Bump @aws-sdk/client-secrets-manager from 3.309.0 to 3.395.0 #1167
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Prisma Tutorial Tests | |
on: | |
# Allows you to run this workflow manually from the Actions tab | |
workflow_dispatch: | |
push: | |
branches: [main] | |
paths: | |
[ | |
'.github/workflows/tests-prisma.yml', | |
'examples/**', | |
'src/**', | |
'test/tutorials/**', | |
'package.json', | |
'yarn.lock', | |
'Dockerfile', | |
] | |
pull_request: | |
branches: [main] | |
paths: | |
[ | |
'.github/workflows/tests-prisma.yml', | |
'examples/**', | |
'src/**', | |
'test/tutorials/**', | |
'package.json', | |
'yarn.lock', | |
'Dockerfile', | |
] | |
# A workflow run is made up of one or more jobs that can run sequentially or in parallel | |
jobs: | |
setup: | |
runs-on: ubuntu-latest | |
outputs: | |
region: ${{ steps['set-region'].outputs['region'] }} | |
steps: | |
- name: Set AWS region | |
id: set-region | |
run: | | |
# pick aws region at random and append it to the repository name | |
# since public ecr always works out of us-east-1 | |
regions=("ap-northeast-1" "ap-northeast-2" "ap-northeast-3" "ap-south-1" "ap-southeast-1" "ap-southeast-2" "ca-central-1" "eu-central-1" "eu-north-1" "eu-west-1" "eu-west-2" "eu-west-3" "sa-east-1" "us-east-1" "us-east-2" "us-west-1" "us-west-2") | |
regionslen=${#regions[@]} | |
index=$(($RANDOM % $regionslen)) | |
echo "region=$(echo ${regions[$index]})" >> $GITHUB_OUTPUT | |
deploy: | |
runs-on: ubuntu-latest | |
needs: | |
- setup | |
steps: | |
- uses: actions/checkout@v3 | |
- name: Use Node.js LTS | |
uses: actions/setup-node@v3 | |
with: | |
node-version: 'lts/*' | |
cache: 'yarn' | |
- name: Set up Docker Buildx | |
uses: docker/setup-buildx-action@v2 | |
- name: Build and push | |
uses: docker/build-push-action@v3 | |
with: | |
context: . | |
push: false | |
load: true | |
cache-from: type=gha | |
cache-to: type=gha | |
tags: iasql:latest | |
- name: Start local iasql container | |
run: | | |
# Temporarily export the server port until it's only the Postgres port needed | |
docker run -p 5432:5432 -e IASQL_ENV=ci --name iasql iasql & | |
while ! psql postgres://postgres:test@localhost:5432/iasql_metadata -b -q -c "SELECT iasql_engine_health()"; do sleep 1 && echo -n .; done; | |
- name: Determine Test Account To Use | |
id: determine-test-account | |
env: | |
SECRET_HEADER: ${{ secrets.SECRET_HEADER }} | |
LAMBDA_FUNCTION: 'https://22quullhnmsrttacexxc74uium0nndzo.lambda-url.us-east-2.on.aws/' | |
run: | | |
RESPONSE=$(curl -X POST -H "Content-Type: text/plain" -H "${SECRET_HEADER}" -d '1' ${LAMBDA_FUNCTION} 2>/dev/null) | |
echo $RESPONSE | |
ACCOUNT_INDEX=$(echo $RESPONSE | jq '.[0]' || exit 1) | |
echo "account_index=$(echo ${ACCOUNT_INDEX})" >> $GITHUB_OUTPUT | |
- name: Setup IaSQL database | |
run: | | |
export AWS_ACCESS_KEY_ID=$(echo "${ACCESS_KEY_IDS}" | jq -r ".[${ACCOUNT_INDEX}]") | |
export AWS_SECRET_ACCESS_KEY=$(echo "${SECRET_ACCESS_KEYS}" | jq -r ".[${ACCOUNT_INDEX}]") | |
source ./src/scripts/setup-iasql-db.sh | |
echo "iasql_username=$IASQL_USERNAME" >> $GITHUB_ENV | |
echo "iasql_password=$IASQL_PASSWORD" >> $GITHUB_ENV | |
env: | |
ACCOUNT_INDEX: ${{ steps['determine-test-account'].outputs['account_index'] }} | |
AWS_REGION: ${{ needs.setup.outputs['region'] }} | |
ACCESS_KEY_IDS: ${{ secrets.ACCESS_KEY_IDS }} | |
SECRET_ACCESS_KEYS: ${{ secrets.SECRET_ACCESS_KEYS }} | |
- name: Pre-clean with cleaning script | |
uses: nick-fields/retry@v2 | |
with: | |
max_attempts: 2 | |
retry_on: error | |
timeout_minutes: 30 | |
command: | | |
export AWS_ACCESS_KEY_ID=$(echo "${ACCESS_KEY_IDS}" | jq -r ".[${ACCOUNT_INDEX}]") | |
