Removed broken quicksight dataset in aws and tfstate. Plan works locally #2297
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: "Terragrunt plan STAGING" | ||
on: | ||
pull_request: | ||
paths: | ||
- ".env" | ||
- "aws/**" | ||
- "env/staging/**" | ||
- "env/terragrunt.hcl" | ||
- ".github/workflows/terragrunt_plan_staging.yml" | ||
env: | ||
TARGET_ENV_PATH: staging | ||
AWS_ACCESS_KEY_ID: ${{ secrets.STAGING_AWS_ACCESS_KEY_ID }} | ||
AWS_SECRET_ACCESS_KEY: ${{ secrets.STAGING_AWS_SECRET_ACCESS_KEY }} | ||
AWS_REGION: ca-central-1 | ||
TERRAFORM_VERSION: 0.14.4 | ||
TERRAGRUNT_VERSION: 0.35.13 | ||
TF_VAR_base_domain: ${{secrets.STAGING_BASE_DOMAIN}} | ||
TF_VAR_alt_base_domain: ${{secrets.STAGING_ALT_BASE_DOMAIN}} | ||
TF_VAR_dbtools_password: ${{ secrets.STAGING_DBTOOLS_PASSWORD }} | ||
TF_VAR_heartbeat_api_key: ${{ secrets.STAGING_HEARTBEAT_API_KEY }} | ||
TF_VAR_heartbeat_template_id: ${{ secrets.STAGING_HEARTBEAT_TEMPLATE_ID }} | ||
TF_VAR_rds_cluster_password: ${{ secrets.STAGING_RDS_CLUSTER_PASSWORD }} | ||
TF_VAR_app_db_user_password: ${{ secrets.STAGING_APP_DB_USER_PASSWORD }} | ||
TF_VAR_quicksight_db_user_password: ${{ secrets.STAGING_QUICKSIGHT_DB_USER_PASSWORD }} | ||
TF_VAR_cloudwatch_opsgenie_alarm_webhook: "" | ||
TF_VAR_cloudwatch_slack_webhook_warning_topic: ${{ secrets.STAGING_CLOUDWATCH_SLACK_WEBHOOK }} | ||
TF_VAR_cloudwatch_slack_webhook_critical_topic: ${{ secrets.STAGING_CLOUDWATCH_SLACK_WEBHOOK }} | ||
TF_VAR_cloudwatch_slack_webhook_general_topic: ${{ secrets.STAGING_CLOUDWATCH_SLACK_WEBHOOK }} | ||
TF_VAR_notify_o11y_google_oauth_client_id: ${{ secrets.NOTIFY_O11Y_GOOGLE_OAUTH_CLIENT_ID }} | ||
TF_VAR_notify_o11y_google_oauth_client_secret: ${{ secrets.NOTIFY_O11Y_GOOGLE_OAUTH_CLIENT_SECRET }} | ||
TF_VAR_sentinel_customer_id: ${{ secrets.SENTINEL_CUSTOMER_ID }} | ||
TF_VAR_sentinel_shared_key: ${{ secrets.SENTINEL_SHARED_KEY }} | ||
TF_VAR_slack_channel_warning_topic: "notification-staging-ops" | ||
TF_VAR_slack_channel_critical_topic: "notification-staging-ops" | ||
TF_VAR_slack_channel_general_topic: "notification-staging-ops" | ||
TF_VAR_new_relic_license_key: ${{ secrets.STAGING_NEW_RELIC_LICENSE_KEY }} | ||
TF_VAR_waf_secret: ${{secrets.STAGING_WAF_SECRET}} | ||
# Prevents repeated creation of the Slack lambdas if already existing. | ||
# See: https://github.com/terraform-aws-modules/terraform-aws-notify-slack/issues/84 | ||
TF_RECREATE_MISSING_LAMBDA_PACKAGE: false | ||
TF_VAR_perf_test_phone_number: ${{ secrets.PERF_TEST_PHONE_NUMBER }} | ||
TF_VAR_perf_test_email: ${{ secrets.PERF_TEST_EMAIL }} | ||
TF_VAR_perf_test_domain: ${{ secrets.PERF_TEST_DOMAIN }} | ||
TF_VAR_perf_test_auth_header: ${{ secrets.PERF_TEST_AUTH_HEADER }} | ||
TF_VAR_blazer_slack_webhook_general_topic: ${{ secrets.STAGING_BLAZER_SLACK_WEBHOOK }} | ||
jobs: | ||
terragrunt-plan-staging: | ||
runs-on: ubuntu-latest | ||
steps: | ||
- name: Checkout | ||
uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 | ||
- name: Set environment variables | ||
uses: ./.github/actions/setvars | ||
with: | ||
envVarFile: ./.env | ||
- name: Setup Terraform tools | ||
uses: cds-snc/terraform-tools-setup@v1 | ||
- uses: dorny/paths-filter@b2feaf19c27470162a626bd6fa8438ae5b263721 # v2.10.2 | ||
id: filter | ||
with: | ||
filters: | | ||
common: | ||
- '.github/workflows/terragrunt-plan-staging.yml' | ||
- 'aws/common/**' | ||
- 'env/staging/common/**' | ||
- 'env/terragrunt.hcl' | ||
- 'env/staging/env_vars.hcl' | ||
dns: | ||
- 'aws/dns/**' | ||
- 'env/staging/dns/**' | ||
ses_validation_dns_entries: | ||
- 'aws/ses_validation_dns_entries/**' | ||
- 'env/staging/ses_validation_dns_entries/**' | ||
ecr: | ||
- 'aws/ecr/**' | ||
- 'env/staging/ecr/**' | ||
eks: | ||
- 'aws/eks/**' | ||
- 'env/staging/eks/**' | ||
elasticache: | ||
- 'aws/elasticache/**' | ||
- 'env/staging/elasticache/**' | ||
rds: | ||
- 'aws/rds/**' | ||
- 'env/staging/rds/**' | ||
cloudfront: | ||
- 'aws/cloudfront/**' | ||
- 'env/staging/cloudfront/**' | ||
lambda-api: | ||
- 'aws/lambda-api/**' | ||
- 'env/staging/lambda-api/**' | ||
lambda-admin-pr: | ||
- 'aws/lambda-admin-pr/**' | ||
- 'env/staging/lambda-admin-pr/**' | ||
performance-test: | ||
- 'aws/performance-test/**' | ||
- 'env/staging/performance-test/**' | ||
heartbeat: | ||
- 'aws/heartbeat/**' | ||
- 'env/staging/heartbeat/**' | ||
database-tools: | ||
- 'aws/database-tools/**' | ||
- 'env/staging/database-tools/**' | ||
quicksight: | ||
- 'aws/quicksight/**' | ||
- 'env/staging/quicksight/**' | ||
lambda-google-cidr: | ||
- 'aws/lambda-google-cidr/**' | ||
- 'env/staging/lambda-google-cidr/**' | ||
ses_receiving_emails: | ||
- 'aws/ses_receiving_emails/**' | ||
- 'env/staging/ses_receiving_emails/**' | ||
ses_to_sqs_email_callbacks: | ||
- 'aws/ses_to_sqs_email_callbacks/**' | ||
- 'env/staging/ses_to_sqs_email_callbacks/**' | ||
sns_to_sqs_sms_callbacks: | ||
