diff --git a/.github/workflows/aws.yml b/.github/workflows/aws.yml new file mode 100644 index 0000000..d4e7b80 --- /dev/null +++ b/.github/workflows/aws.yml @@ -0,0 +1,60 @@ +# This workflow will build and push a new container image to Amazon ECR, +# and then will deploy a new task definition to Amazon ECS, on every push +# to the master branch. +# +# To use this workflow, you will need to complete the following set-up steps: +# +# 1. Create an ECR repository to store your images. +# For example: `aws ecr create-repository --repository-name my-ecr-repo --region us-east-2`. +# Replace the value of `ECR_REPOSITORY` in the workflow below with your repository's name. +# Replace the value of `aws-region` in the workflow below with your repository's region. +# +# 2. Create an ECS task definition, an ECS cluster, and an ECS service. +# For example, follow the Getting Started guide on the ECS console: +# https://us-east-2.console.aws.amazon.com/ecs/home?region=us-east-2#/firstRun +# Replace the values for `service` and `cluster` in the workflow below with your service and cluster names. +# +# 3. Store your ECS task definition as a JSON file in your repository. +# The format should follow the output of `aws ecs register-task-definition --generate-cli-skeleton`. +# Replace the value of `task-definition` in the workflow below with your JSON file's name. +# Replace the value of `container-name` in the workflow below with the name of the container +# in the `containerDefinitions` section of the task definition. +# +# 4. Store an IAM user access key in GitHub Actions secrets named `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY`. +# See the documentation for each action used below for the recommended IAM policies for this IAM user, +# and best practices on handling the access key credentials. + +on: + push +# branches: +# - master + +name: Deploy to AWS + +jobs: + deploy: + name: Deploy + runs-on: ubuntu-latest + + steps: + - name: Checkout + uses: actions/checkout@v1 + + - name: Build + run: ./build.sh + + - name: Deploy - Terraform Apply for AWS + uses: kciter/terraform-apply-for-aws-action@v3 + with: + # The AWS access key id + access_key_id: ${{ secrets.AWS_ACCESS_KEY_ID }} + # The AWS secret access key + secret_access_key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} + # The AWS default region + region: 'eu-west-1' + # Comma-separated string of Terraform variables + variables: + telegram_bot_key=${{ secrets.TG_BOT_KEY }} + telegram_channel_id='@open_giornale_unofficial' + path: . + diff --git a/build.sh b/build.sh index b9f3ead..a39b1d5 100755 --- a/build.sh +++ b/build.sh @@ -9,5 +9,3 @@ pushd ./package zip -r9 ../function.zip . popd zip -j function.zip scraper.py - -rm -r package 2> /dev/null \ No newline at end of file