Skip to content

Terraform destroy

Terraform destroy #2

# This workflow installs the latest version of Terraform CLI and configures the Terraform CLI configuration file
# with an API token for Terraform Cloud (app.terraform.io). On pull request events, this workflow will run
# `terraform init`, `terraform fmt`, and `terraform plan` (speculative plan via Terraform Cloud). On push events
# to the "main" branch, `terraform apply` will be executed.
#
# Documentation for `hashicorp/setup-terraform` is located here: https://github.com/hashicorp/setup-terraform
#
# To use this workflow, you will need to complete the following setup steps.
#
# 1. Create a `main.tf` file in the root of this repository with the `remote` backend and one or more resources defined.
# Example `main.tf`:
# # The configuration for the `remote` backend.
# terraform {
# backend "remote" {
# # The name of your Terraform Cloud organization.
# organization = "example-organization"
#
# # The name of the Terraform Cloud workspace to store Terraform state files in.
# workspaces {
# name = "example-workspace"
# }
# }
# }
#
# # An example resource that does nothing.
# resource "null_resource" "example" {
# triggers = {
# value = "A example resource that does nothing!"
# }
# }
#
#
# 2. Generate a Terraform Cloud user API token and store it as a GitHub secret (e.g. TF_API_TOKEN) on this repository.
# Documentation:
# - https://www.terraform.io/docs/cloud/users-teams-organizations/api-tokens.html
# - https://help.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets
#
# 3. Reference the GitHub secret in step using the `hashicorp/setup-terraform` GitHub Action.
# Example:
# - name: Setup Terraform
# uses: hashicorp/setup-terraform@v1
# with:
# cli_config_credentials_token: ${{ secrets.TF_API_TOKEN }}
name: 'Terraform destroy'
on:
workflow_dispatch:
# push:
# branches: [ "main" ]
# pull_request:
env:
ARM_CLIENT_ID: ${{ secrets.ARM_CLIENT_ID }}
ARM_CLIENT_SECRET: ${{ secrets.ARM_CLIENT_SECRET }}
ARM_SUBSCRIPTION_ID: ${{ secrets.ARM_SUBSCRIPTION_ID }}
ARM_TENANT_ID: ${{ secrets.ARM_TENANT_ID }}
ARM_ACCESS_KEY: ${{ secrets.ARM_ACCESS_KEY }}
jobs:
# azure_login:
# runs-on: ubuntu-latest
# steps:
# - name: Login via Azure CLI
# uses: azure/login@v1
# with:
# client-id: ${{ secrets.ARM_CLIENT_ID }}
# tenant-id: ${{ secrets.ARM_TENANT_ID }}
# subscription-id: ${{ secrets.ARM_SUBSCRIPTION_ID }}
# - name: "Run Azure CLI command"
# run: az account show
terraform_validate:
#runs-on: ubuntu-latest
runs-on: self-hosted
steps:
- uses: actions/checkout@v2
with:
fetch-depth: 0
- name: Setup Terraform
uses: hashicorp/setup-terraform@v1
with:
terraform_version: "1.8.4"
- name: Terraform Init
run: terraform init
env:
ARM_ACCESS_KEY: ${{ secrets.ARM_ACCESS_KEY }}
- name: Terraform Validate
run: terraform validate
terraform_deploy:
needs: terraform_validate
runs-on: ubuntu-latest
if: github.ref == 'refs/heads/main' # Ensures deployment runs only on main branch
steps:
- uses: actions/checkout@v2
with:
fetch-depth: 0
- name: Setup Terraform
uses: hashicorp/setup-terraform@v1
with:
terraform_version: "1.8.4"
- name: Terraform Init
run: terraform init
env:
ARM_ACCESS_KEY: ${{ secrets.ARM_ACCESS_KEY }}
- name: Terraform Plan
run: terraform plan
- name: Terraform Destroy
run: terraform destroy -auto-approve