Merge pull request #357 from microsoft/fix/replace-standard-with-glob… #235
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| name: Validate Deployment - KM Generic | |
| on: | |
| push: | |
| branches: | |
| - main | |
| - dev | |
| - demo | |
| workflow_dispatch: | |
| schedule: | |
| - cron: '0 0,12 * * *' # Runs at 12:00 AM and 12:00 PM GMT | |
| jobs: | |
| deploy: | |
| runs-on: ubuntu-latest | |
| steps: | |
| - name: Checkout Code | |
| uses: actions/checkout@v3 | |
| - name: Run Quota Check | |
| id: quota-check | |
| run: | | |
| export AZURE_CLIENT_ID=${{ secrets.AZURE_CLIENT_ID }} | |
| export AZURE_TENANT_ID=${{ secrets.AZURE_TENANT_ID }} | |
| export AZURE_CLIENT_SECRET=${{ secrets.AZURE_CLIENT_SECRET }} | |
| export AZURE_SUBSCRIPTION_ID="${{ secrets.AZURE_SUBSCRIPTION_ID }}" | |
| export GPT_MIN_CAPACITY="100" | |
| export TEXT_EMBEDDING_MIN_CAPACITY="80" | |
| export AZURE_REGIONS="${{ vars.AZURE_REGIONS_KM }}" | |
| chmod +x infra/scripts/checkquota_km.sh | |
| if ! infra/scripts/checkquota_km.sh; then | |
| # If quota check fails due to insufficient quota, set the flag | |
| if grep -q "No region with sufficient quota found" infra/scripts/checkquota_km.sh; then | |
| echo "QUOTA_FAILED=true" >> $GITHUB_ENV | |
| fi | |
| exit 1 # Fail the pipeline if any other failure occurs | |
| fi | |
| - name: Send Notification on Quota Failure | |
| if: env.QUOTA_FAILED == 'true' | |
| run: | | |
| RUN_URL="https://github.com/${{ github.repository }}/actions/runs/${{ github.run_id }}" | |
| EMAIL_BODY=$(cat <<EOF | |
| { | |
| "body": "<p>Dear Team,</p><p>The quota check has failed, and the pipeline cannot proceed.</p><p><strong>Build URL:</strong> ${RUN_URL}</p><p>Please take necessary action.</p><p>Best regards,<br>Your Automation Team</p>" | |
| } | |
| EOF | |
| ) | |
| curl -X POST "${{ secrets.LOGIC_APP_URL }}" \ | |
| -H "Content-Type: application/json" \ | |
| -d "$EMAIL_BODY" || echo "Failed to send notification" | |
| - name: Fail Pipeline if Quota Check Fails | |
| if: env.QUOTA_FAILED == 'true' | |
| run: exit 1 | |
| - name: Set Deployment Region | |
| run: | | |
| echo "Selected Region: $VALID_REGION" | |
| echo "AZURE_LOCATION=$VALID_REGION" >> $GITHUB_ENV | |
| - name: Setup Azure CLI | |
| run: | | |
| curl -sL https://aka.ms/InstallAzureCLIDeb | sudo bash | |
| az --version # Verify installation | |
| - name: Login to Azure | |
| run: | | |
| az login --service-principal -u ${{ secrets.AZURE_CLIENT_ID }} -p ${{ secrets.AZURE_CLIENT_SECRET }} --tenant ${{ secrets.AZURE_TENANT_ID }} | |
| - name: Install Bicep CLI | |
| run: az bicep install | |
| - name: Generate Resource Group Name | |
| id: generate_rg_name | |
| run: | | |
| echo "Generating a unique resource group name..." | |
| TIMESTAMP=$(date +%Y%m%d%H%M%S) | |
| COMMON_PART="ci-KMGeneric" | |
| UNIQUE_RG_NAME="${COMMON_PART}${TIMESTAMP}" | |
| echo "RESOURCE_GROUP_NAME=${UNIQUE_RG_NAME}" >> $GITHUB_ENV | |
| echo "Generated Resource_GROUP_PREFIX: ${UNIQUE_RG_NAME}" | |
| - name: Create Resource Group | |
| run: | | |
| az group create --name ${{ env.RESOURCE_GROUP_NAME }} --location ${{ env.AZURE_LOCATION }} | |
| - name: Generate Unique Solution Prefix | |
| id: generate_solution_prefix | |
| run: | | |
| set -e | |
| COMMON_PART="km" | |
| TIMESTAMP=$(date +%s) | |
| UPDATED_TIMESTAMP=$(echo $TIMESTAMP | tail -c 5) | |
| UNIQUE_SOLUTION_PREFIX="${COMMON_PART}${UPDATED_TIMESTAMP}" | |
| echo "SOLUTION_PREFIX=${UNIQUE_SOLUTION_PREFIX}" >> $GITHUB_ENV | |
| echo "Generated SOLUTION_PREFIX: ${UNIQUE_SOLUTION_PREFIX}" | |
| - name: Determine Tag Name Based on Branch | |
| id: determine_tag | |
| run: echo "tagname=${{ github.ref_name == 'main' && 'latest' || github.ref_name == 'dev' && 'dev' || github.ref_name == 'demo' && 'demo' || github.ref_name == 'dependabotchanges' && 'dependabotchanges' || github.head_ref || 'default' }}" >> $GITHUB_OUTPUT | |
| - name: Deploy Bicep Template | |
| id: deploy | |
| run: | | |
| set -e | |
| az deployment group create \ | |
| --resource-group ${{ env.RESOURCE_GROUP_NAME }} \ | |
| --template-file infra/main.bicep \ | |
| --parameters environmentName=${{env.SOLUTION_PREFIX}} contentUnderstandingLocation="swedencentral" secondaryLocation="${{ env.AZURE_LOCATION }}" imageTag=${{ steps.determine_tag.outputs.tagname }} | |