export AWS_SECRET_ACCESS_KEY=$(echo "${SECRET_ACCESS_KEYS}" | jq -r ".[${ACCOUNT_INDEX}]") | |
# Remove delete protection from clusters | |
echo "\nStarting transaction..." | |
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "select * from iasql_begin();" | |
# Remove delete protection | |
echo "\nDisable delete protection..." | |
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "UPDATE db_cluster SET delete_protection=FALSE;" | |
echo "\nApply removal..." | |
psql $PSQL_CONN -c "select * from iasql_commit();" | |
echo "\nStart transaction..." | |
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "select * from iasql_begin();" | |
echo "\nDelete all records..." | |
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "select * from delete_all_records();" | |
echo "\nApply..." | |
psql $PSQL_CONN -c "select * from iasql_commit();" | |
env: | |
ACCOUNT_INDEX: ${{ steps['determine-test-account'].outputs['account_index'] }} | |
AWS_REGION: ${{ needs.setup.outputs['region'] }} | |
ACCESS_KEY_IDS: ${{ secrets.ACCESS_KEY_IDS }} | |
SECRET_ACCESS_KEYS: ${{ secrets.SECRET_ACCESS_KEYS }} | |
IASQL_USERNAME: ${{ env.iasql_username }} | |
IASQL_PASSWORD: ${{ env.iasql_password }} | |
PSQL_CONN: postgres://postgres:test@localhost:5432/iasql | |
- name: Run deploy script | |
uses: nick-fields/retry@v2 | |
with: | |
max_attempts: 2 | |
retry_on: error | |
timeout_minutes: 40 | |
command: | | |
export AWS_ACCESS_KEY_ID=$(echo "${ACCESS_KEY_IDS}" | jq -r ".[${ACCOUNT_INDEX}]") | |
export AWS_SECRET_ACCESS_KEY=$(echo "${SECRET_ACCESS_KEYS}" | jq -r ".[${ACCOUNT_INDEX}]") | |
./test/tutorials/prisma-ci.sh | |
env: | |
ACCOUNT_INDEX: ${{ steps['determine-test-account'].outputs['account_index'] }} | |
AWS_REGION: ${{ needs.setup.outputs['region'] }} | |
ACCESS_KEY_IDS: ${{ secrets.ACCESS_KEY_IDS }} | |
SECRET_ACCESS_KEYS: ${{ secrets.SECRET_ACCESS_KEYS }} | |
DATABASE_URL: postgres://${{ env.iasql_username }}:${{ env.iasql_password }}@localhost:5432/iasql | |
GH_PAT: ${{ secrets.GH_PAT }} | |
- name: Run cleaning script | |
uses: nick-fields/retry@v2 | |
with: | |
max_attempts: 2 | |
retry_on: error | |
timeout_minutes: 30 | |
command: | | |
export AWS_ACCESS_KEY_ID=$(echo "${ACCESS_KEY_IDS}" | jq -r ".[${ACCOUNT_INDEX}]") | |
export AWS_SECRET_ACCESS_KEY=$(echo "${SECRET_ACCESS_KEYS}" | jq -r ".[${ACCOUNT_INDEX}]") | |
echo "\nStart transaction..." | |
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "select * from iasql_begin();" | |
echo "\nDelete all records..." | |
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "select * from delete_all_records();" | |
echo "\nApply..." | |
psql $PSQL_CONN -c "select * from iasql_commit();" | |
env: | |
ACCOUNT_INDEX: ${{ steps['determine-test-account'].outputs['account_index'] }} | |
AWS_REGION: ${{ needs.setup.outputs['region'] }} | |
ACCESS_KEY_IDS: ${{ secrets.ACCESS_KEY_IDS }} | |
SECRET_ACCESS_KEYS: ${{ secrets.SECRET_ACCESS_KEYS }} | |
IASQL_USERNAME: ${{ env.iasql_username }} | |
IASQL_PASSWORD: ${{ env.iasql_password }} | |
PSQL_CONN: postgres://postgres:test@localhost:5432/iasql | |
- name: Return test account | |
if: always() | |
env: | |
SECRET_HEADER: ${{ secrets.SECRET_HEADER }} | |
ACCOUNT_INDEX: ${{ steps['determine-test-account'].outputs['account_index'] }} | |
LAMBDA_FUNCTION: 'https://22quullhnmsrttacexxc74uium0nndzo.lambda-url.us-east-2.on.aws/' | |
run: | | |
curl -X POST -H "Content-Type: application/json" -H "${SECRET_HEADER}" -H "x-iasql-drop: true" -d "[${ACCOUNT_INDEX}]" ${LAMBDA_FUNCTION} | |
- name: Local container logs | |
if: always() | |
run: docker logs iasql |