@@ -127,13 +127,33 @@ jobs:
127127 key : nginx-ingress-${{ steps.vars.outputs.go_code_md5 }}
128128 lookup-only : true
129129
130+ - name : Azure login
131+ uses : azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
132+ with :
133+ client-id : ${{ secrets.AZURE_VAULT_CLIENT_ID }}
134+ tenant-id : ${{ secrets.AZURE_VAULT_TENANT_ID }}
135+ subscription-id : ${{ secrets.AZURE_VAULT_SUBSCRIPTION_ID }}
136+ if : ${{ steps.vars.outputs.forked_workflow == 'false' }}
137+
138+ - name : Setup secrets
139+ id : secrets
140+ run : |
141+ echo "Setting secrets for job"
142+ GCR_WORKLOAD_ID=$(az keyvault secret show --name gcr-workload-identity --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
143+ echo "::add-mask::$GCR_WORKLOAD_ID"
144+ echo "GCR_WORKLOAD_ID=$GCR_WORKLOAD_ID" >> $GITHUB_OUTPUT
145+ GCR_SERVICE_ACCOUNT=$(az keyvault secret show --name kic-pipeline-gcr-sa --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
146+ echo "::add-mask::$GCR_SERVICE_ACCOUNT"
147+ echo "GCR_SERVICE_ACCOUNT=$GCR_SERVICE_ACCOUNT" >> $GITHUB_OUTPUT
148+ if : ${{ steps.vars.outputs.forked_workflow == 'false' }}
149+
130150 - name : Authenticate to Google Cloud
131151 id : auth
132152 uses : google-github-actions/auth@7c6bc770dae815cd3e89ee6cdf493a5fab2cc093 # v3.0.0
133153 with :
134154 token_format : access_token
135- workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
136- service_account : ${{ secrets.GCR_SERVICE_ACCOUNT }}
155+ workload_identity_provider : ${{ steps. secrets.outputs.GCR_WORKLOAD_ID }}
156+ service_account : ${{ steps. secrets.outputs .GCR_SERVICE_ACCOUNT }}
137157 if : ${{ steps.vars.outputs.forked_workflow == 'false' }}
138158
139159 - name : Login to GCR
@@ -366,13 +386,33 @@ jobs:
366386 platforms : arm64
367387 if : ${{ needs.checks.outputs.forked_workflow == 'false' || needs.checks.outputs.docs_only == 'false' }}
368388
389+ - name : Azure login
390+ uses : azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
391+ with :
392+ client-id : ${{ secrets.AZURE_VAULT_CLIENT_ID }}
393+ tenant-id : ${{ secrets.AZURE_VAULT_TENANT_ID }}
394+ subscription-id : ${{ secrets.AZURE_VAULT_SUBSCRIPTION_ID }}
395+ if : ${{ needs.checks.outputs.forked_workflow == 'false' || needs.checks.outputs.docs_only == 'false' }}
396+
397+ - name : Setup secrets
398+ id : secrets
399+ run : |
400+ echo "Setting secrets for job"
401+ GCR_WORKLOAD_ID=$(az keyvault secret show --name gcr-workload-identity --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
402+ echo "::add-mask::$GCR_WORKLOAD_ID"
403+ echo "GCR_WORKLOAD_ID=$GCR_WORKLOAD_ID" >> $GITHUB_OUTPUT
404+ GCR_SERVICE_ACCOUNT=$(az keyvault secret show --name kic-pipeline-gcr-sa --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
405+ echo "::add-mask::$GCR_SERVICE_ACCOUNT"
406+ echo "GCR_SERVICE_ACCOUNT=$GCR_SERVICE_ACCOUNT" >> $GITHUB_OUTPUT
407+ if : ${{ needs.checks.outputs.forked_workflow == 'false' || needs.checks.outputs.docs_only == 'false' }}
408+
369409 - name : Authenticate to Google Cloud
370410 id : auth
371411 uses : google-github-actions/auth@7c6bc770dae815cd3e89ee6cdf493a5fab2cc093 # v3.0.0
372412 with :
373413 token_format : access_token
374- workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
375- service_account : ${{ secrets.GCR_SERVICE_ACCOUNT }}
414+ workload_identity_provider : ${{ steps. secrets.outputs.GCR_WORKLOAD_ID }}
415+ service_account : ${{ steps. secrets.outputs .GCR_SERVICE_ACCOUNT }}
376416 if : ${{ needs.checks.outputs.forked_workflow == 'false' || needs.checks.outputs.docs_only == 'false' }}
377417
378418 - name : Login to GCR
