@@ -65,13 +65,31 @@ jobs:
6565 with :
6666 platforms : arm64
6767
68+ - name : Azure login
69+ uses : azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
70+ with :
71+ client-id : ${{ secrets.AZURE_VAULT_CLIENT_ID }}
72+ tenant-id : ${{ secrets.AZURE_VAULT_TENANT_ID }}
73+ subscription-id : ${{ secrets.AZURE_VAULT_SUBSCRIPTION_ID }}
74+
75+ - name : Setup secrets
76+ id : secrets
77+ run : |
78+ echo "Setting secrets for job"
79+ GCR_WORKLOAD_ID=$(az keyvault secret show --name gcr-workload-identity --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
80+ echo "::add-mask::$GCR_WORKLOAD_ID"
81+ echo "GCR_WORKLOAD_ID=$GCR_WORKLOAD_ID" >> $GITHUB_OUTPUT
82+ GCR_SERVICE_ACCOUNT=$(az keyvault secret show --name kic-pipeline-gcr-sa --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
83+ echo "::add-mask::$GCR_SERVICE_ACCOUNT"
84+ echo "GCR_SERVICE_ACCOUNT=$GCR_SERVICE_ACCOUNT" >> $GITHUB_OUTPUT
85+
6886 - name : Authenticate to Google Cloud
6987 id : auth
7088 uses : google-github-actions/auth@7c6bc770dae815cd3e89ee6cdf493a5fab2cc093 # v3.0.0
7189 with :
7290 token_format : access_token
73- workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
74- service_account : ${{ secrets.GCR_SERVICE_ACCOUNT }}
91+ workload_identity_provider : ${{ steps. secrets.outputs.GCR_WORKLOAD_ID }}
92+ service_account : ${{ steps. secrets.outputs .GCR_SERVICE_ACCOUNT }}
7593
7694 - name : Login to GCR
7795 uses : docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
@@ -122,6 +140,24 @@ jobs:
122140 - name : Checkout Repository
123141 uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
124142
143+ - name : Azure login
144+ uses : azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
145+ with :
146+ client-id : ${{ secrets.AZURE_VAULT_CLIENT_ID }}
147+ tenant-id : ${{ secrets.AZURE_VAULT_TENANT_ID }}
148+ subscription-id : ${{ secrets.AZURE_VAULT_SUBSCRIPTION_ID }}
149+
150+ - name : Setup secrets
151+ id : secrets
152+ run : |
153+ echo "Setting secrets for job"
154+ GCR_WORKLOAD_ID=$(az keyvault secret show --name gcr-workload-identity --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
155+ echo "::add-mask::$GCR_WORKLOAD_ID"
156+ echo "GCR_WORKLOAD_ID=$GCR_WORKLOAD_ID" >> $GITHUB_OUTPUT
157+ GCR_SERVICE_ACCOUNT=$(az keyvault secret show --name kic-pipeline-gcr-sa --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
158+ echo "::add-mask::$GCR_SERVICE_ACCOUNT"
159+ echo "GCR_SERVICE_ACCOUNT=$GCR_SERVICE_ACCOUNT" >> $GITHUB_OUTPUT
160+
125161 - name : Docker Buildx
126162 uses : docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
127163
@@ -135,8 +171,8 @@ jobs:
135171 uses : google-github-actions/auth@7c6bc770dae815cd3e89ee6cdf493a5fab2cc093 # v3.0.0
136172 with :
137173 token_format : access_token
138- workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
139- service_account : ${{ secrets.GCR_SERVICE_ACCOUNT }}
174+ workload_identity_provider : ${{ steps. secrets.outputs.GCR_WORKLOAD_ID }}
175+ service_account : ${{ steps. secrets.outputs .GCR_SERVICE_ACCOUNT }}
140176
141177 - name : Login to GCR
142178 uses : docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
@@ -190,6 +226,24 @@ jobs:
190226 - name : Checkout Repository
191227 uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
192228
229+ - name : Azure login
230+ uses : azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
231+ with :
232+ client-id : ${{ secrets.AZURE_VAULT_CLIENT_ID }}
233+ tenant-id : ${{ secrets.AZURE_VAULT_TENANT_ID }}
234+ subscription-id : ${{ secrets.AZURE_VAULT_SUBSCRIPTION_ID }}
235+
236+ - name : Setup secrets
237+ id : secrets
238+ run : |
239+ echo "Setting secrets for job"
240+ GCR_WORKLOAD_ID=$(az keyvault secret show --name gcr-workload-identity --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
241+ echo "::add-mask::$GCR_WORKLOAD_ID"
242+ echo "GCR_WORKLOAD_ID=$GCR_WORKLOAD_ID" >> $GITHUB_OUTPUT
243+ GCR_SERVICE_ACCOUNT=$(az keyvault secret show --name kic-pipeline-gcr-sa --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
244+ echo "::add-mask::$GCR_SERVICE_ACCOUNT"
245+ echo "GCR_SERVICE_ACCOUNT=$GCR_SERVICE_ACCOUNT" >> $GITHUB_OUTPUT
246+
193247 - name : Docker Buildx
194248 uses : docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
195249
@@ -198,8 +252,8 @@ jobs:
198252 uses : google-github-actions/auth@7c6bc770dae815cd3e89ee6cdf493a5fab2cc093 # v3.0.0
199253 with :
200254 token_format : access_token
201- workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
202- service_account : ${{ secrets.GCR_SERVICE_ACCOUNT }}
255+ workload_identity_provider : ${{ steps. secrets.outputs.GCR_WORKLOAD_ID }}
256+ service_account : ${{ steps. secrets.outputs .GCR_SERVICE_ACCOUNT }}
203257
204258 - name : Login to GCR
205259 uses : docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
0 commit comments