Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump up actions used in GitHub Actions #45

Merged
merged 8 commits into from
May 6, 2024
Merged

Bump up actions used in GitHub Actions #45

merged 8 commits into from
May 6, 2024

Conversation

raahii
Copy link
Contributor

@raahii raahii commented May 6, 2024

全ての依存actionのバージョンをアップデートしていく。

resolve #41

Ref

@raahii raahii self-assigned this May 6, 2024
Copy link

cloudflare-workers-and-pages bot commented May 6, 2024

Deploying haraiai with  Cloudflare Pages  Cloudflare Pages

Latest commit: bd31902
Status: ✅  Deploy successful!
Preview URL: https://9a62522a.haraiai.pages.dev
Branch Preview URL: https://bump-up-ci.haraiai.pages.dev

View logs

Copy link

github-actions bot commented May 6, 2024

Terraform Initialization ⚙️success

Terraform Plan 📖success

Terraform Validation 🤖success

Show Plan
data.archive_file.bot: Reading...
data.google_secret_manager_secret_version.line_bot_channel_access_token: Reading...
data.google_secret_manager_secret_version.line_bot_channel_secret: Reading...
google_storage_bucket.bucket: Refreshing state... [id=haraiai-bucket]
data.google_secret_manager_secret_version.line_bot_channel_secret: Read complete after 0s [id=projects/900543910035/secrets/lineBotChannelSecret/versions/1]
data.google_secret_manager_secret_version.line_bot_channel_access_token: Read complete after 0s [id=projects/900543910035/secrets/lineBotChannelAccessToken/versions/1]
data.archive_file.bot: Read complete after 0s [id=ec04e56dc78b695b4882097fe12f6e02858139b9]
google_storage_bucket_object.bot: Refreshing state... [id=haraiai-bucket-func/bot.75ee0babf5fc31b0bf74e47b84fe5f7f.zip]
google_cloudfunctions_function.bot_webhook: Refreshing state... [id=projects/haraiai/locations/asia-northeast1/functions/BotWebhookHandler]
google_cloudfunctions_function_iam_member.webhook_invoker: Refreshing state... [id=projects/haraiai/locations/asia-northeast1/functions/BotWebhookHandler/roles/cloudfunctions.invoker/allUsers]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # google_cloudfunctions_function.bot_webhook will be updated in-place
  ~ resource "google_cloudfunctions_function" "bot_webhook" {
        id                           = "projects/haraiai/locations/asia-northeast1/functions/BotWebhookHandler"
        name                         = "BotWebhookHandler"
      ~ source_archive_object        = "func/bot.83b71829bd57152cb18305c0103e482d.zip" -> "func/bot.75ee0babf5fc31b0bf74e47b84fe5f7f.zip"
        # (22 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @raahii, Action: pull_request

Copy link

github-actions bot commented May 6, 2024

Terraform Initialization ⚙️success

Terraform Plan 📖failure

Terraform Validation 🤖success

Show Plan
data.archive_file.bot: Reading...
data.archive_file.bot: Read complete after 0s [id=ec04e56dc78b695b4882097fe12f6e02858139b9]
data.google_secret_manager_secret_version.line_bot_channel_access_token: Reading...
data.google_secret_manager_secret_version.line_bot_channel_secret: Reading...
google_storage_bucket.bucket: Refreshing state... [id=haraiai-bucket]

Planning failed. Terraform encountered an error while generating this plan.

Pushed by: @raahii, Action: pull_request

Comment on lines 107 to 112
- name: Authenticate Google Cloud
uses: google-github-actions/auth@v2
id: auth
with:
project_id: haraiai
export_default_credentials: true
- run: "gcloud info"
workload_identity_provider: projects/900543910035/locations/global/workloadIdentityPools/github-actions/providers/github
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

v2を使っている記事はあまりないが、認証の仕組みとしては同じなので下記の記事が参考になった
GitHub ActionsでWorkload Identityでの認証を入れてGoogle CloudのAPIを叩く

- run: npm ci
- run: npm run build
- uses: actions/upload-artifact@v3
node-version: 21.7.0
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

影響が小さいのでNodeだけバージョンアップしておく。GoやTerraformなどは別途やる

Copy link

github-actions bot commented May 6, 2024

Terraform Initialization ⚙️success

Terraform Plan 📖failure

Terraform Validation 🤖success

Show Plan
data.archive_file.bot: Reading...
data.google_secret_manager_secret_version.line_bot_channel_secret: Reading...
data.google_secret_manager_secret_version.line_bot_channel_access_token: Reading...
google_storage_bucket.bucket: Refreshing state... [id=haraiai-bucket]
data.archive_file.bot: Read complete after 1s [id=ec04e56dc78b695b4882097fe12f6e02858139b9]

Planning failed. Terraform encountered an error while generating this plan.

