name: AWS Deployment on: workflow_call: inputs: aws_account_id: required: true type: string aws_role_prefix: required: true type: string aws_task_prefix: required: true type: string concurrency_tag: required: false type: string default: "" environment: required: true type: string release_tag: required: false type: string concurrency: group: deploy-${{ inputs.environment }}${{ inputs.concurrency_tag }} cancel-in-progress: true env: app_repo_role: arn:aws:iam::815624722760:role/core-application-repo aws_region: eu-west-2 repository: core jobs: push_docker_image: name: Push docker image to AWS runs-on: ubuntu-latest permissions: id-token: write steps: - name: Checkout code uses: actions/checkout@v3 - name: Configure AWS credentials uses: aws-actions/configure-aws-credentials@v3 with: aws-region: ${{ env.aws_region }} role-to-assume: ${{ env.app_repo_role }} - name: Login to Amazon ECR id: ecr-login uses: aws-actions/amazon-ecr-login@v1 with: mask-password: "true" - name: Check if image with tag already exists run: | echo "image-exists=$(if aws ecr list-images --repository-name=$repository --query "imageIds[*].imageTag" | grep -q ${{ github.sha }}; then echo true; else echo false; fi)" >> $GITHUB_ENV - name: Build, tag, and push docker image to ECR if there is no image, failing for releases id: build-image if: ${{ env.image-exists == 'false' }} env: registry: ${{ steps.ecr-login.outputs.registry }} commit_tag: ${{ github.sha }} run: | if [[ ${{ inputs.environment }} == 'production' ]]; then echo "Error: Deployment to production environment is not allowed as there is no docker image (i.e. the AWS deploy on staging was unsuccessful for this commit)." exit 1 fi docker build -t $registry/$repository:$commit_tag . --target=production docker push $registry/$repository:$commit_tag deploy: name: Deploy image runs-on: ubuntu-latest environment: ${{ inputs.environment }} needs: push_docker_image steps: - name: Configure AWS credentials uses: aws-actions/configure-aws-credentials@v3 with: aws-region: ${{ env.aws_region }} role-to-assume: ${{ env.app_repo_role }} - name: Login to Amazon ECR id: ecr-login uses: aws-actions/amazon-ecr-login@v1 with: mask-password: "true" - name: Get timestamp id: timestamp run: echo "timestamp=$(date +%Y%m%d%H%M%S)" >> $GITHUB_ENV - name: Get additional tag run: | echo "additional-tag=$(if [[ ${{ inputs.environment }} == 'production' ]]; then echo ${{ inputs.release_tag }}-${{ env.timestamp }}; else echo ${{ env.timestamp }}; fi)" >> $GITHUB_ENV - name: Add environment tag to existing image id: update-image-tags env: registry: ${{ steps.ecr-login.outputs.registry }} commit_tag: ${{ github.sha }} readable_tag: ${{ inputs.environment }}-${{ env.additional-tag }} run: | manifest=$(aws ecr batch-get-image --repository-name $repository --image-ids imageTag=$commit_tag --output text --query images[].imageManifest) aws ecr put-image --repository-name $repository --image-tag $readable_tag --image-manifest "$manifest" echo "image=$registry/$repository:$readable_tag" >> $GITHUB_ENV - name: Configure AWS credentials for environment uses: aws-actions/configure-aws-credentials@v3 with: aws-region: ${{ env.aws_region }} role-to-assume: arn:aws:iam::${{ inputs.aws_account_id }}:role/${{ inputs.aws_role_prefix }}-deployment role-chaining: true - name: Download ad hoc task definition env: ad_hoc_task_definition: ${{ inputs.aws_task_prefix }}-ad-hoc run: | aws ecs describe-task-definition --task-definition $ad_hoc_task_definition --query taskDefinition > ad-hoc-task-definition.json - name: Update image ID id: ad-hoc-task-def uses: aws-actions/amazon-ecs-render-task-definition@v1 with: task-definition: ad-hoc-task-definition.json