Skip to content

chore: or-2134 cleanup unused test project #55

chore: or-2134 cleanup unused test project

chore: or-2134 cleanup unused test project #55

Workflow file for this run

name: Main
on:
push:
branches: [ main ]
workflow_dispatch:
concurrency: CI
jobs:
analyze-code:
name: Analyze Code
runs-on: ubuntu-latest
steps:
- name: Checkout Code
uses: actions/checkout@v4
- name: Cache NPM
uses: informatievlaanderen/build-pipeline/.github/actions/cache-npm@main
- name: Parse repository name
run: echo REPOSITORY_NAME=$(echo "$GITHUB_REPOSITORY" | awk -F / '{print $2}' | sed -e "s/:refs//") >> $GITHUB_ENV
shell: bash
- name: Setup NodeJS
uses: informatievlaanderen/build-pipeline/.github/actions/setup-nodejs@main
- name: Setup Python
uses: informatievlaanderen/build-pipeline/.github/actions/setup-python@main
- name: Generate Token
id: generate_token # Add an ID to this step for reference
run: node .github/build-scripts/generate-token.js
env:
APP_ID: ${{ secrets.MYBOT_APP_ID }}
PRIVATE_KEY: ${{ secrets.MYBOT_PRIVATE_KEY }}
- name: Checkout Code
uses: actions/checkout@v4
with:
token: ${{ steps.generate_token.outputs.installationToken }}
- name: Set up JDK 17
uses: actions/setup-java@v4
with:
java-version: 17
distribution: oracle
- name: Parse repository name
run: echo REPOSITORY_NAME=$(echo "$GITHUB_REPOSITORY" | awk -F / '{print $2}' | sed -e "s/:refs//") >> $GITHUB_ENV
shell: bash
- name: Setup .NET Core
uses: actions/setup-dotnet@v4
with:
dotnet-version: '7.0.408'
- name: .NET version
shell: bash
run: dotnet --info
- name: Cache SonarCloud packages
uses: actions/cache@v4
with:
path: ~/sonar/cache
key: ${{ runner.os }}-sonar
restore-keys: ${{ runner.os }}-sonar
- name: Restore dotnet tools
shell: bash
run: |
dotnet tool restore
- name: Cache SonarCloud scanner
id: cache-sonar-scanner
uses: actions/cache@v4
with:
path: ./.sonar/scanner
key: ${{ runner.os }}-sonar-scanner
restore-keys: ${{ runner.os }}-sonar-scanner
- name: Install SonarCloud scanner
if: steps.cache-sonar-scanner.outputs.cache-hit != 'true'
shell: bash
run: |
mkdir .sonar
mkdir .sonar/scanner
dotnet tool update dotnet-sonarscanner --tool-path ./.sonar/scanner
- name: Start sonar scanner
env:
GITHUB_TOKEN: ${{ steps.generate_token.outputs.installationToken }}
SONAR_TOKEN: ${{ secrets.VBR_SONAR_TOKEN }}
shell: bash
run: |
./.sonar/scanner/dotnet-sonarscanner begin /k:"Informatievlaanderen_association-registry" /o:"informatievlaanderen" /d:sonar.login="${{ secrets.VBR_SONAR_TOKEN }}" /d:sonar.host.url="https://sonarcloud.io" /d:sonar.cs.dotcover.reportsPaths=dotCover.Output.html
- name: Dotnet restore
shell: bash
run: dotnet restore --runtime linux-x64
- name: Dotnet build
shell: bash
run: dotnet build --no-restore
- name: Analyze with sonar scanner
env:
GITHUB_TOKEN: ${{ secrets.VBR_ACTIONS_TOKEN }} # Needed to get PR information, if any
SONAR_TOKEN: ${{ secrets.VBR_SONAR_TOKEN }}
shell: bash
run: |
./.sonar/scanner/dotnet-sonarscanner end /d:sonar.login="${{ secrets.VBR_SONAR_TOKEN }}"
set-release-version:
if: github.repository_owner == 'Informatievlaanderen'
name: Decide next version
runs-on: ubuntu-latest
outputs:
version: ${{ steps.set-version.outputs.version }}
steps:
- name: Checkout Code
uses: actions/checkout@v4
- name: Setup NodeJS
uses: actions/setup-node@v4
with:
node-version: 20.6.1
- run: npm ci
- name: Run Semantic Release dry-run
