Skip to content

Commit 2d26bd8

Browse files
committed
fix: aws install job
1 parent e33131e commit 2d26bd8

File tree

2 files changed

+16
-36
lines changed

2 files changed

+16
-36
lines changed

.github/workflows/docker-smurf.yml

Lines changed: 8 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -193,12 +193,17 @@ jobs:
193193
run: |
194194
docker load -i ${{ inputs.docker_image_tar }}
195195
196-
- name: 🔑 Configure AWS credentials with OIDC
197-
if: inputs.aws_auth_method == 'oidc'
196+
- name: 🟦 Install AWS CLI
197+
if: ${{ inputs.provider == 'aws' }}
198198
uses: aws-actions/configure-aws-credentials@v6
199199
with:
200-
role-to-assume: ${{ inputs.aws_role }}
200+
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
201+
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
202+
aws-session-token: ${{ secrets.AWS_SESSION_TOKEN }}
203+
role-to-assume: ${{ secrets.BUILD_ROLE }}
201204
aws-region: ${{ inputs.aws_region }}
205+
role-duration-seconds: 900
206+
role-skip-session-tagging: true
202207

203208
- name: 🔄 Assume another IAM Role
204209
if: inputs.aws_assume_role == 'true'
@@ -207,21 +212,6 @@ jobs:
207212
role-to-assume: ${{ inputs.aws_assume_role_arn }}
208213
aws-region: ${{ inputs.aws_region }}
209214

210-
- name: 🔑 Configure AWS credentials with access keys
211-
if: inputs.aws_auth_method == 'keys'
212-
env:
213-
AWS_ACCESS_KEY_ID: '${{ secrets.AWS_ACCESS_KEY_ID }}'
214-
AWS_SECRET_ACCESS_KEY: '${{ secrets.AWS_SECRET_ACCESS_KEY }}'
215-
AWS_SESSION_TOKEN: '${{ secrets.AWS_SESSION_TOKEN }}'
216-
aws-region: ${{ inputs.aws_region }}
217-
run: |
218-
aws configure set aws_access_key_id $AWS_ACCESS_KEY_ID
219-
aws configure set aws_secret_access_key $AWS_SECRET_ACCESS_KEY
220-
if [[ -n "$AWS_SESSION_TOKEN" ]]; then
221-
aws configure set aws_session_token $AWS_SESSION_TOKEN
222-
fi
223-
aws configure set region $AWS_REGION
224-
225215
- name: ☁️ Authenticate Google Cloud with WIP and Service Account
226216
if: inputs.gcp_auth_method == 'wip'
227217
uses: google-github-actions/auth@v3

.github/workflows/helm-smurf.yml

Lines changed: 8 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -178,12 +178,17 @@ jobs:
178178
- name: Setup Smurf
179179
uses: clouddrove/smurf@v1.0.0
180180

181-
- name: 🔑 Configure AWS credentials with OIDC
182-
if: inputs.aws_auth_method == 'oidc'
181+
- name: 🟦 Install AWS CLI
182+
if: ${{ inputs.provider == 'aws' }}
183183
uses: aws-actions/configure-aws-credentials@v6
184184
with:
185-
role-to-assume: '${{ inputs.aws_role }}'
185+
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
186+
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
187+
aws-session-token: ${{ secrets.AWS_SESSION_TOKEN }}
188+
role-to-assume: ${{ secrets.BUILD_ROLE }}
186189
aws-region: ${{ inputs.aws_region }}
190+
role-duration-seconds: 900
191+
role-skip-session-tagging: true
187192

188193
- name: 🔄 Assume another IAM Role
189194
if: inputs.aws_assume_role_arn == 'true'
@@ -192,21 +197,6 @@ jobs:
192197
role-to-assume: '${{ inputs.aws_assume_role_arn }}'
193198
aws-region: ${{ inputs.aws_region }}
194199

195-
- name: 🔑 Configure AWS credentials with access keys
196-
if: inputs.aws_auth_method == 'keys'
197-
env:
198-
AWS_ACCESS_KEY_ID: '${{ secrets.AWS_ACCESS_KEY_ID }}'
199-
AWS_SECRET_ACCESS_KEY: '${{ secrets.AWS_SECRET_ACCESS_KEY }}'
200-
AWS_SESSION_TOKEN: '${{ secrets.AWS_SESSION_TOKEN }}'
201-
AWS_REGION: ${{ inputs.aws_region }}
202-
run: |
203-
aws configure set aws_access_key_id $AWS_ACCESS_KEY_ID
204-
aws configure set aws_secret_access_key $AWS_SECRET_ACCESS_KEY
205-
if [[ -n "$AWS_SESSION_TOKEN" ]]; then
206-
aws configure set aws_session_token $AWS_SESSION_TOKEN
207-
fi
208-
aws configure set region $AWS_REGION
209-
210200
- name: 🌎 Set environment variables
211201
run: |
212202
echo "AWS_DEFAULT_REGION=${{ inputs.aws_region }}" >> $GITHUB_ENV

0 commit comments

Comments
 (0)