- 'aws/sns_to_sqs_sms_callbacks/**' | ||
- 'env/staging/sns_to_sqs_sms_callbacks/**' | ||
- name: Terragrunt plan common | ||
if: ${{ steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/common" | ||
comment-delete: "true" | ||
comment-title: "Staging: common" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan ECR | ||
if: ${{ steps.filter.outputs.ecr == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/ecr" | ||
comment-delete: "true" | ||
comment-title: "Staging: ecr" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan ses_receiving_emails | ||
if: ${{ steps.filter.outputs.ses_receiving_emails == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/ses_receiving_emails" | ||
comment-delete: "true" | ||
comment-title: "Staging: ses_receiving_emails" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan dns | ||
if: ${{ steps.filter.outputs.dns == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/dns" | ||
comment-delete: "true" | ||
comment-title: "Staging: dns" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan ses_validation_dns_entries | ||
if: ${{ steps.filter.outputs.ses_validation_dns_entries == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/ses_validation_dns_entries" | ||
comment-delete: "true" | ||
comment-title: "Staging: ses_validation_dns_entries" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan eks | ||
if: ${{ steps.filter.outputs.eks == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/eks" | ||
comment-delete: "true" | ||
comment-title: "Staging: eks" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan elasticache | ||
if: ${{ steps.filter.outputs.elasticache == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/elasticache" | ||
comment-delete: "true" | ||
comment-title: "Staging: elasticache" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan rds | ||
if: ${{ steps.filter.outputs.rds == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/rds" | ||
comment-delete: "true" | ||
comment-title: "Staging: rds" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan cloudfront | ||
if: ${{ steps.filter.outputs.cloudfront == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/cloudfront" | ||
comment-delete: "true" | ||
comment-title: "Staging: cloudfront" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan lambda-api | ||
if: ${{ steps.filter.outputs.lambda-api == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/lambda-api" | ||
comment-delete: "true" | ||
comment-title: "Staging: lambda-api" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan lambda-admin-pr | ||
if: ${{ steps.filter.outputs.lambda-admin-pr == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/lambda-admin-pr" | ||
comment-delete: "true" | ||
comment-title: "Staging: lambda-admin-pr" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan performance-test | ||
if: ${{ steps.filter.outputs.performance-test == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/performance-test" | ||
comment-delete: "true" | ||
comment-title: "Staging: performance-test" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan heartbeat | ||
if: ${{ steps.filter.outputs.heartbeat == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/heartbeat" | ||
comment-delete: "true" | ||
comment-title: "Staging: heartbeat" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan database-tools | ||
if: ${{ steps.filter.outputs.database-tools == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/database-tools" | ||
comment-delete: "true" | ||
comment-title: "Staging: database-tools" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan quicksight | ||
if: ${{ steps.filter.outputs.quicksight == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/quicksight" | ||
comment-delete: "true" | ||
comment-title: "Staging: quicksight" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan lambda-google-cidr | ||
if: ${{ steps.filter.outputs.lambda-google-cidr == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/lambda-google-cidr" | ||
comment-delete: "true" | ||
comment-title: "Staging: lambda-google-cidr" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan ses_to_sqs_email_callbacks | ||
if: ${{ steps.filter.outputs.ses_to_sqs_email_callbacks == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/ses_to_sqs_email_callbacks" | ||
comment-delete: "true" | ||
comment-title: "Staging: ses_to_sqs_email_callbacks" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" | ||
- name: Terragrunt plan sns_to_sqs_sms_callbacks | ||
if: ${{ steps.filter.outputs.sns_to_sqs_sms_callbacks == 'true' || steps.filter.outputs.common == 'true' }} | ||
uses: cds-snc/terraform-plan@v3 | ||
with: | ||
directory: "env/staging/sns_to_sqs_sms_callbacks" | ||
comment-delete: "true" | ||
comment-title: "Staging: sns_to_sqs_sms_callbacks" | ||
github-token: "${{ secrets.GITHUB_TOKEN }}" | ||
terragrunt: "true" |