shell: bash
run: npx semantic-release --dry-run
env:
NPM_TOKEN: ${{ secrets.NPM_TOKEN }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
GIT_COMMIT: ${{ github.sha }}
GIT_USERNAME: ${{ secrets.VBR_GIT_USER }}
GIT_AUTHOR_NAME: ${{ secrets.VBR_GIT_USER }}
GIT_COMMITTER_NAME: ${{ secrets.VBR_GIT_USER }}
GIT_EMAIL: ${{ secrets.VBR_GIT_EMAIL }}
GIT_AUTHOR_EMAIL: ${{ secrets.VBR_GIT_EMAIL }}
GIT_COMMITTER_EMAIL: ${{ secrets.VBR_GIT_EMAIL }}
- name: Set Release Version
id: set-version
run: |
[ ! -f semver ] && echo none > semver
echo $(cat semver)
echo ::set-output name=version::$(cat semver)
echo RELEASE_VERSION=$(cat semver) >> $GITHUB_ENV
shell: bash
build-mutation-lambda:
name: Build Mutation Lambda
needs: [ set-release-version ]
runs-on: ubuntu-latest
if: ${{ (github.repository_owner == 'Informatievlaanderen') && (needs.set-release-version.outputs.version != 'none') }}
steps:
- name: Check version
shell: bash
run: echo $SEMVER
env:
SEMVER: ${{ needs.set-release-version.outputs.version }}
- name: Checkout Code
uses: actions/checkout@v4
- name: Parse repository name
run: echo REPOSITORY_NAME=$(echo "$GITHUB_REPOSITORY" | awk -F / '{print $2}' | sed -e "s/:refs//") >> $GITHUB_ENV
shell: bash
- name: Setup .NET Core
uses: actions/setup-dotnet@v4
with:
dotnet-version: '7.0.408'
- name: .NET version
shell: bash
run: dotnet --info
- name: Restore dotnet tools
shell: bash
run: |
dotnet tool restore
- name: Dotnet restore tests
shell: bash
run: dotnet restore test/AssociationRegistry.KboMutations.MutationLambdaContainer.Tests --runtime $RUNTIME
env:
RUNTIME: 'linux-x64'
- name: Dotnet build tests
shell: bash
run: dotnet build --no-restore --runtime $RUNTIME --self-contained test/AssociationRegistry.KboMutations.MutationLambdaContainer.Tests
env:
RUNTIME: 'linux-x64'
- name: Run all tests
run: dotnet test test/AssociationRegistry.KboMutations.MutationLambdaContainer.Tests
- name: Package lambda
if: inputs.semver != 'none'
shell: bash
run: cd src/AssociationRegistry.KboMutations.MutationLambdaContainer && dotnet lambda package --region ${{ secrets.VBR_AWS_REGION }}
- name: Save Image
if: inputs.semver != 'none'
shell: bash
run: docker image save associationregistry.kbomutations.mutationlambdacontainer:latest -o ~/AssociationRegistry.KboMutations.MutationLambdaContainer.tar
- name: Upload Lambda as Artifact
if: inputs.semver != 'none'
uses: actions/upload-artifact@v4
with:
name: lambda-mutation-${{ needs.set-release-version.outputs.version }}
path: ~/AssociationRegistry.KboMutations.MutationLambdaContainer.tar
build-mutationfile-lambda:
name: Build Mutation File Lambda
needs: [ set-release-version ]
runs-on: ubuntu-latest
if: ${{ (github.repository_owner == 'Informatievlaanderen') && (needs.set-release-version.outputs.version != 'none') }}
steps:
- name: Check version
shell: bash
run: echo $SEMVER
env:
SEMVER: ${{ needs.set-release-version.outputs.version }}
- name: Checkout Code
uses: actions/checkout@v4
- name: Parse repository name
run: echo REPOSITORY_NAME=$(echo "$GITHUB_REPOSITORY" | awk -F / '{print $2}' | sed -e "s/:refs//") >> $GITHUB_ENV
shell: bash
- name: Setup .NET Core
uses: actions/setup-dotnet@v4
with:
dotnet-version: '7.0.408'
- name: .NET version
shell: bash
run: dotnet --info
- name: Restore dotnet tools
shell: bash
run: |
dotnet tool restore
- name: Dotnet restore tests
