|
12 | 12 | env:
|
13 | 13 | REGION: us-east-1
|
14 | 14 | ECR_REGISTRY_ID: 553885929720
|
15 |
| - AWS_ASSUMED_ROLE_ARN: arn:aws:iam::553885929720:role/tf_nodereal_prod_ecr_cicd_deployment_assume_role |
16 | 15 | # Notice: must modify here to fit your service config path
|
17 | 16 | GIT_SYNC_PATH: qa/gitops/qa-us/demo-app/values.yaml
|
18 | 17 | TAG_FIELD: .image.tag
|
19 | 18 |
|
20 | 19 | jobs:
|
21 | 20 | CI:
|
22 |
| - runs-on: [self-hosted,qa-infra-k8s] |
| 21 | + runs-on: [self-hosted,prod-cicd-runners] |
23 | 22 | steps:
|
24 | 23 | - uses: actions/checkout@v3
|
25 | 24 | # - uses: actions/setup-go@v3
|
|
30 | 29 | # with:
|
31 | 30 | # # Optional: version of golangci-lint to use in form of v1.2 or v1.2.3 or `latest` to use the latest version
|
32 | 31 | # version: v1.45.2
|
33 |
| - - name: aws assume role |
34 |
| - id: aws-assume-role |
35 |
| - run: | |
36 |
| - UUID=$(cat /proc/sys/kernel/random/uuid) |
37 |
| - OUT=$(aws sts assume-role --role-arn $AWS_ASSUMED_ROLE_ARN --role-session-name $UUID) |
38 |
| - echo ::set-output name=aws_access_key_id::"$(echo $OUT | jq -r '.Credentials''.AccessKeyId')" |
39 |
| - echo ::set-output name=aws_secret_key::"$(echo $OUT | jq -r '.Credentials''.SecretAccessKey')" |
40 |
| - echo ::set-output name=aws_sessions_token::"$(echo $OUT | jq -r '.Credentials''.SessionToken')" |
41 | 32 | - name: Build, tag, and push image to Amazon ECR
|
42 |
| - env: |
43 |
| - AWS_ACCESS_KEY_ID: ${{ steps.aws-assume-role.outputs.aws_access_key_id }} |
44 |
| - AWS_SECRET_ACCESS_KEY: ${{ steps.aws-assume-role.outputs.aws_secret_key }} |
45 |
| - AWS_SESSION_TOKEN: ${{ steps.aws-assume-role.outputs.aws_sessions_token }} |
46 | 33 | run: |
|
47 | 34 | aws ecr get-login-password --region ${REGION} | docker login --username AWS --password-stdin ${ECR_REGISTRY_ID}.dkr.ecr.${REGION}.amazonaws.com
|
48 |
| - aws ecr --region $REGION describe-repositories --registry-id $ECR_REGISTRY_ID --repository-names ${GITHUB_REPOSITORY#*/} || aws ecr --region $REGION create-repository --registry-id $ECR_REGISTRY_ID --repository-name ${GITHUB_REPOSITORY#*/} |
49 |
| - aws ecr --region $REGION set-repository-policy --registry-id $ECR_REGISTRY_ID --repository-name ${GITHUB_REPOSITORY#*/} --policy-text file:///home/runner/repo-access-permissions.json |
50 | 35 | docker build -t ${ECR_REGISTRY_ID}.dkr.ecr.${REGION}.amazonaws.com/${GITHUB_REPOSITORY#*/}:${GITHUB_SHA} .
|
51 | 36 | docker push ${ECR_REGISTRY_ID}.dkr.ecr.${REGION}.amazonaws.com/${GITHUB_REPOSITORY#*/}:${GITHUB_SHA}
|
52 | 37 | # CD:
|
|
0 commit comments