@@ -3780,23 +3780,6 @@ functions:
37803780 # - signature_tag (either 'signed' or 'unsigned')
37813781 # ##
37823782 add_crypt_shared_and_sbom :
3783- - command : ec2.assume_role
3784- display_name : Assume IAM role with permissions to pull Kondukto API token
3785- params :
3786- role_arn : ${kondukto_role_arn}
3787- - command : shell.exec
3788- display_name : Pull Kondukto API token from AWS Secrets Manager and write it to file
3789- params :
3790- silent : true
3791- shell : bash
3792- working_dir : src
3793- include_expansions_in_env : [AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_SESSION_TOKEN]
3794- script : |
3795- set -e
3796- # use AWS CLI to get the Kondukto API token from AWS Secrets Manager
3797- kondukto_token=$(aws secretsmanager get-secret-value --secret-id "kondukto-token" --region "us-east-1" --query 'SecretString' --output text)
3798- # set the KONDUKTO_TOKEN environment variable
3799- echo "KONDUKTO_TOKEN=$kondukto_token" > /tmp/kondukto_credentials.env
38003783 - command : subprocess.exec
38013784 params :
38023785 working_dir : src
@@ -3808,7 +3791,9 @@ functions:
38083791 ARTIFACTORY_USERNAME : ${artifactory_username}
38093792 ARTIFACTORY_PASSWORD : ${artifactory_password}
38103793 # for Silk SBOM integration
3811- KONDUKTO_BRANCH : ${branch_name}_${executable_os_id}
3794+ SILK_ASSET_GROUP : mongosh-${executable_os_id}
3795+ SILK_CLIENT_ID : ${silk_client_id}
3796+ SILK_CLIENT_SECRET : ${silk_client_secret}
38123797 create_static_analysis_report :
38133798 - command : s3.get
38143799 params :
0 commit comments