Skip to content

Deploy refs/tags/release/2024.43 #49

Deploy refs/tags/release/2024.43

Deploy refs/tags/release/2024.43 #49

name: Deploy to Production
run-name: Deploy ${{ github.ref }}
on:
push:
tags:
- 'release/**'
workflow_dispatch:
concurrency:
group: deploy-production
cancel-in-progress: false
permissions:
contents: read
id-token: write
jobs:
validate:
name: Validate commits for deployment
permissions:
contents: read
uses: ./.github/workflows/validate-deployment.yml
with:
protected-ref: main
deployment-ref: ${{ github.ref }}
build:
name: Build deployment artifacts
permissions:
contents: read
packages: write
needs:
- validate
uses: ./.github/workflows/build.yml
with:
ref: ${{ github.sha }}
build-server-image: true
server-image-push: true
server-image-args-ref: ${{ github.ref }}
server-image-version: ${{ github.ref_name }}
server-image-tag-latest: false
server-image-tag-release: ${{ github.ref_name }}
server-image-upload-attestations: true
server-image-artifacts-retention-days: 90
build-website: true
website-artifact-retention-days: 90
aws-auth-plan:
name: Configure AWS Credentials
permissions:
contents: read
id-token: write
needs:
- validate
uses: ./.github/workflows/aws-auth.yml
with:
aws-region: us-west-2
secrets:
gpg-passphrase: ${{ secrets.PRODUCTION_GPG_PASSPHRASE }}
role-to-assume: ${{ secrets.PRODUCTION_ROLE_ARN }}
tf-plan:
name: Plan Terraform
permissions:
contents: read
needs:
- validate
- build
- aws-auth-plan
uses: ./.github/workflows/terraform-plan.yml
with:
ref: ${{ github.sha }}
concurrency-group: run_terraform-production
server-image-tag: ${{ github.sha }}
server-image-digest: ${{ needs.build.outputs.server-image-digest }}
website-artifacts-key: ${{ needs.build.outputs.website-artifacts-key }}
website-artifacts-path: ${{ needs.build.outputs.website-artifacts-path }}
aws-region: us-west-2
environment-key: production
tf-backend-config-file: prod.s3.tfbackend
tf-var-file: prod.tfvars
upload-artifacts: true
artifacts-retention-days: 90
secrets:
aws-access-key-id: ${{ needs.aws-auth-plan.outputs.aws-access-key-id }}
aws-secret-access-key: ${{ needs.aws-auth-plan.outputs.aws-secret-access-key }}
aws-session-token: ${{ needs.aws-auth-plan.outputs.aws-session-token }}
datadog-api-key: ${{ secrets.DATADOG_API_KEY }}
datadog-app-key: ${{ secrets.DATADOG_APP_KEY }}
gpg-passphrase: ${{ secrets.PRODUCTION_GPG_PASSPHRASE }}
publish-tf-plan:
name: Publish Terraform Plan
permissions:
contents: read
pull-requests: write
if: needs.tf-plan.result != 'skipped' || needs.tf-plan.result != 'cancelled'
needs:
- tf-plan
uses: ./.github/workflows/publish-terraform-plan.yml
with:
write-summary: true
write-comment: false
tf-fmt-outcome: ${{ needs.tf-plan.outputs.fmt-outcome }}
tf-init-outcome: ${{ needs.tf-plan.outputs.init-outcome }}
tf-plan-outcome: ${{ needs.tf-plan.outputs.plan-outcome }}
tf-plan-summary: ${{ needs.tf-plan.outputs.plan-summary-markdown }}
tf-validate-outcome: ${{ needs.tf-plan.outputs.validate-outcome }}
tf-validate-output: ${{ needs.tf-plan.outputs.validate-output }}
aws-auth-apply:
name: Configure AWS Credentials
permissions:
contents: read
id-token: write
needs:
- tf-plan
uses: ./.github/workflows/aws-auth.yml
with:
aws-region: us-west-2
environment-name: production
secrets:
gpg-passphrase: ${{ secrets.PRODUCTION_GPG_PASSPHRASE }}
role-to-assume: ${{ secrets.PRODUCTION_ROLE_ARN }}
tf-apply:
name: Deploy to Production
needs:
- build
- tf-plan
- aws-auth-apply
if: needs.tf-plan.outputs.plan-exitcode == 2
uses: ./.github/workflows/terraform-apply.yml
with:
website-artifacts-key: ${{ needs.build.outputs.website-artifacts-key }}
website-artifacts-path: ${{ needs.build.outputs.website-artifacts-path }}
tf-plan-artifacts-key: ${{ needs.tf-plan.outputs.artifacts-key }}
aws-region: us-west-2
concurrency-group: run_terraform-production
tf-backend-config-file: prod.s3.tfbackend
environment-name: production
secrets:
aws-access-key-id: ${{ needs.aws-auth-apply.outputs.aws-access-key-id }}
aws-secret-access-key: ${{ needs.aws-auth-apply.outputs.aws-secret-access-key }}
aws-session-token: ${{ needs.aws-auth-apply.outputs.aws-session-token }}
datadog-api-key: ${{ secrets.DATADOG_API_KEY }}
datadog-app-key: ${{ secrets.DATADOG_APP_KEY }}
gpg-passphrase: ${{ secrets.PRODUCTION_GPG_PASSPHRASE }}
update-release:
name: Update release
runs-on: ubuntu-latest
if: startsWith(github.ref, 'refs/tags/release/')
permissions:
contents: write
needs:
- build
- tf-apply
env:
GH_TOKEN: ${{ github.token }}
RELEASE_TAG: ${{ github.ref_name }}
steps:
- name: Harden Runner
uses: step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
uploads.github.com:443
github.com:443
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Download website build artifacts
uses: actions/download-artifact@65a9edc5881444af0b9093a5e628f2fe47ea3b2e # v4.1.7
with:
name: ${{ needs.build.outputs.website-artifacts-key }}
path: ${{ needs.build.outputs.website-artifacts-path }}
- name: Download docker build attestation artifacts
uses: actions/download-artifact@65a9edc5881444af0b9093a5e628f2fe47ea3b2e # v4.1.7
with:
name: ${{ needs.build.outputs.server-attestation-artifacts-key }}
path: ${{ needs.build.outputs.server-attestation-artifacts-path }}
- name: Upload release assets
run: |
WEBSITE_TAR_FILE="client-dist.tar.gz"
tar -czf "$WEBSITE_TAR_FILE" -C $(dirname "$WEBSITE_DIST_PATH") ./dist
gh release upload --clobber "$RELEASE_TAG" \
"$WEBSITE_TAR_FILE#Client website bundle" \
"$PROVENANCE_FILE#Server Docker image provenance attestations" \
"$SBOM_FILE#Server Docker image SBOM attestations"
env:
WEBSITE_DIST_PATH: ${{ needs.build.outputs.website-artifacts-path }}
PROVENANCE_FILE: ${{ needs.build.outputs.server-attestation-artifacts-path }}/provenance.json
SBOM_FILE: ${{ needs.build.outputs.server-attestation-artifacts-path }}/sbom.sdpx.json
- name: Get release notes
id: get
continue-on-error: true
run: gh release view "$RELEASE_TAG" --json body --jq .body > release_notes.md
- name: Add deployment history to release notes
if: always() && steps.get.outcome == 'success'
run: printf "\n- Deployed at $(date --iso-8601=seconds)\n" >> release_notes.md
- name: Update release notes and status
if: always() && steps.get.outcome == 'success'
run: gh release edit "$RELEASE_TAG" --draft=false --prerelease=false --latest --verify-tag -F release_notes.md