Pushed by: @raahii, Action: pull_request

Copy link

github-actions bot commented May 6, 2024

Terraform Initialization ⚙️success

Terraform Plan 📖success

Terraform Validation 🤖success

Show Plan
data.archive_file.bot: Reading...
data.archive_file.bot: Read complete after 1s [id=ec04e56dc78b695b4882097fe12f6e02858139b9]
data.google_secret_manager_secret_version.line_bot_channel_access_token: Reading...
data.google_secret_manager_secret_version.line_bot_channel_secret: Reading...
google_storage_bucket.bucket: Refreshing state... [id=haraiai-bucket]
google_storage_bucket_object.bot: Refreshing state... [id=haraiai-bucket-func/bot.75ee0babf5fc31b0bf74e47b84fe5f7f.zip]
data.google_secret_manager_secret_version.line_bot_channel_secret: Read complete after 0s [id=projects/900543910035/secrets/lineBotChannelSecret/versions/1]
data.google_secret_manager_secret_version.line_bot_channel_access_token: Read complete after 0s [id=projects/900543910035/secrets/lineBotChannelAccessToken/versions/1]
google_cloudfunctions_function.bot_webhook: Refreshing state... [id=projects/haraiai/locations/asia-northeast1/functions/BotWebhookHandler]
google_cloudfunctions_function_iam_member.webhook_invoker: Refreshing state... [id=projects/haraiai/locations/asia-northeast1/functions/BotWebhookHandler/roles/cloudfunctions.invoker/allUsers]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # google_cloudfunctions_function.bot_webhook will be updated in-place
  ~ resource "google_cloudfunctions_function" "bot_webhook" {
        id                           = "projects/haraiai/locations/asia-northeast1/functions/BotWebhookHandler"
        name                         = "BotWebhookHandler"
      ~ source_archive_object        = "func/bot.83b71829bd57152cb18305c0103e482d.zip" -> "func/bot.75ee0babf5fc31b0bf74e47b84fe5f7f.zip"
        # (22 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @raahii, Action: pull_request

Copy link

github-actions bot commented May 6, 2024

Terraform Initialization ⚙️success

Terraform Plan 📖success

Terraform Validation 🤖success

Show Plan
data.archive_file.bot: Reading...
data.archive_file.bot: Read complete after 0s [id=ec04e56dc78b695b4882097fe12f6e02858139b9]
data.google_secret_manager_secret_version.line_bot_channel_secret: Reading...
data.google_secret_manager_secret_version.line_bot_channel_access_token: Reading...
google_storage_bucket.bucket: Refreshing state... [id=haraiai-bucket]
google_storage_bucket_object.bot: Refreshing state... [id=haraiai-bucket-func/bot.75ee0babf5fc31b0bf74e47b84fe5f7f.zip]
data.google_secret_manager_secret_version.line_bot_channel_access_token: Read complete after 1s [id=projects/900543910035/secrets/lineBotChannelAccessToken/versions/1]
data.google_secret_manager_secret_version.line_bot_channel_secret: Read complete after 1s [id=projects/900543910035/secrets/lineBotChannelSecret/versions/1]
google_cloudfunctions_function.bot_webhook: Refreshing state... [id=projects/haraiai/locations/asia-northeast1/functions/BotWebhookHandler]
google_cloudfunctions_function_iam_member.webhook_invoker: Refreshing state... [id=projects/haraiai/locations/asia-northeast1/functions/BotWebhookHandler/roles/cloudfunctions.invoker/allUsers]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # google_cloudfunctions_function.bot_webhook will be updated in-place
  ~ resource "google_cloudfunctions_function" "bot_webhook" {
        id                           = "projects/haraiai/locations/asia-northeast1/functions/BotWebhookHandler"
        name                         = "BotWebhookHandler"
      ~ source_archive_object        = "func/bot.83b71829bd57152cb18305c0103e482d.zip" -> "func/bot.75ee0babf5fc31b0bf74e47b84fe5f7f.zip"
        # (22 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @raahii, Action: pull_request

@raahii
Copy link
Contributor Author

raahii commented May 6, 2024

#34 の方の問題でまだデプロイは成功しないかもしれないが、一旦バージョン周りは良さそう

@raahii raahii merged commit 5c2112a into main May 6, 2024
5 checks passed
@raahii raahii deleted the bump-up-ci branch May 6, 2024 08:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

google-github-actions/setup-gcloud の移行対応
1 participant