-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathJenkinsfile
108 lines (92 loc) · 2.77 KB
/
Jenkinsfile
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
def paramOperationList = ['validate', 'create', 'destroy']
pipeline {
agent {
docker {
alwaysPull true
image 'hashicorp/terraform:latest'
args '--entrypoint='
}
}
parameters {
choice(name: 'Operation', choices: paramOperationList, description: 'Operation to perform.')
}
options {
ansiColor('xterm')
buildDiscarder(logRotator(numToKeepStr: '10'))
}
stages {
stage('terraform init') {
steps {
echo "terraform init"
withCredentials([usernamePassword(credentialsId: 'aws-demo-key', usernameVariable: 'AWS_ACCESS_KEY_ID', passwordVariable: 'AWS_SECRET_ACCESS_KEY'), ]) {
sh '''
terraform fmt
terraform version
terraform init
'''
}
}
}
stage('terraform validate') {
steps {
withCredentials([usernamePassword(credentialsId: 'aws-demo-key', usernameVariable: 'AWS_ACCESS_KEY_ID', passwordVariable: 'AWS_SECRET_ACCESS_KEY'), ]) {
sh '''
terraform validate
'''
}
}
}
stage('terraform plan') {
when {
equals expected: "create", actual: "${params.Operation}"
}
steps {
echo "terraform plan"
withCredentials([usernamePassword(credentialsId: 'aws-demo-key', usernameVariable: 'AWS_ACCESS_KEY_ID', passwordVariable: 'AWS_SECRET_ACCESS_KEY'), ]) {
sh '''
terraform plan -out=current.plan
'''
}
}
}
stage('terraform apply') {
when {
equals expected: "create", actual: "${params.Operation}"
}
steps {
echo "terraform apply"
withCredentials([usernamePassword(credentialsId: 'aws-demo-key', usernameVariable: 'AWS_ACCESS_KEY_ID', passwordVariable: 'AWS_SECRET_ACCESS_KEY'), ]) {
sh '''
terraform apply current.plan
'''
}
}
}
stage("terraform plan --destroy") {
when {
equals expected: "destroy", actual: "${params.Operation}"
}
steps {
echo "terraform plan"
withCredentials([usernamePassword(credentialsId: 'aws-demo-key', usernameVariable: 'AWS_ACCESS_KEY_ID', passwordVariable: 'AWS_SECRET_ACCESS_KEY'), ]) {
sh '''
terraform plan -destroy -out=current.plan
'''
}
}
}
stage('terraform apply --destroy') {
when {
equals expected: "destroy", actual: "${params.Operation}"
}
steps {
echo "terraform apply"
withCredentials([usernamePassword(credentialsId: 'aws-demo-key', usernameVariable: 'AWS_ACCESS_KEY_ID', passwordVariable: 'AWS_SECRET_ACCESS_KEY'), ]) {
sh '''
terraform apply current.plan
'''
}
}
}
}
}