Skip to content

Bump @aws-sdk/client-secrets-manager from 3.309.0 to 3.405.0 #1175

Bump @aws-sdk/client-secrets-manager from 3.309.0 to 3.405.0

Bump @aws-sdk/client-secrets-manager from 3.309.0 to 3.405.0 #1175

Workflow file for this run

name: Prisma Tutorial Tests
on:
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
push:
branches: [main]
paths:
[
'.github/workflows/tests-prisma.yml',
'examples/**',
'src/**',
'test/tutorials/**',
'package.json',
'yarn.lock',
'Dockerfile',
]
pull_request:
branches: [main]
paths:
[
'.github/workflows/tests-prisma.yml',
'examples/**',
'src/**',
'test/tutorials/**',
'package.json',
'yarn.lock',
'Dockerfile',
]
# A workflow run is made up of one or more jobs that can run sequentially or in parallel
jobs:
setup:
runs-on: ubuntu-latest
outputs:
region: ${{ steps['set-region'].outputs['region'] }}
steps:
- name: Set AWS region
id: set-region
run: |
# pick aws region at random and append it to the repository name
# since public ecr always works out of us-east-1
regions=("ap-northeast-1" "ap-northeast-2" "ap-northeast-3" "ap-south-1" "ap-southeast-1" "ap-southeast-2" "ca-central-1" "eu-central-1" "eu-north-1" "eu-west-1" "eu-west-2" "eu-west-3" "sa-east-1" "us-east-1" "us-east-2" "us-west-1" "us-west-2")
regionslen=${#regions[@]}
index=$(($RANDOM % $regionslen))
echo "region=$(echo ${regions[$index]})" >> $GITHUB_OUTPUT
deploy:
runs-on: ubuntu-latest
needs:
- setup
steps:
- uses: actions/checkout@v3
- name: Use Node.js LTS
uses: actions/setup-node@v3
with:
node-version: 'lts/*'
cache: 'yarn'
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2
- name: Build and push
uses: docker/build-push-action@v3
with:
context: .
push: false
load: true
cache-from: type=gha
cache-to: type=gha
tags: iasql:latest
- name: Start local iasql container
run: |
# Temporarily export the server port until it's only the Postgres port needed
docker run -p 5432:5432 -e IASQL_ENV=ci --name iasql iasql &
while ! psql postgres://postgres:test@localhost:5432/iasql_metadata -b -q -c "SELECT iasql_engine_health()"; do sleep 1 && echo -n .; done;
- name: Determine Test Account To Use
id: determine-test-account
env:
SECRET_HEADER: ${{ secrets.SECRET_HEADER }}
LAMBDA_FUNCTION: 'https://22quullhnmsrttacexxc74uium0nndzo.lambda-url.us-east-2.on.aws/'
run: |
RESPONSE=$(curl -X POST -H "Content-Type: text/plain" -H "${SECRET_HEADER}" -d '1' ${LAMBDA_FUNCTION} 2>/dev/null)
echo $RESPONSE
ACCOUNT_INDEX=$(echo $RESPONSE | jq '.[0]' || exit 1)
echo "account_index=$(echo ${ACCOUNT_INDEX})" >> $GITHUB_OUTPUT
- name: Setup IaSQL database
run: |
export AWS_ACCESS_KEY_ID=$(echo "${ACCESS_KEY_IDS}" | jq -r ".[${ACCOUNT_INDEX}]")
export AWS_SECRET_ACCESS_KEY=$(echo "${SECRET_ACCESS_KEYS}" | jq -r ".[${ACCOUNT_INDEX}]")
source ./src/scripts/setup-iasql-db.sh
echo "iasql_username=$IASQL_USERNAME" >> $GITHUB_ENV
echo "iasql_password=$IASQL_PASSWORD" >> $GITHUB_ENV
env:
ACCOUNT_INDEX: ${{ steps['determine-test-account'].outputs['account_index'] }}
AWS_REGION: ${{ needs.setup.outputs['region'] }}
ACCESS_KEY_IDS: ${{ secrets.ACCESS_KEY_IDS }}
SECRET_ACCESS_KEYS: ${{ secrets.SECRET_ACCESS_KEYS }}
- name: Pre-clean with cleaning script
uses: nick-fields/retry@v2
with:
max_attempts: 2
retry_on: error
timeout_minutes: 30
command: |
export AWS_ACCESS_KEY_ID=$(echo "${ACCESS_KEY_IDS}" | jq -r ".[${ACCOUNT_INDEX}]")