@@ -436,13 +476,33 @@ jobs:
436476 with :
437477 version : ' v3.18.6'
438478
479+ - name : Azure login
480+ uses : azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
481+ with :
482+ client-id : ${{ secrets.AZURE_VAULT_CLIENT_ID }}
483+ tenant-id : ${{ secrets.AZURE_VAULT_TENANT_ID }}
484+ subscription-id : ${{ secrets.AZURE_VAULT_SUBSCRIPTION_ID }}
485+ if : ${{ needs.checks.outputs.forked_workflow != 'true' }}
486+
487+ - name : Setup secrets
488+ id : secrets
489+ run : |
490+ echo "Setting secrets for job"
491+ GCR_WORKLOAD_ID=$(az keyvault secret show --name gcr-workload-identity --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
492+ echo "::add-mask::$GCR_WORKLOAD_ID"
493+ echo "GCR_WORKLOAD_ID=$GCR_WORKLOAD_ID" >> $GITHUB_OUTPUT
494+ GCR_SERVICE_ACCOUNT=$(az keyvault secret show --name kic-pipeline-gcr-sa --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
495+ echo "::add-mask::$GCR_SERVICE_ACCOUNT"
496+ echo "GCR_SERVICE_ACCOUNT=$GCR_SERVICE_ACCOUNT" >> $GITHUB_OUTPUT
497+ if : ${{ needs.checks.outputs.forked_workflow != 'true' }}
498+
439499 - name : Authenticate to Google Cloud
440500 id : auth
441501 uses : google-github-actions/auth@7c6bc770dae815cd3e89ee6cdf493a5fab2cc093 # v3.0.0
442502 with :
443503 token_format : access_token
444- workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
445- service_account : ${{ secrets.GCR_SERVICE_ACCOUNT }}
504+ workload_identity_provider : ${{ steps. secrets.outputs.GCR_WORKLOAD_ID }}
505+ service_account : ${{ steps. secrets.outputs .GCR_SERVICE_ACCOUNT }}
446506 if : ${{ needs.checks.outputs.forked_workflow == 'false' || needs.checks.outputs.docs_only == 'false' }}
447507
448508 - name : Login to GCR
@@ -576,13 +636,33 @@ jobs:
576636 - name : Docker Buildx
577637 uses : docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
578638
639+ - name : Azure login
640+ uses : azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
641+ with :
642+ client-id : ${{ secrets.AZURE_VAULT_CLIENT_ID }}
643+ tenant-id : ${{ secrets.AZURE_VAULT_TENANT_ID }}
644+ subscription-id : ${{ secrets.AZURE_VAULT_SUBSCRIPTION_ID }}
645+ if : ${{ needs.checks.outputs.forked_workflow == 'false' || needs.checks.outputs.docs_only == 'false' }}
646+
647+ - name : Setup secrets
648+ id : secrets
649+ run : |
650+ echo "Setting secrets for job"
651+ GCR_WORKLOAD_ID=$(az keyvault secret show --name gcr-workload-identity --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
652+ echo "::add-mask::$GCR_WORKLOAD_ID"
653+ echo "GCR_WORKLOAD_ID=$GCR_WORKLOAD_ID" >> $GITHUB_OUTPUT
654+ GCR_SERVICE_ACCOUNT=$(az keyvault secret show --name kic-pipeline-gcr-sa --vault-name ${{ secrets.NIC_KEYVAULT_NAME }} --query value -o tsv)
655+ echo "::add-mask::$GCR_SERVICE_ACCOUNT"
656+ echo "GCR_SERVICE_ACCOUNT=$GCR_SERVICE_ACCOUNT" >> $GITHUB_OUTPUT
657+ if : ${{ needs.checks.outputs.forked_workflow == 'false' || needs.checks.outputs.docs_only == 'false' }}
658+
579659 - name : Authenticate to Google Cloud
580660 id : auth
581661 uses : google-github-actions/auth@7c6bc770dae815cd3e89ee6cdf493a5fab2cc093 # v3.0.0
582662 with :
583663 token_format : access_token
584- workload_identity_provider : ${{ secrets.GCR_WORKLOAD_IDENTITY }}
585- service_account : ${{ secrets.GCR_SERVICE_ACCOUNT }}
664+ workload_identity_provider : ${{ steps. secrets.outputs.GCR_WORKLOAD_ID }}
665+ service_account : ${{ steps. secrets.outputs .GCR_SERVICE_ACCOUNT }}
586666 if : ${{ needs.checks.outputs.forked_workflow == 'false' && needs.checks.outputs.docs_only == 'false' }}
587667
588668 - name : Login to GCR
0 commit comments