@@ -4,47 +4,49 @@ apply: apply-remote-state apply-secrets apply-env apply-k8s-utils
44
55# # remove state file only if exit code 0 from terraform apply
66apply-remote-state :
7- pushd terraform/bootstrap/remote-state; \
8- terraform init; \
9- terraform apply -var " environment=$( ENV) " && rm ./terraform.tfstate;
7+ pushd terraform/bootstrap/remote-state && \
8+ terraform init && \
9+ terraform apply -var " environment=$( ENV) " && \
10+ rm ./terraform.tfstate
1011
1112apply-secrets :
12- pushd terraform/bootstrap/secrets; \
13- terraform init; \
14- terraform apply && rm terraform.tfstate;
13+ pushd terraform/bootstrap/secrets && \
14+ terraform init && \
15+ terraform apply && \
16+ rm ./terraform.tfstate
1517
1618apply-env :
1719 pushd terraform/environments/$(ENV ) ; \
18- terraform init; \
20+ terraform init && \
1921 terraform apply
2022
2123apply-k8s-utils : update-k8s-conf
22- pushd kubernetes/terraform/environments/$(ENV ) ; \
23- terraform init; \
24+ pushd kubernetes/terraform/environments/$(ENV ) && \
25+ terraform init && \
2426 terraform apply
2527
26- update-k8s-conf :
28+ update-k8s-conf :
2729 aws eks --region < % index .Params ` region` %> update-kubeconfig --name < % .Name %> -$(ENV ) -< % index .Params ` region` %>
2830
2931teardown : teardown-k8s-utils teardown-env teardown-secrets teardown-remote-state
3032
3133teardown-remote-state :
32- export AWS_PAGER=' ' ; \
33- aws s3 rb s3://< % .Name %> -$(ENV ) -terraform-state --force; \
34- aws dynamodb delete-table --table-name < % .Name %> -$(ENV ) -terraform-state-locks;
34+ export AWS_PAGER=' ' && \
35+ aws s3 rb s3://< % .Name %> -$(ENV ) -terraform-state --force && \
36+ aws dynamodb delete-table --table-name < % .Name %> -$(ENV ) -terraform-state-locks
3537
3638teardown-secrets :
37- export AWS_PAGER=' ' ; \
38- aws secretsmanager list-secrets --query " SecretList[?Tags[?Key=='project' && Value=='<% .Name %>']].[Name]" | jq ' .[] [0]' | xargs aws secretsmanager delete-secret --secret-id; \
39- aws iam delete-access-key --user-name < % .Name %> -ci-user --access-key-id $(shell aws iam list-access-keys --user-name <% .Name % >-ci-user --query "AccessKeyMetadata[0].AccessKeyId" | sed 's/"//g') ; \
40- aws iam delete-user --user-name < % .Name %> -ci-user;
39+ export AWS_PAGER=' ' && \
40+ aws secretsmanager list-secrets --query " SecretList[?Tags[?Key=='project' && Value=='<% .Name %>']].[Name] | [0] [0]" | xargs aws secretsmanager delete-secret --secret-id && \
41+ aws iam delete-access-key --user-name < % .Name %> -ci-user --access-key-id $(shell aws iam list-access-keys --user-name <% .Name % >-ci-user --query "AccessKeyMetadata[0].AccessKeyId" | sed 's/"//g') && \
42+ aws iam delete-user --user-name < % .Name %> -ci-user
4143
4244teardown-env :
43- pushd terraform/environments/$(ENV ) ; \
44- terraform destroy -auto-approve ;
45+ pushd terraform/environments/$(ENV ) && \
46+ terraform destroy
4547
4648teardown-k8s-utils :
47- pushd kubernetes/terraform/environments/$(ENV ) ; \
48- terraform destroy;
49+ pushd kubernetes/terraform/environments/$(ENV ) && \
50+ terraform destroy
4951
5052.PHONY : apply apply-remote-state apply-secrets apply-env apply-k8s-utils teardown-k8s-utils teardown-env teardown-secrets teardown-remote-state
0 commit comments