-
Notifications
You must be signed in to change notification settings - Fork 15
79 lines (67 loc) · 2.3 KB
/
build-deploy-fe.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
name: Build & Deploy FE
on:
workflow_dispatch:
inputs:
account:
description: AWS account to deploy to
required: true
type: choice
options:
- b3tr-dev
default: b3tr-dev
s3_bucket_name:
description: Name of the S3 bucket which stores static FE
required: true
type: choice
options:
- b3tr-dev-insight-fe
default: b3tr-dev-insight-fe
cloudfront_distribution_id:
description: ID of the Cloudfront distribution to invalidate
required: true
type: string
default: E38AJF9PZBDTJ6
concurrency:
group: ${{ github.workflow }}-${{ github.ref }}-deploy-fe
cancel-in-progress: true
# Required for authentication through GitHub OIDC
permissions:
id-token: write # This is required for requesting the JWT
contents: read # This is required for actions/checkout
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/checkout@v4
- name: Set up Node
uses: actions/setup-node@v4
with:
node-version: '16'
- name: Install
run: yarn
- name: Build
run: yarn build
- name: Determine AWS account ID and role
id: determine-account
# For any account requiring insights depoyment, configure OIDC authentication in that account and update this step accordingly
run: |
case ${{ inputs.account }} in
b3tr-dev)
echo "role_arn=${{ secrets.B3TR_DEV_AWS_ACC_ROLE }}" >> $GITHUB_OUTPUT
;;
*)
echo "Invalid account specified. Please ensure the OIDC role for the desired account has been added to this repository's secrets."
exit 1
;;
esac
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v4
with:
aws-region: eu-west-1
role-to-assume: ${{ steps.determine-account.outputs.role_arn }}
- name: Upload to S3
run: aws s3 sync ./dist s3://${{ inputs.s3_bucket_name }} --delete
- name: Cloudfront Invalidation
run: |
AWS_MAX_ATTEMPTS=10 aws cloudfront create-invalidation --distribution-id ${{ inputs.cloudfront_distribution_id }} --paths '/' '/*'