container-name: app image: ${{ env.image }} - name: Update ad hoc task definition uses: aws-actions/amazon-ecs-deploy-task-definition@v1 with: task-definition: ${{ steps.ad-hoc-task-def.outputs.task-definition }} - name: Setup Database if: ${{ inputs.environment == 'review' }} env: ad_hoc_task_definition: ${{ inputs.aws_task_prefix }}-ad-hoc cluster: ${{ inputs.aws_task_prefix }}-app service: ${{ inputs.aws_task_prefix }}-app run: | network=$(aws ecs describe-services --cluster $cluster --services $service --query services[0].networkConfiguration) overrides='{ "containerOverrides" : [{ "name" : "app", "command" : ["bundle", "exec", "rake", "db:prepare"]}]}' arn=$(aws ecs run-task --cluster $cluster --task-definition $ad_hoc_task_definition --network-configuration "$network" --overrides "$overrides" --group migrations --launch-type FARGATE --query tasks[0].taskArn) echo "Waiting for db prepare task to complete" temp=${arn##*/} id=${temp%*\"} aws ecs wait tasks-stopped --cluster $cluster --tasks $id succeeded=$(aws ecs describe-tasks --cluster $cluster --tasks $id --query "tasks[0].stopCode == 'EssentialContainerExited' && to_string(tasks[0].containers[0].exitCode) == '0'") if [ $succeeded == true ]; then exit 0; else exit 1; fi - name: Run migrations task env: ad_hoc_task_definition: ${{ inputs.aws_task_prefix }}-ad-hoc cluster: ${{ inputs.aws_task_prefix }}-app service: ${{ inputs.aws_task_prefix }}-app run: | network=$(aws ecs describe-services --cluster $cluster --services $service --query services[0].networkConfiguration) overrides='{ "containerOverrides" : [{ "name" : "app", "command" : ["bundle", "exec", "rake", "db:migrate"]}]}' arn=$(aws ecs run-task --cluster $cluster --task-definition $ad_hoc_task_definition --network-configuration "$network" --overrides "$overrides" --group migrations --launch-type FARGATE --query tasks[0].taskArn) echo "Waiting for migration task to complete" temp=${arn##*/} id=${temp%*\"} aws ecs wait tasks-stopped --cluster $cluster --tasks $id succeeded=$(aws ecs describe-tasks --cluster $cluster --tasks $id --query "tasks[0].stopCode == 'EssentialContainerExited' && to_string(tasks[0].containers[0].exitCode) == '0'") if [ $succeeded == true ]; then exit 0; else exit 1; fi - name: Download app service task definition env: app_task_definition: ${{ inputs.aws_task_prefix }}-app run: | aws ecs describe-task-definition --task-definition $app_task_definition --query taskDefinition > app-task-definition.json - name: Update app image ID id: app-task-def uses: aws-actions/amazon-ecs-render-task-definition@v1 with: task-definition: app-task-definition.json container-name: app image: ${{ env.image }} - name: Deploy updated application uses: aws-actions/amazon-ecs-deploy-task-definition@v1 with: cluster: ${{ inputs.aws_task_prefix }}-app service: ${{ inputs.aws_task_prefix }}-app task-definition: ${{ steps.app-task-def.outputs.task-definition }} wait-for-service-stability: true - name: Download sidekiq service task definition env: sidekiq_task_definition: ${{ inputs.aws_task_prefix }}-sidekiq run: | aws ecs describe-task-definition --task-definition $sidekiq_task_definition --query taskDefinition > sidekiq-task-definition.json - name: Update sidekiq image ID id: sidekiq-task-def uses: aws-actions/amazon-ecs-render-task-definition@v1 with: task-definition: sidekiq-task-definition.json container-name: sidekiq image: ${{ env.image }} - name: Deploy updated sidekiq uses: aws-actions/amazon-ecs-deploy-task-definition@v1 with: cluster: ${{ inputs.aws_task_prefix }}-app service: ${{ inputs.aws_task_prefix }}-sidekiq task-definition: ${{ steps.sidekiq-task-def.outputs.task-definition }} wait-for-service-stability: true