Skip to content

Commit f0c2595

Browse files
authored
Use Long Lasting AWS Creds for Soak Tests only (#90)
1 parent 14aa07e commit f0c2595

File tree

1 file changed

+7
-14
lines changed

1 file changed

+7
-14
lines changed

.github/workflows/soak-testing.yml

Lines changed: 7 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,6 @@ jobs:
3636
name: Soak Performance Test - (${{ matrix.app-platform }}, ${{ matrix.instrumentation-type }})
3737
runs-on: ubuntu-latest
3838
permissions:
39-
id-token: write
4039
contents: write
4140
issues: write
4241
strategy:
@@ -98,19 +97,13 @@ jobs:
9897
# MARK: - Run Performance Tests
9998

10099
- name: Configure AWS Credentials
101-
run: |
102-
export AWS_ROLE_ARN=${{ secrets.AWS_ASSUME_ROLE_ARN }}
103-
export AWS_WEB_IDENTITY_TOKEN_FILE=/tmp/awscreds
104-
105-
echo "AWS_ROLE_ARN=$AWS_ROLE_ARN" >> $GITHUB_ENV
106-
echo "AWS_WEB_IDENTITY_TOKEN_FILE=$AWS_WEB_IDENTITY_TOKEN_FILE" >> $GITHUB_ENV
107-
108-
curl -H "Authorization: bearer $ACTIONS_ID_TOKEN_REQUEST_TOKEN" "$ACTIONS_ID_TOKEN_REQUEST_URL&audience=sigstore" | jq -r '.value' > $AWS_WEB_IDENTITY_TOKEN_FILE
109-
110-
AWS_CREDENTIALS=$(aws sts get-session-token)
111-
echo "AWS_ACCESS_KEY_ID=$(echo $AWS_CREDENTIALS | jq '.Credentials.AccessKeyId')" >> $GITHUB_ENV;
112-
echo "AWS_SECRET_ACCESS_KEY=$(echo $AWS_CREDENTIALS | jq '.Credentials.SecretAccessKey')" >> $GITHUB_ENV;
113-
echo "AWS_SESSION_TOKEN=$(echo $AWS_CREDENTIALS | jq '.Credentials.SessionToken')" >> $GITHUB_ENV;
100+
uses: aws-actions/configure-aws-credentials@v1
101+
with:
102+
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
103+
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
104+
role-to-assume: ${{ secrets.AWS_ASSUME_ROLE_ARN }}
105+
role-duration-seconds: 21600 # 6 Hours
106+
aws-region: ${{ env.AWS_DEFAULT_REGION }}
114107
# NOTE: We only login to prevent getting throttled for too many docker
115108
# pulls. We do not publish anything to ECR.
116109
- name: Login to ECR

0 commit comments

Comments
 (0)