-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy pathJenkinsfile-RDS
73 lines (60 loc) · 2 KB
/
Jenkinsfile-RDS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
String awsCredentialsId = 'AWS-demo'
pipeline {
agent any
options {
timestamps()
disableConcurrentBuilds()
}
parameters {
choice(choices: ['CREATE', 'DESTROY'], description: 'Create or destroy RDS instance?', name: 'Action')
}
stages {
stage('Clone AWS Demo Repository') {
steps {
checkout([$class: 'GitSCM',
branches: [[name: "main"]],
doGenerateSubmoduleConfigurations: false,
extensions: [[$class: 'RelativeTargetDirectory', relativeTargetDir: 'aws-tf']],
submoduleCfg: [],
userRemoteConfigs: [[credentialsId: 'devops', url: '[email protected]:adavarski/DevOps-AWS-demo.git']]
])
}
}
stage('TF apply ') {
when{ equals expected: "CREATE", actual: "${params.Action}"}
steps {
dir('aws-tf/RDS') {
script {
withCredentials([[$class: 'AmazonWebServicesCredentialsBinding',
credentialsId: awsCredentialsId,
accessKeyVariable: 'AWS_ACCESS_KEY_ID',
secretKeyVariable: 'AWS_SECRET_ACCESS_KEY']])
{
sh "terraform init"
sh "terraform apply -auto-approve"
sh "terraform show"
// sh "aws ssm get-parameters-by-path --path /demodb/demo --recursive --with-decryption --output text --query \"Parameters[].[Name,Value]\""
}
}
}
}
}
stage('TF Destroy') {
when { equals expected: "DESTROY", actual: "${params.Action}" }
steps {
dir('aws-tf/RDS'){
script {
withCredentials([[$class: 'AmazonWebServicesCredentialsBinding',
credentialsId: awsCredentialsId,
accessKeyVariable: 'AWS_ACCESS_KEY_ID',
secretKeyVariable: 'AWS_SECRET_ACCESS_KEY']])
{
sh "terraform init"
sh "terraform destroy -auto-approve"
}
}
}
}
}
}
}