run: | | |
# unzip ./opg-data-lpa.zip -d . | |
# - name: Setup environment | |
# run: | | |
# echo TF_WORKSPACE=${{ matrix.environment }} >> $GITHUB_ENV | |
# - name: Terraform init | |
# working-directory: ./terraform/environment | |
# run: | | |
# terraform init | |
# - name: Terraform formatting | |
# working-directory: ./terraform/environment | |
# run: | | |
# terraform fmt -diff -check -recursive | |
# - name: Validate Terraform | |
# working-directory: ./terraform/environment | |
# run: | | |
# terraform validate | |
# - name: Terraform plan | |
# working-directory: ./terraform/environment | |
# run: | | |
# terraform plan -input=false | |
# pact_verification: | |
# runs-on: ubuntu-latest | |
# needs: terraform_checks | |
# env: | |
# # GIT_CONSUMER: << pipeline.parameters.consumer >> | |
# # GIT_COMMIT_CONSUMER: << pipeline.parameters.consumerversion >> | |
# PACT_PROVIDER: lpa | |
# PACT_CONSUMER: sirius | |
# PACT_BROKER_BASE_URL: https://pact-broker.api.opg.service.justice.gov.uk | |
# PACT_BROKER_HTTP_AUTH_USER: admin | |
# steps: | |
# - uses: actions/checkout@v2 | |
# - name: Pact Install | |
# run: | | |
# wget https://github.com/pact-foundation/pact-ruby-standalone/releases/download/v1.82.3/pact-1.82.3-linux-x86_64.tar.gz | |
# tar xzf pact-1.82.3-linux-x86_64.tar.gz | |
# - name: Code artifact login | |
# working-directory: ./docs/ci_scripts | |
# run: | | |
# ./login_code_artifact.sh -a 288342028542 -t pip | |
# - name: install ci requirements | |
# working-directory: ./pact | |
# run: | | |
# pip3 install -r requirements.txt | |
# - name: verify pact | |
# working-directory: ./pact | |
# run: | | |
# echo ${API_VERSION} | |
# python check_pact_deployable.py \ | |
# --provider_base_url="http://localhost:4343" \ | |
# --pact_broker_url="${PACT_BROKER_BASE_URL}" \ | |
# --broker_user_name="admin" \ | |
# --broker_secret_name="pactbroker_admin" \ | |
# --consumer_pacticipant="${PACT_CONSUMER}" \ | |
# --provider_pacticipant="${PACT_PROVIDER}" \ | |
# --api_version="${API_VERSION}" \ | |
# --git_commit_consumer="${GIT_COMMIT_CONSUMER}" \ | |
# --git_commit_provider="${GIT_COMMIT_PROVIDER}" || echo "Failed but because consumer pacts not set up yet" | |
# ephemeral_environment: | |
# name: Create Ephemeral Environment | |
# runs-on: "ubuntu-latest" | |
# needs: [build_and_test, terraform_checks] | |
# steps: | |
# - uses: actions/checkout@v4 | |
# - uses: hashicorp/setup-terraform@v3 | |
# with: | |
# terraform_version: 1.2.4 | |
# - name: Extract branch name | |
# shell: bash | |
# run: | | |
# echo "branch_raw=$(echo ${GITHUB_HEAD_REF:-${GITHUB_REF##*/}})" >> $GITHUB_OUTPUT | |
# echo "branch_formatted=$(echo ${GITHUB_HEAD_REF:-${GITHUB_REF##*/}} | tr -cd '[:alnum:]' | tr '[:upper:]' '[:lower:]' | cut -c1-8)" >> $GITHUB_OUTPUT | |
# id: extract_branch | |
# - name: Install workspace manager | |
# run: | | |
# wget https://github.com/ministryofjustice/opg-terraform-workspace-manager/releases/download/v0.3.2/opg-terraform-workspace-manager_Linux_x86_64.tar.gz -O $HOME/terraform-workspace-manager.tar.gz | |
# sudo tar -xvf $HOME/terraform-workspace-manager.tar.gz -C /usr/local/bin | |
# sudo chmod +x /usr/local/bin/terraform-workspace-manager | |
# - name: Configure AWS Credentials For Terraform | |
# uses: aws-actions/configure-aws-credentials@v4 | |
# with: | |
# aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
# aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
# aws-region: eu-west-1 | |
# role-session-name: GitHubActionsTerraform | |
# - name: Retrieve Artifact | |
# uses: actions/download-artifact@v4 | |
# with: | |
# name: opg-data-lpa | |
# - name: Unzip Artifact | |
# run: unzip -o ./opg-data-lpa.zip -d ./lambda_functions | |
# - name: Terraform init | |
# working-directory: ./terraform/environment | |
# env: | |
# TF_WORKSPACE: default | |
# run: | | |
# terraform init | |
# - name: Terraform apply | |
# working-directory: ./terraform/environment | |
# env: | |
# TF_WORKSPACE: ${{ steps.extract_branch.outputs.branch_formatted }} | |
# run: | | |
# terraform apply --auto-approve | |
# - name: Protect Workspace | |
# env: | |
# TF_WORKSPACE: ${{ steps.extract_branch.outputs.branch_formatted }} | |
# run: terraform-workspace-manager -register-workspace=$TF_WORKSPACE -time-to-protect=4 -aws-account-id=288342028542 -aws-iam-role=integrations-ci |