shell: bash
run: dotnet restore test/AssociationRegistry.KboMutations.MutationFileLambda.Tests --runtime $RUNTIME
env:
RUNTIME: 'linux-x64'
- name: Dotnet build tests
shell: bash
run: dotnet build --no-restore --runtime $RUNTIME --self-contained test/AssociationRegistry.KboMutations.MutationFileLambda.Tests
env:
RUNTIME: 'linux-x64'
- name: Run all tests
run: dotnet test test/AssociationRegistry.KboMutations.MutationFileLambda.Tests
- name: Package lambda
if: inputs.semver != 'none'
shell: bash
run: cd src/AssociationRegistry.KboMutations.MutationFileLambda && dotnet lambda package --region ${{ secrets.VBR_AWS_REGION }}
- name: Upload Lambda as Artifact
if: inputs.semver != 'none'
uses: actions/upload-artifact@v4
with:
name: lambda-mutationfile-${{ needs.set-release-version.outputs.version }}
path: src/AssociationRegistry.KboMutations.MutationFileLambda/bin/Release/net7.0/AssociationRegistry.KboMutations.MutationFileLambda.zip
build-sync-lambda:
name: Build Sync Lambda
needs: [ set-release-version ]
runs-on: ubuntu-latest
if: ${{ (github.repository_owner == 'Informatievlaanderen') && (needs.set-release-version.outputs.version != 'none') }}
steps:
- name: Check version
shell: bash
run: echo $SEMVER
env:
SEMVER: ${{ needs.set-release-version.outputs.version }}
- name: Checkout Code
uses: actions/checkout@v4
- name: Parse repository name
run: echo REPOSITORY_NAME=$(echo "$GITHUB_REPOSITORY" | awk -F / '{print $2}' | sed -e "s/:refs//") >> $GITHUB_ENV
shell: bash
- name: Setup .NET Core
uses: actions/setup-dotnet@v4
with:
dotnet-version: '7.0.408'
- name: .NET version
shell: bash
run: dotnet --info
- name: Restore dotnet tools
shell: bash
run: |
dotnet tool restore
- name: Dotnet restore tests
shell: bash
run: dotnet restore test/AssociationRegistry.KboMutations.SyncLambda.Tests --runtime $RUNTIME
env:
RUNTIME: 'linux-x64'
- name: Dotnet build tests
shell: bash
run: dotnet build --no-restore --runtime $RUNTIME --self-contained test/AssociationRegistry.KboMutations.SyncLambda.Tests
env:
RUNTIME: 'linux-x64'
- name: Run all tests
run: dotnet test test/AssociationRegistry.KboMutations.SyncLambda.Tests
- name: Package lambda
if: inputs.semver != 'none'
shell: bash
run: cd src/AssociationRegistry.KboMutations.SyncLambda && dotnet lambda package --region ${{ secrets.VBR_AWS_REGION }}
- name: Upload Lambda as Artifact
if: inputs.semver != 'none'
uses: actions/upload-artifact@v4
with:
name: lambda-sync-${{ needs.set-release-version.outputs.version }}
path: src/AssociationRegistry.KboMutations.SyncLambda/bin/Release/net7.0/AssociationRegistry.KboMutations.SyncLambda.zip
release:
if: needs.set-release-version.outputs.version != 'none'
name: Semantic Release
runs-on: ubuntu-latest
needs:
- build-mutation-lambda
- build-mutationfile-lambda
- build-sync-lambda
outputs:
version: ${{ steps.set-version.outputs.version }}
steps:
- name: Checkout Code
uses: actions/checkout@v4
- name: Cache NPM
uses: informatievlaanderen/build-pipeline/.github/actions/cache-npm@main
- name: Parse repository name
run: echo REPOSITORY_NAME=$(echo "$GITHUB_REPOSITORY" | awk -F / '{print $2}' | sed -e "s/:refs//") >> $GITHUB_ENV
shell: bash
- name: Setup NodeJS
uses: informatievlaanderen/build-pipeline/.github/actions/setup-nodejs@main
- name: Setup Python
uses: informatievlaanderen/build-pipeline/.github/actions/setup-python@main
