@@ -3780,23 +3780,6 @@ functions:
3780
3780
# - signature_tag (either 'signed' or 'unsigned')
3781
3781
# ##
3782
3782
add_crypt_shared_and_sbom :
3783
- - command : ec2.assume_role
3784
- display_name : Assume IAM role with permissions to pull Kondukto API token
3785
- params :
3786
- role_arn : ${kondukto_role_arn}
3787
- - command : shell.exec
3788
- display_name : Pull Kondukto API token from AWS Secrets Manager and write it to file
3789
- params :
3790
- silent : true
3791
- shell : bash
3792
- working_dir : src
3793
- include_expansions_in_env : [AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_SESSION_TOKEN]
3794
- script : |
3795
- set -e
3796
- # use AWS CLI to get the Kondukto API token from AWS Secrets Manager
3797
- kondukto_token=$(aws secretsmanager get-secret-value --secret-id "kondukto-token" --region "us-east-1" --query 'SecretString' --output text)
3798
- # set the KONDUKTO_TOKEN environment variable
3799
- echo "KONDUKTO_TOKEN=$kondukto_token" > /tmp/kondukto_credentials.env
3800
3783
- command : subprocess.exec
3801
3784
params :
3802
3785
working_dir : src
@@ -3808,7 +3791,9 @@ functions:
3808
3791
ARTIFACTORY_USERNAME : ${artifactory_username}
3809
3792
ARTIFACTORY_PASSWORD : ${artifactory_password}
3810
3793
# for Silk SBOM integration
3811
- KONDUKTO_BRANCH : ${branch_name}_${executable_os_id}
3794
+ SILK_ASSET_GROUP : mongosh-${executable_os_id}
3795
+ SILK_CLIENT_ID : ${silk_client_id}
3796
+ SILK_CLIENT_SECRET : ${silk_client_secret}
3812
3797
create_static_analysis_report :
3813
3798
- command : s3.get
3814
3799
params :
0 commit comments