Terraform destroy #2
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This workflow installs the latest version of Terraform CLI and configures the Terraform CLI configuration file | |
# with an API token for Terraform Cloud (app.terraform.io). On pull request events, this workflow will run | |
# `terraform init`, `terraform fmt`, and `terraform plan` (speculative plan via Terraform Cloud). On push events | |
# to the "main" branch, `terraform apply` will be executed. | |
# | |
# Documentation for `hashicorp/setup-terraform` is located here: https://github.com/hashicorp/setup-terraform | |
# | |
# To use this workflow, you will need to complete the following setup steps. | |
# | |
# 1. Create a `main.tf` file in the root of this repository with the `remote` backend and one or more resources defined. | |
# Example `main.tf`: | |
# # The configuration for the `remote` backend. | |
# terraform { | |
# backend "remote" { | |
# # The name of your Terraform Cloud organization. | |
# organization = "example-organization" | |
# | |
# # The name of the Terraform Cloud workspace to store Terraform state files in. | |
# workspaces { | |
# name = "example-workspace" | |
# } | |
# } | |
# } | |
# | |
# # An example resource that does nothing. | |
# resource "null_resource" "example" { | |
# triggers = { | |
# value = "A example resource that does nothing!" | |
# } | |
# } | |
# | |
# | |
# 2. Generate a Terraform Cloud user API token and store it as a GitHub secret (e.g. TF_API_TOKEN) on this repository. | |
# Documentation: | |
# - https://www.terraform.io/docs/cloud/users-teams-organizations/api-tokens.html | |
# - https://help.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets | |
# | |
# 3. Reference the GitHub secret in step using the `hashicorp/setup-terraform` GitHub Action. | |
# Example: | |
# - name: Setup Terraform | |
# uses: hashicorp/setup-terraform@v1 | |
# with: | |
# cli_config_credentials_token: ${{ secrets.TF_API_TOKEN }} | |
name: 'Terraform destroy' | |
on: | |
workflow_dispatch: | |
# push: | |
# branches: [ "main" ] | |
# pull_request: | |
env: | |
ARM_CLIENT_ID: ${{ secrets.ARM_CLIENT_ID }} | |
ARM_CLIENT_SECRET: ${{ secrets.ARM_CLIENT_SECRET }} | |
ARM_SUBSCRIPTION_ID: ${{ secrets.ARM_SUBSCRIPTION_ID }} | |
ARM_TENANT_ID: ${{ secrets.ARM_TENANT_ID }} | |
ARM_ACCESS_KEY: ${{ secrets.ARM_ACCESS_KEY }} | |
jobs: | |
# azure_login: | |
# runs-on: ubuntu-latest | |
# steps: | |
# - name: Login via Azure CLI | |
# uses: azure/login@v1 | |
# with: | |
# client-id: ${{ secrets.ARM_CLIENT_ID }} | |
# tenant-id: ${{ secrets.ARM_TENANT_ID }} | |
# subscription-id: ${{ secrets.ARM_SUBSCRIPTION_ID }} | |
# - name: "Run Azure CLI command" | |
# run: az account show | |
terraform_validate: | |
#runs-on: ubuntu-latest | |
runs-on: self-hosted | |
steps: | |
- uses: actions/checkout@v2 | |
with: | |
fetch-depth: 0 | |
- name: Setup Terraform | |
uses: hashicorp/setup-terraform@v1 | |
with: | |
terraform_version: "1.8.4" | |
- name: Terraform Init | |
run: terraform init | |
env: | |
ARM_ACCESS_KEY: ${{ secrets.ARM_ACCESS_KEY }} | |
- name: Terraform Validate | |
run: terraform validate | |
terraform_deploy: | |
needs: terraform_validate | |
runs-on: ubuntu-latest | |
if: github.ref == 'refs/heads/main' # Ensures deployment runs only on main branch | |
steps: | |
- uses: actions/checkout@v2 | |
with: | |
fetch-depth: 0 | |
- name: Setup Terraform | |
uses: hashicorp/setup-terraform@v1 | |
with: | |
terraform_version: "1.8.4" | |
- name: Terraform Init | |
run: terraform init | |
env: | |
ARM_ACCESS_KEY: ${{ secrets.ARM_ACCESS_KEY }} | |
- name: Terraform Plan | |
run: terraform plan | |
- name: Terraform Destroy | |
run: terraform destroy -auto-approve | |