| - name: Extract AI Services and Key Vault Names | |
| if: always() | |
| run: | | |
| echo "Fetching AI Services and Key Vault names before deletion..." | |
| # # Get Key Vault name | |
| # KEYVAULT_NAME=$(az resource list --resource-group ${{ env.RESOURCE_GROUP_NAME }} --resource-type "Microsoft.KeyVault/vaults" --query "[].name" -o tsv) | |
| # echo "Detected Key Vault: $KEYVAULT_NAME" | |
| # echo "KEYVAULT_NAME=$KEYVAULT_NAME" >> $GITHUB_ENV | |
| # Get AI Services names and convert them into a space-separated string | |
| AI_SERVICES=$(az resource list --resource-group ${{ env.RESOURCE_GROUP_NAME }} --resource-type "Microsoft.CognitiveServices/accounts" --query "[].name" -o tsv | tr '\n' ' ') | |
| echo "Detected AI Services: $AI_SERVICES" | |
| echo "AI_SERVICES=$AI_SERVICES" >> $GITHUB_ENV | |
| - name: Send Notification on Failure | |
| if: failure() | |
| run: | | |
| RUN_URL="https://github.com/${{ github.repository }}/actions/runs/${{ github.run_id }}" | |
| # Construct the email body | |
| EMAIL_BODY=$(cat <<EOF | |
| { | |
| "body": "<p>Dear Team,</p><p>We would like to inform you that the CKMv2 Automation process has encountered an issue and has failed to complete successfully.</p><p><strong>Build URL:</strong> ${RUN_URL}<br> ${OUTPUT}</p><p>Please investigate the matter at your earliest convenience.</p><p>Best regards,<br>Your Automation Team</p>" | |
| } | |
| EOF | |
| ) | |
| # Send the notification | |
| curl -X POST "${{ secrets.LOGIC_APP_URL }}" \ | |
| -H "Content-Type: application/json" \ | |
| -d "$EMAIL_BODY" || echo "Failed to send notification" | |
| - name: Delete Bicep Deployment | |
| if: always() | |
| run: | | |
| set -e | |
| echo "Checking if resource group exists..." | |
| rg_exists=$(az group exists --name ${{ env.RESOURCE_GROUP_NAME }}) | |
| if [ "$rg_exists" = "true" ]; then | |
| echo "Resource group exist. Cleaning..." | |
| az group delete \ | |
| --name ${{ env.RESOURCE_GROUP_NAME }} \ | |
| --yes \ | |
| --no-wait | |
| echo "Resource group deleted... ${{ env.RESOURCE_GROUP_NAME }}" | |
| else | |
| echo "Resource group does not exists." | |
| fi | |
| - name: Wait for Soft Deletion of Key Vault and AI Services | |
| if: always() | |
| run: | | |
| echo "Waiting for resources to be soft deleted..." | |
| # Wait for Key Vault to be soft deleted | |
| if [ -n "${{ env.KEYVAULT_NAME }}" ]; then | |
| while true; do | |
| DELETED_VAULT=$(az keyvault show-deleted --name ${{ env.KEYVAULT_NAME }} --query "id" -o tsv 2>/dev/null || echo "") | |
| if [ -n "$DELETED_VAULT" ]; then | |
| echo "Key Vault soft deleted!" | |
| break | |
| fi | |
| echo "Key Vault not yet soft deleted. Retrying in 15s..." | |
| sleep 15 | |
| done | |
| fi | |
| # Wait for AI Services to be soft deleted | |
| for AI_SERVICE in ${{ env.AI_SERVICES }}; do | |
| while true; do | |
| DELETED_AI_SERVICE=$(az cognitiveservices account list-deleted --query "[?name=='$AI_SERVICE'].id" -o tsv 2>/dev/null || echo "") | |
| if [ -n "$DELETED_AI_SERVICE" ]; then | |
| echo "AI Service $AI_SERVICE is soft deleted!" | |
| break | |
| fi | |
| echo "AI Service $AI_SERVICE not yet soft deleted. Retrying in 15s..." | |
| sleep 15 | |
| done | |
| done | |
| - name: Purge Key Vault and AI Services | |
| if: always() | |
| run: | | |
| echo "Purging soft deleted resources..." | |
| # Ensure AI_SERVICES is properly split into individual services | |
| IFS=' ' read -r -a SERVICES <<< "${{ env.AI_SERVICES }}" | |
| for AI_SERVICE in "${SERVICES[@]}"; do | |
| echo "Checking location for AI Service: $AI_SERVICE" | |
| # Fetch AI Service location | |
| SERVICE_LOCATION=$(az cognitiveservices account list-deleted --query "[?name=='$AI_SERVICE'].location" -o tsv 2>/dev/null || echo "") | |
| if [ -n "$SERVICE_LOCATION" ]; then | |
| echo "Purging AI Service $AI_SERVICE in $SERVICE_LOCATION" | |
| az cognitiveservices account purge --location "$SERVICE_LOCATION" --resource-group "${{ env.RESOURCE_GROUP_NAME }}" --name "$AI_SERVICE" | |
| else | |
| echo "Could not determine location for AI Service: $AI_SERVICE. Skipping purge." | |
| fi | |
| done | |
| shell: bash | |