-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy pathJenkinsfile-EC2
87 lines (71 loc) · 2.21 KB
/
Jenkinsfile-EC2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
String awsCredentialsId = 'AWS-demo'
pipeline {
agent any
options {
timestamps()
disableConcurrentBuilds()
}
parameters {
choice(choices: ['CREATE', 'DESTROY'], description: 'Create or destroy a Demo EC2 instance?', name: 'Action')
}
stages {
stage('Clone AWS Demo Repository') {
steps {
checkout([$class: 'GitSCM',
branches: [[name: "main"]],
doGenerateSubmoduleConfigurations: false,
extensions: [[$class: 'RelativeTargetDirectory', relativeTargetDir: 'aws-tf']],
submoduleCfg: [],
userRemoteConfigs: [[credentialsId: 'devops', url: '[email protected]:adavarski/DevOps-AWS-demo.git']]
])
}
}
stage('TF init') {
steps {
dir('aws-tf/Jenkins-EC2') {
script {
withCredentials([[$class: 'AmazonWebServicesCredentialsBinding',
credentialsId: awsCredentialsId,
accessKeyVariable: 'AWS_ACCESS_KEY_ID',
secretKeyVariable: 'AWS_SECRET_ACCESS_KEY']])
{
sh "terraform init"
}
}
}
}
}
stage('TF apply env') {
when{ equals expected: "CREATE", actual: "${params.Action}"}
steps {
dir('aws-tf/Jenkins-EC2') {
script {
withCredentials([[$class: 'AmazonWebServicesCredentialsBinding',
credentialsId: awsCredentialsId,
accessKeyVariable: 'AWS_ACCESS_KEY_ID',
secretKeyVariable: 'AWS_SECRET_ACCESS_KEY']])
{
sh "terraform apply -auto-approve"
}
}
}
}
}
stage('TF Destroy env') {
when { equals expected: "DESTROY", actual: "${params.Action}" }
steps {
dir('aws-tf/Jenkins-EC2'){
script {
withCredentials([[$class: 'AmazonWebServicesCredentialsBinding',
credentialsId: awsCredentialsId,
accessKeyVariable: 'AWS_ACCESS_KEY_ID',
secretKeyVariable: 'AWS_SECRET_ACCESS_KEY']])
{
sh "terraform destroy -auto-approve"
}
}
}
}
}
}
}