Run Runtime Action Deploy
ActionsTags
(1)GitHub action to run StackSpot Runtime Deploy Worker.
Note: This action is supported on debian/RHEl like systems
Check how to implement the orchestration job using the runtime-manager-action
jobs:
job1:
runs-on: ubuntu-latest
needs: [orchestration]
strategy:
matrix:
task: ${{ fromJSON(needs.orchestration.outputs.tasks) }}
fail-fast: true
max-parallel: 1
steps:
- name: DEPLOY
if: contains( matrix.task.taskType , 'DEPLOY')
uses: stack-spot/runtime-deploy-action@v1
with:
FEATURES_LEVEL_LOG: debug
CLIENT_ID: ${{ secrets.CLIENT_ID }}
CLIENT_KEY: ${{ secrets.CLIENT_KEY }}
CLIENT_REALM: ${{ secrets.CLIENT_REALM }}
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ secrets.AWS_SESSION_TOKEN }}
AWS_REGION: sa-east-1
REPOSITORY_NAME: my-repository-name
RUN_TASK_ID: ${{ matrix.task.runTaskId }}
CONTAINER_URL: my/container-url # not mandatory
FEATURES_TERRAFORM_MODULES: ... # not mandatory
Field | Mandatory | Observation |
---|---|---|
FEATURES_LEVEL_LOG | YES | Log Level |
CLIENT_ID | YES | StackSpot Client ID. |
CLIENT_KEY | YES | StackSpot Client KEY. |
CLIENT_REALM | YES | StackSpot Client Realm. |
AWS_ACCESS_KEY_ID | NO | AWS Access Key ID |
AWS_SECRET_ACCESS_KEY | NO | AWS Secret Access Key |
AWS_SESSION_TOKEN | NO | AWS Session Token |
AWS_ROLE_ARN | NO | AWS Role ARN |
AWS_REGION | YES | AWS region where resources with be provisioned. Used for tf backend as well (e.g: us-east-1 ). |
RUN_TASK_ID | YES | StackSpot Runtime task id to be executed, according to runtime-manager-action. |
REPOSITORY_NAME | YES | Repository name to checkout during task process. |
CONTAINER_URL | NO | Container url reference (e.g stackspot/image ) |
FEATURES_TERRAFORM_MODULES | NO | List of external terraform modules allowed |
Run Runtime Action Deploy is not certified by GitHub. It is provided by a third-party and is governed by separate terms of service, privacy policy, and support documentation.