Skip to content

stack-spot/runtime-destroy-action

Use this GitHub action with your project
Add this Action to an existing workflow or create a new one
View on Marketplace

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

46 Commits
 
 
 
 
 
 
 
 

Repository files navigation

runtime-destroy-action

Action test Ubuntu

GitHub action to run StackSpot Runtime Destroy Worker.

Note: This action is supported on debian/RHEl like systems

📚 Usage

Requirements

Use Case

Check how to implement the orchestration job using the runtime-manager-action

jobs:
  job1:
    runs-on: ubuntu-latest
    needs: [orchestration]
    strategy:
       matrix:
         task: ${{ fromJSON(needs.orchestration.outputs.tasks) }}
       fail-fast: true
       max-parallel: 1
    steps:
      - name: DESTROY
        if: contains( matrix.task.taskType , 'DESTROY')
        uses: stack-spot/runtime-destroy-action@v2
        with:
          FEATURES_LEVEL_LOG: debug
          CLIENT_ID: ${{ secrets.CLIENT_ID }}
          CLIENT_KEY: ${{ secrets.CLIENT_KEY }}
          CLIENT_REALM: ${{ secrets.CLIENT_REALM }}
          AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
          AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
          AWS_SESSION_TOKEN: ${{ secrets.AWS_SESSION_TOKEN }}
          AWS_ROLE_ARN: ${{ secrets.AWS_ROLE_ARN }}
          AWS_REGION: sa-east-1
          REPOSITORY_NAME: my-repository-name 
          RUN_TASK_ID: ${{ matrix.task.runTaskId }}
          CONTAINER_URL: my/container-url # not mandatory
          FEATURES_TERRAFORM_MODULES: ... # not mandatory
          PATH_TO_MOUNT: path/to/mount
          LOCALEXEC_ENABLED: true # not mandatory
          TF_LOG_PROVIDER: info # not mandatory

▶️ Action Inputs

Field Mandatory Observation
FEATURES_LEVEL_LOG YES Log Level
CLIENT_ID YES StackSpot Client ID.
CLIENT_KEY YES StackSpot Client KEY.
CLIENT_REALM YES StackSpot Client Realm.
AWS_ACCESS_KEY_ID NO AWS Access Key ID
AWS_SECRET_ACCESS_KEY NO AWS Secret Access Key
AWS_SESSION_TOKEN NO AWS Session Token
AWS_ROLE_ARN NO AWS IAM ROLE (necessary if AWS credentials not informed)
AWS_REGION YES AWS region where resources with be provisioned. Used for tf backend as well (e.g: us-east-1).
RUN_TASK_ID YES StackSpot Runtime task id to be executed, according to runtime-manager-action.
REPOSITORY_NAME YES Repository name to checkout during task process.
CONTAINER_URL NO Container url reference (e.g stackspot/image)
FEATURES_TERRAFORM_MODULES NO List of external terraform modules allowed
PATH_TO_MOUNT YES Path provided to be used as a volume within the docker image that will be used with terraform
LOCALEXEC_ENABLED NO Whether or not terraform will be enable to perform local exec operations or not (default: false)
TF_LOG_PROVIDER NO If there is a need to check Terraform's own log, it is now possible to pass the levels of the Terraform provider, allowing you to analyze what happens within Terraform's CLI (info, trace, debug and warn).

License

Apache License 2.0