|
1 | | -name: Destroy Pipeline |
| 1 | +# name: Destroy Pipeline |
2 | 2 |
|
3 | | -on: |
4 | | - schedule: |
5 | | - - cron: "0 7 * * 1-5" # 5PM AEST |
6 | | - workflow_dispatch: |
| 3 | +# on: |
| 4 | +# schedule: |
| 5 | +# - cron: "0 7 * * 1-5" # 5PM AEST |
| 6 | +# workflow_dispatch: |
7 | 7 |
|
8 | | -jobs: |
9 | | - destroy: |
10 | | - runs-on: ubuntu-latest |
| 8 | +# jobs: |
| 9 | +# destroy: |
| 10 | +# runs-on: ubuntu-latest |
11 | 11 |
|
12 | | - steps: |
13 | | - - uses: actions/checkout@v4 |
14 | | - - uses: hashicorp/setup-terraform@v3 |
15 | | - - uses: aws-actions/configure-aws-credentials@v4 |
16 | | - with: |
17 | | - aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} |
18 | | - aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} |
19 | | - aws-region: ap-southeast-2 |
| 12 | +# steps: |
| 13 | +# - uses: actions/checkout@v4 |
| 14 | +# - uses: hashicorp/setup-terraform@v3 |
| 15 | +# - uses: aws-actions/configure-aws-credentials@v4 |
| 16 | +# with: |
| 17 | +# aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} |
| 18 | +# aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} |
| 19 | +# aws-region: ap-southeast-2 |
20 | 20 |
|
21 | | - # - name: Create terraform.tfvars |
22 | | - # run: | |
23 | | - # cat <<EOF > devops/terraform.tfvars |
24 | | - # ${{ secrets.TERRAFORM_VARIABLES }} |
25 | | - # EOF |
| 21 | +# # - name: Create terraform.tfvars |
| 22 | +# # run: | |
| 23 | +# # cat <<EOF > devops/terraform.tfvars |
| 24 | +# # ${{ secrets.TERRAFORM_VARIABLES }} |
| 25 | +# # EOF |
26 | 26 |
|
27 | | - - name: Run destroy script |
28 | | - env: |
29 | | - TF_VAR_aws_region: ${{ vars.TF_VAR_AWS_REGION }} |
30 | | - TF_VAR_region_id: ${{ vars.TF_VAR_REGION_ID }} |
31 | | - TF_VAR_aza: ${{ vars.TF_VAR_AZA }} |
32 | | - TF_VAR_azb: ${{ vars.TF_VAR_AZB }} |
33 | | - TF_VAR_ecs_image_url: ${{ vars.TF_VAR_ECS_IMAGE_URL }} |
34 | | - TF_VAR_hosted_zone_id: ${{ secrets.TF_VAR_HOSTED_ZONE_ID }} |
35 | | - TF_VAR_acm_certificate_arn: ${{ secrets.TF_VAR_ACM_CERTIFICATE_ARN }} |
36 | | - TF_VAR_db_username: ${{ secrets.TF_VAR_DB_USERNAME }} |
37 | | - TF_VAR_db_password: ${{ secrets.TF_VAR_DB_PASSWORD }} |
38 | | - TF_VAR_vpc_id: ${{ secrets.TF_VAR_VPC_ID }} |
39 | | - TF_VAR_public_route_table_id: ${{ secrets.TF_VAR_PUBLIC_ROUTE_TABLE_ID }} |
40 | | - run: | |
41 | | - cd ./devops |
42 | | - chmod +x destroy.sh |
43 | | - ./destroy.sh |
| 27 | +# - name: Run destroy script |
| 28 | +# env: |
| 29 | +# TF_VAR_aws_region: ${{ vars.TF_VAR_AWS_REGION }} |
| 30 | +# TF_VAR_region_id: ${{ vars.TF_VAR_REGION_ID }} |
| 31 | +# TF_VAR_aza: ${{ vars.TF_VAR_AZA }} |
| 32 | +# TF_VAR_azb: ${{ vars.TF_VAR_AZB }} |
| 33 | +# TF_VAR_ecs_image_url: ${{ vars.TF_VAR_ECS_IMAGE_URL }} |
| 34 | +# TF_VAR_hosted_zone_id: ${{ secrets.TF_VAR_HOSTED_ZONE_ID }} |
| 35 | +# TF_VAR_acm_certificate_arn: ${{ secrets.TF_VAR_ACM_CERTIFICATE_ARN }} |
| 36 | +# TF_VAR_db_username: ${{ secrets.TF_VAR_DB_USERNAME }} |
| 37 | +# TF_VAR_db_password: ${{ secrets.TF_VAR_DB_PASSWORD }} |
| 38 | +# TF_VAR_vpc_id: ${{ secrets.TF_VAR_VPC_ID }} |
| 39 | +# TF_VAR_public_route_table_id: ${{ secrets.TF_VAR_PUBLIC_ROUTE_TABLE_ID }} |
| 40 | +# run: | |
| 41 | +# cd ./devops |
| 42 | +# chmod +x destroy.sh |
| 43 | +# ./destroy.sh |
0 commit comments