- name: Generate Token
id: generate_token
run: node .github/build-scripts/generate-token.js
env:
APP_ID: ${{ secrets.MYBOT_APP_ID }}
PRIVATE_KEY: ${{ secrets.MYBOT_PRIVATE_KEY }}
- name: Checkout Code
uses: actions/checkout@v4
with:
token: ${{ steps.generate_token.outputs.installationToken }}
- name: Install NPM dependencies
shell: bash
run: npm install --legacy-peer-deps
- name: Run Semantic Release
shell: bash
run: npx semantic-release
env:
BUILD_DOCKER_REGISTRY: ${{ secrets.BUILD_DOCKER_REGISTRY }}
GITHUB_TOKEN: ${{ steps.generate_token.outputs.installationToken }}
GIT_COMMIT: ${{ github.sha }}
GIT_USERNAME: ${{ steps.generate_token.outputs.installationToken }}
GIT_AUTHOR_NAME: ${{ secrets.VBR_GIT_USER }}
GIT_COMMITTER_NAME: ${{ secrets.VBR_GIT_USER }}
GIT_EMAIL: ${{ secrets.VBR_GIT_EMAIL }}
GIT_AUTHOR_EMAIL: ${{ secrets.VBR_GIT_EMAIL }}
GIT_COMMITTER_EMAIL: ${{ secrets.VBR_GIT_EMAIL }}
- name: Set Release Version
id: set-version
run: |
[ ! -f semver ] && echo none > semver
echo $(cat semver)
echo ::set-output name=version::$(cat semver)
echo RELEASE_VERSION=$(cat semver) >> $GITHUB_ENV
shell: bash
upload-mutation-lambda:
name: Upload Mutation Lambda
needs: [ release ]
runs-on: ubuntu-latest
if: ${{ (github.repository_owner == 'Informatievlaanderen') && (needs.release.outputs.version != 'none') }}
steps:
- name: Download Lambda
uses: actions/download-artifact@v4
continue-on-error: false
with:
name: lambda-mutation-${{ needs.release.outputs.version }}
path: ~/
- name: Load artifact
shell: bash
run: |
docker image load -i ~/AssociationRegistry.KboMutations.MutationLambdaContainer.tar
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v4
with:
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: ${{ secrets.VBR_AWS_REGION }}
- name: Login to Amazon ECR
uses: aws-actions/amazon-ecr-login@v2
- name: Push Lambda function to ECR
shell: bash
run: |
docker tag associationregistry.kbomutations.mutationlambdacontainer:latest 460116816372.dkr.ecr.eu-west-1.amazonaws.com/verenigingsregister-kbomutations:$SEMVER
docker push 460116816372.dkr.ecr.eu-west-1.amazonaws.com/verenigingsregister-kbomutations:$SEMVER
env:
SEMVER: ${{ needs.release.outputs.version }}
upload-mutationfile-lambda:
name: Upload MutationFile Lambda
needs: [ release ]
runs-on: ubuntu-latest
if: ${{ (github.repository_owner == 'Informatievlaanderen') && (needs.release.outputs.version != 'none') }}
steps:
- name: Download Lambda
uses: actions/download-artifact@v4
continue-on-error: false
with:
name: lambda-mutationfile-${{ needs.release.outputs.version }}
path: ~/
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v4
with:
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: ${{ secrets.VBR_AWS_REGION }}
- name: Show AWS CLI version
shell: bash
run: aws --version
- name: Upload Lambda function
shell: bash
run: |
aws s3 cp ~/AssociationRegistry.KboMutations.MutationFileLambda.zip s3://$S3_BASEURL/$VERSION/lambda.zip --copy-props none
env:
VERSION: ${{ needs.release.outputs.version }}
S3_BASEURL: 's3-verenigingsregister-lam-kbo-mutations-file-460116816372'
# S3_BASEURL: 's3-verenigingsregister-lam-kbo-mutations-file-716164567317'
upload-sync-lambda:
name: Upload Sync Lambda
needs: [ release ]
runs-on: ubuntu-latest
if: ${{ (github.repository_owner == 'Informatievlaanderen') && (needs.release.outputs.version != 'none') }}
