File tree Expand file tree Collapse file tree 1 file changed +7
-14
lines changed Expand file tree Collapse file tree 1 file changed +7
-14
lines changed Original file line number Diff line number Diff line change 36
36
name : Soak Performance Test - (${{ matrix.app-platform }}, ${{ matrix.instrumentation-type }})
37
37
runs-on : ubuntu-latest
38
38
permissions :
39
- id-token : write
40
39
contents : write
41
40
issues : write
42
41
strategy :
@@ -98,19 +97,13 @@ jobs:
98
97
# MARK: - Run Performance Tests
99
98
100
99
- name : Configure AWS Credentials
101
- run : |
102
- export AWS_ROLE_ARN=${{ secrets.AWS_ASSUME_ROLE_ARN }}
103
- export AWS_WEB_IDENTITY_TOKEN_FILE=/tmp/awscreds
104
-
105
- echo "AWS_ROLE_ARN=$AWS_ROLE_ARN" >> $GITHUB_ENV
106
- echo "AWS_WEB_IDENTITY_TOKEN_FILE=$AWS_WEB_IDENTITY_TOKEN_FILE" >> $GITHUB_ENV
107
-
108
- curl -H "Authorization: bearer $ACTIONS_ID_TOKEN_REQUEST_TOKEN" "$ACTIONS_ID_TOKEN_REQUEST_URL&audience=sigstore" | jq -r '.value' > $AWS_WEB_IDENTITY_TOKEN_FILE
109
-
110
- AWS_CREDENTIALS=$(aws sts get-session-token)
111
- echo "AWS_ACCESS_KEY_ID=$(echo $AWS_CREDENTIALS | jq '.Credentials.AccessKeyId')" >> $GITHUB_ENV;
112
- echo "AWS_SECRET_ACCESS_KEY=$(echo $AWS_CREDENTIALS | jq '.Credentials.SecretAccessKey')" >> $GITHUB_ENV;
113
- echo "AWS_SESSION_TOKEN=$(echo $AWS_CREDENTIALS | jq '.Credentials.SessionToken')" >> $GITHUB_ENV;
100
+ uses : aws-actions/configure-aws-credentials@v1
101
+ with :
102
+ aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
103
+ aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
104
+ role-to-assume : ${{ secrets.AWS_ASSUME_ROLE_ARN }}
105
+ role-duration-seconds : 21600 # 6 Hours
106
+ aws-region : ${{ env.AWS_DEFAULT_REGION }}
114
107
# NOTE: We only login to prevent getting throttled for too many docker
115
108
# pulls. We do not publish anything to ECR.
116
109
- name : Login to ECR
You can’t perform that action at this time.
0 commit comments