export AWS_SECRET_ACCESS_KEY=$(echo "${SECRET_ACCESS_KEYS}" | jq -r ".[${ACCOUNT_INDEX}]")
# Remove delete protection from clusters
echo "\nStarting transaction..."
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "select * from iasql_begin();"
# Remove delete protection
echo "\nDisable delete protection..."
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "UPDATE db_cluster SET delete_protection=FALSE;"
echo "\nApply removal..."
psql $PSQL_CONN -c "select * from iasql_commit();"
echo "\nStart transaction..."
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "select * from iasql_begin();"
echo "\nDelete all records..."
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "select * from delete_all_records();"
echo "\nApply..."
psql $PSQL_CONN -c "select * from iasql_commit();"
env:
ACCOUNT_INDEX: ${{ steps['determine-test-account'].outputs['account_index'] }}
AWS_REGION: ${{ needs.setup.outputs['region'] }}
ACCESS_KEY_IDS: ${{ secrets.ACCESS_KEY_IDS }}
SECRET_ACCESS_KEYS: ${{ secrets.SECRET_ACCESS_KEYS }}
IASQL_USERNAME: ${{ env.iasql_username }}
IASQL_PASSWORD: ${{ env.iasql_password }}
PSQL_CONN: postgres://postgres:test@localhost:5432/iasql
- name: Run deploy script
uses: nick-fields/retry@v2
with:
max_attempts: 2
retry_on: error
timeout_minutes: 40
command: |
export AWS_ACCESS_KEY_ID=$(echo "${ACCESS_KEY_IDS}" | jq -r ".[${ACCOUNT_INDEX}]")
export AWS_SECRET_ACCESS_KEY=$(echo "${SECRET_ACCESS_KEYS}" | jq -r ".[${ACCOUNT_INDEX}]")
./test/tutorials/prisma-ci.sh
env:
ACCOUNT_INDEX: ${{ steps['determine-test-account'].outputs['account_index'] }}
AWS_REGION: ${{ needs.setup.outputs['region'] }}
ACCESS_KEY_IDS: ${{ secrets.ACCESS_KEY_IDS }}
SECRET_ACCESS_KEYS: ${{ secrets.SECRET_ACCESS_KEYS }}
DATABASE_URL: postgres://${{ env.iasql_username }}:${{ env.iasql_password }}@localhost:5432/iasql
GH_PAT: ${{ secrets.GH_PAT }}
- name: Run cleaning script
uses: nick-fields/retry@v2
with:
max_attempts: 2
retry_on: error
timeout_minutes: 30
command: |
export AWS_ACCESS_KEY_ID=$(echo "${ACCESS_KEY_IDS}" | jq -r ".[${ACCOUNT_INDEX}]")
export AWS_SECRET_ACCESS_KEY=$(echo "${SECRET_ACCESS_KEYS}" | jq -r ".[${ACCOUNT_INDEX}]")
echo "\nStart transaction..."
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "select * from iasql_begin();"
echo "\nDelete all records..."
psql "postgres://$IASQL_USERNAME:$IASQL_PASSWORD@localhost:5432/iasql" -c "select * from delete_all_records();"
echo "\nApply..."
psql $PSQL_CONN -c "select * from iasql_commit();"
env:
ACCOUNT_INDEX: ${{ steps['determine-test-account'].outputs['account_index'] }}
AWS_REGION: ${{ needs.setup.outputs['region'] }}
ACCESS_KEY_IDS: ${{ secrets.ACCESS_KEY_IDS }}
SECRET_ACCESS_KEYS: ${{ secrets.SECRET_ACCESS_KEYS }}
IASQL_USERNAME: ${{ env.iasql_username }}
IASQL_PASSWORD: ${{ env.iasql_password }}
PSQL_CONN: postgres://postgres:test@localhost:5432/iasql
- name: Return test account
if: always()
env:
SECRET_HEADER: ${{ secrets.SECRET_HEADER }}
ACCOUNT_INDEX: ${{ steps['determine-test-account'].outputs['account_index'] }}
LAMBDA_FUNCTION: 'https://22quullhnmsrttacexxc74uium0nndzo.lambda-url.us-east-2.on.aws/'
run: |
curl -X POST -H "Content-Type: application/json" -H "${SECRET_HEADER}" -H "x-iasql-drop: true" -d "[${ACCOUNT_INDEX}]" ${LAMBDA_FUNCTION}
- name: Local container logs
if: always()
run: docker logs iasql