steps:
- name: Download Lambda
uses: actions/download-artifact@v4
continue-on-error: false
with:
name: lambda-sync-${{ needs.release.outputs.version }}
path: ~/
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v4
with:
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: ${{ secrets.VBR_AWS_REGION }}
- name: Show AWS CLI version
shell: bash
run: aws --version
- name: Upload Lambda function
shell: bash
run: |
aws s3api put-object --bucket $S3_BASEURL --key lambda.zip --body ~/AssociationRegistry.KboMutations.SyncLambda.zip
env:
# aws s3 cp ~/AssociationRegistry.KboMutations.SyncLambda.zip s3://$S3_BASEURL/$VERSION/lambda.zip --copy-props none
VERSION: ${{ needs.release.outputs.version }}
S3_BASEURL: 's3-verenigingsregister-lam-kbo-sync-460116816372'
# S3_BASEURL: 's3-verenigingsregister-lam-kbo-sync-716164567317'
publish_to_atlassian:
if: needs.release.outputs.version != 'none'
needs:
- upload-mutation-lambda
- upload-mutationfile-lambda
- upload-sync-lambda
name: Publish to Atlassian
runs-on: ubuntu-latest
steps:
- name: Checkout Code
uses: actions/checkout@v4
- name: Parse repository name
run: echo REPOSITORY_NAME=$(echo "$GITHUB_REPOSITORY" | awk -F / '{print $2}' | sed -e "s/:refs//") >> $GITHUB_ENV
shell: bash
- name: Cache Python
uses: actions/cache@v4
env:
cache-name: cache-pip
with:
path: ~/.cache/pip
key: ${{ runner.os }}-build-${{ env.cache-name }}
- name: Set up Python
uses: actions/setup-python@v4
with:
python-version: '3.x'
- name: Install Python dependencies
shell: bash
run: |
python -m pip install --upgrade pip
pip install requests markdown argparse
- name: Setup .NET Core
uses: actions/setup-dotnet@v4
with:
dotnet-version: '7.0.408'
- name: .NET version
shell: bash
run: dotnet --info
- name: Restore dotnet tools
shell: bash
run: |
dotnet tool restore
- name: Publish to Confluence
if: needs.set-release-version.outputs.version != 'none'
shell: bash
run: ./packages/Be.Vlaanderen.Basisregisters.Build.Pipeline/Content/ci-confluence.sh
env:
CONFLUENCE_TITLE: ${{ env.REPOSITORY_NAME }}
CONFLUENCE_USERNAME: ${{ secrets.VBR_CONFLUENCE_USER }}
CONFLUENCE_PASSWORD: ${{ secrets.VBR_CONFLUENCE_PASSWORD }}
- name: Create Jira Release
if: needs.set-release-version.outputs.version != 'none'
shell: bash
run: ./packages/Be.Vlaanderen.Basisregisters.Build.Pipeline/Content/ci-jira.sh
env:
CONFLUENCE_TITLE: ${{ env.REPOSITORY_NAME }}
CONFLUENCE_USERNAME: ${{ secrets.VBR_CONFLUENCE_USER }}
CONFLUENCE_PASSWORD: ${{ secrets.VBR_CONFLUENCE_PASSWORD }}
JIRA_PREFIX: Association-KboMutations
JIRA_PROJECT: OR
JIRA_VERSION: ${{ needs.set-release-version.outputs.version }}
# deploy-mutation-lambda-test:
# if: github.repository_owner == 'Informatievlaanderen'
# needs: [ publish_to_atlassian ]
# name: Deploy mutation lambda (Test)
# runs-on: ubuntu-latest
#
# steps:
# - name: CD Lambda(s) Configure credentials
# uses: aws-actions/configure-aws-credentials@v4
# with:
# aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
# aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
# aws-region: ${{ secrets.VBR_AWS_REGION_PRD }}
#
# - name: Prepare Lambda
# shell: bash
# run: |
# aws s3 cp s3://460116816372-lambda-mutation/$VERSION/lambda.zip s3://716164567317-lambda-mutation/lambda.zip --copy-props none
# env:
# VERSION: ${{ needs.release.outputs.version }}
#
# - name: Promote Lambda
# shell: bash
