diff --git a/.gitea/workflows/pipeline.yaml b/.gitea/workflows/pipeline.yaml index 8fa9140..32db42e 100644 --- a/.gitea/workflows/pipeline.yaml +++ b/.gitea/workflows/pipeline.yaml @@ -83,8 +83,8 @@ jobs: env: TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} - TF_VAR_renovate_endpoint: "https://gitea.example.com/api/v1/" - TF_VAR_renovate_token: "dummy-token-for-validation" + #TF_VAR_renovate_endpoint: "https://gitea.example.com/api/v1/" + #TF_VAR_renovate_token: "dummy-token-for-validation" VAULT_ADDR: ${{ secrets.VAULT_ADDR }} run: terraform init -backend=false @@ -92,8 +92,8 @@ jobs: env: TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} - TF_VAR_renovate_endpoint: "https://gitea.example.com/api/v1/" - TF_VAR_renovate_token: "dummy-token-for-validation" + #TF_VAR_renovate_endpoint: "https://gitea.example.com/api/v1/" + #TF_VAR_renovate_token: "dummy-token-for-validation" VAULT_ADDR: ${{ secrets.VAULT_ADDR }} run: terraform validate @@ -154,8 +154,8 @@ jobs: TF_BACKEND_REGION: "main" TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} - TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} - TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} + #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} + #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }} run: | terraform init -input=false \ @@ -175,8 +175,8 @@ jobs: AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }} TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} - TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} - TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} + #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} + #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }} run: | terraform plan -input=false -out=tfplan @@ -254,8 +254,8 @@ jobs: TF_BACKEND_REGION: "main" TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} - TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} - TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} + #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} + #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }} run: | terraform init \ @@ -287,8 +287,8 @@ jobs: AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }} TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} - TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} - TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} + #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} + #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }} run: terraform apply -input=false -auto-approve tfplan @@ -350,8 +350,8 @@ jobs: TF_BACKEND_REGION: "main" TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} - TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} - TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} + #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} + #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }} run: | echo "Performing fresh terraform init (no cache for safety)..." @@ -372,8 +372,8 @@ jobs: AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }} TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} - TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} - TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} + #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} + #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }} run: | echo "Generating destroy plan..." @@ -387,8 +387,8 @@ jobs: AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }} TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} - TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} - TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} + #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} + #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }} run: | echo "🔥 DESTROYING INFRASTRUCTURE..."