Add truncated domain primary name, together with longer secondary #5218
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
on: | |
pull_request: | |
paths: | |
- 'namespaces/live.cloud-platform.service.justice.gov.uk/**' | |
workflow_dispatch: | |
jobs: | |
ecr-deletion-check: | |
runs-on: ubuntu-latest | |
steps: | |
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 ##v4.2.2 | |
- name: Get changed files | |
id: changed-files | |
uses: tj-actions/changed-files@d6e91a2266cdb9d62096cebf1e8546899c6aa18f ##v45.0.6 | |
with: | |
write_output_files: true | |
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 ##v4.2.2 | |
with: | |
ref: main | |
- name: Get deletion protection from main | |
id: deletion-protection | |
env: | |
DELETED_FILES : ${{ steps.changed-files.outputs.deleted_files }} | |
run: | | |
DELETION_PROTECTION= | |
for file in $DELETED_FILES; do | |
if cat $file | grep -q github.com/ministryofjustice/cloud-platform-terraform-ecr-credentials; then | |
sed '/^[[:space:]]*[//|#]/d' $file > $file.tmp | |
if grep -q "deletion_protection" $file.tmp; then | |
DELETION_PROTECTION=$(sed -n 's/^[[:space:]]*deletion_protection[[:space:]]*=[[:space:]]*\(true\|false\).*$/\1/p' $file.tmp) | |
else | |
DELETION_PROTECTION=true | |
fi | |
break | |
fi | |
done | |
echo $DELETION_PROTECTION | |
echo "deletionProtection=$DELETION_PROTECTION" >> $GITHUB_OUTPUT | |
- name: Create comment in the PR | |
uses: peter-evans/create-or-update-comment@71345be0265236311c031f5c7866368bd1eff043 ##v4.0.0 | |
if: steps.deletion-protection.outputs.deletionProtection == 'true' | |
with: | |
issue-number: ${{ github.event.pull_request.number }} | |
body: | | |
You are deleting an existing ECR resource from your Terraform configuration. \ | |
Kindly make sure to disable deletion_protection by setting `deletion_protection = false` in your ecr module. | |
1. Raise and merge a PR with `deletion_protection = false` | |
2. Rebase and rerun the checks on this PR and then merge | |
- name: Fail action if ecr is deleted without deletion_protection disabled | |
if: steps.deletion-protection.outputs.deletionProtection == 'true' | |
run: | | |
echo "You are deleting an existing ECR resource from your Terraform configuration. | |
Kindly make sure to disable deletion_protection in your ecr module. | |
See comment on PR for more info" | |
exit 1 |