# run: |
# docker pull ghcr.io/okigan/awscurl:latest
# docker run --rm okigan/awscurl --access_key $ACCESS_KEY_ID --secret_key $SECRET_ACCESS_KEY_ID --region $REGION -X POST -d '{ "functionName": "kbo-mutations", "project": "kbomutations", "domain": "verenigingsregister" }' $PROMOTEURL/test
# env:
# ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
# SECRET_ACCESS_KEY_ID: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
# REGION: ${{ secrets.VBR_AWS_REGION_PRD }}
# PROMOTEURL: ${{ secrets.AWS_PROMOTE_LAMBDA_BASEURL }}
#
# deploy-mutation-file-lambda-test:
# if: github.repository_owner == 'Informatievlaanderen'
# needs: [ publish_to_atlassian ]
# name: Deploy mutation file lambda (Test)
# runs-on: ubuntu-latest
#
# steps:
# - name: CD Lambda(s) Configure credentials
# uses: aws-actions/configure-aws-credentials@v4
# with:
# aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
# aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
# aws-region: ${{ secrets.VBR_AWS_REGION_PRD }}
#
# - name: Prepare Lambda
# shell: bash
# run: |
# aws s3 cp s3://$S3_BUCKETNAME_DEVOPS/$VERSION/lambda.zip s3://$S3_BUCKETNAME_TEST/lambda.zip --copy-props none
# env:
# S3_BUCKETNAME_DEVOPS: 's3-verenigingsregister-lam-kbo-mutations-file-460116816372'
# S3_BUCKETNAME_TEST: 's3-verenigingsregister-lam-kbo-mutations-file-716164567317'
# VERSION: ${{ needs.release.outputs.version }}
#
# - name: Promote Lambda
# shell: bash
# run: |
# docker pull ghcr.io/okigan/awscurl:latest
# docker run --rm okigan/awscurl --access_key $ACCESS_KEY_ID --secret_key $SECRET_ACCESS_KEY_ID --region $REGION -X POST -d '{ "functionName": "kbo-mutations-file", "project": "kbomutations", "domain": "verenigingsregister" }' $PROMOTEURL/test
# env:
# ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
# SECRET_ACCESS_KEY_ID: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
# REGION: ${{ secrets.VBR_AWS_REGION_PRD }}
# PROMOTEURL: ${{ secrets.AWS_PROMOTE_LAMBDA_BASEURL }}
#
# deploy-sync-lambda-test:
# if: github.repository_owner == 'Informatievlaanderen'
# needs: [ publish_to_atlassian ]
# name: Deploy sync lambda (Test)
# runs-on: ubuntu-latest
#
# steps:
# - name: CD Lambda(s) Configure credentials
# uses: aws-actions/configure-aws-credentials@v4
# with:
# aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
# aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
# aws-region: ${{ secrets.VBR_AWS_REGION_PRD }}
#
# - name: Prepare Lambda
# shell: bash
# run: |
# aws s3 cp s3://$S3_BUCKETNAME_DEVOPS/$VERSION/lambda.zip s3://$S3_BUCKETNAME_TEST/lambda.zip --copy-props none
# env:
# S3_BUCKETNAME_DEVOPS: 's3-verenigingsregister-lam-kbo-sync-460116816372'
# S3_BUCKETNAME_TEST: 's3-verenigingsregister-lam-kbo-sync-716164567317'
# VERSION: ${{ needs.release.outputs.version }}
#
# - name: Promote Lambda
# shell: bash
# run: |
# docker pull ghcr.io/okigan/awscurl:latest
# docker run --rm okigan/awscurl --access_key $ACCESS_KEY_ID --secret_key $SECRET_ACCESS_KEY_ID --region $REGION -X POST -d '{ "functionName": "kbo-sync", "project": "kbomutations", "domain": "verenigingsregister" }' $PROMOTEURL/test
# env:
# ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
# SECRET_ACCESS_KEY_ID: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
# REGION: ${{ secrets.VBR_AWS_REGION_PRD }}
# PROMOTEURL: ${{ secrets.AWS_PROMOTE_LAMBDA_BASEURL }}