1
+ permissions : write-all # Equivalent to default permissions plus id-token: write
2
+ env :
3
+ ESC_ACTION_OIDC_AUTH : true
4
+ ESC_ACTION_OIDC_ORGANIZATION : pulumi
5
+ ESC_ACTION_OIDC_REQUESTED_TOKEN_TYPE : urn:pulumi:token-type:access_token:organization
6
+ ESC_ACTION_ENVIRONMENT : imports/github-secrets
7
+ ESC_ACTION_EXPORT_ENVIRONMENT_VARIABLES : false
1
8
name : Test examples
2
9
on :
3
10
pull_request :
18
25
id-token : write
19
26
contents : read
20
27
steps :
28
+ - name : Fetch secrets from ESC
29
+ id : esc-secrets
30
+ uses : pulumi/esc-action@v1
21
31
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
22
32
23
33
- name : Set up the environment
26
36
with :
27
37
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
28
38
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
29
- aws-role-to-assume : ${{ secrets.AWS_CI_ROLE_ARN }}
39
+ aws-role-to-assume : ${{ steps.esc- secrets.outputs .AWS_CI_ROLE_ARN }}
30
40
github-token : ${{ secrets.GITHUB_TOKEN }}
31
41
32
42
- name : Lint
40
50
id-token : write
41
51
contents : read
42
52
steps :
53
+ - name : Fetch secrets from ESC
54
+ id : esc-secrets
55
+ uses : pulumi/esc-action@v1
43
56
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
44
57
45
58
- name : Set up the environment
48
61
with :
49
62
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
50
63
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
51
- aws-role-to-assume : ${{ secrets.AWS_CI_ROLE_ARN }}
64
+ aws-role-to-assume : ${{ steps.esc- secrets.outputs .AWS_CI_ROLE_ARN }}
52
65
github-token : ${{ secrets.GITHUB_TOKEN }}
53
66
54
67
- name : unit tests
70
83
- name : Set up Python
71
84
uses : actions/setup-python@a26af69be951a213d495a4c3e4e4022e16d87065 # v5
72
85
with :
73
- python-version : 3.9 # Adjust the version as needed
86
+ python-version : 3.9 # Adjust the version as needed
74
87
75
88
# Step 3: Install Make (already installed on Ubuntu, but explicit just in case)
76
89
- name : Ensure Make is Installed
90
103
id-token : write
91
104
contents : read
92
105
steps :
106
+ - name : Fetch secrets from ESC
107
+ id : esc-secrets
108
+ uses : pulumi/esc-action@v1
93
109
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
94
110
95
111
- name : Set up the environment
98
114
with :
99
115
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
100
116
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
101
- aws-role-to-assume : ${{ secrets.AWS_CI_ROLE_ARN }}
117
+ aws-role-to-assume : ${{ steps.esc- secrets.outputs .AWS_CI_ROLE_ARN }}
102
118
github-token : ${{ secrets.GITHUB_TOKEN }}
103
119
104
120
- name : unit tests
@@ -114,6 +130,9 @@ jobs:
114
130
id-token : write
115
131
contents : read
116
132
steps :
133
+ - name : Fetch secrets from ESC
134
+ id : esc-secrets
135
+ uses : pulumi/esc-action@v1
117
136
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
118
137
119
138
- name : Set up the environment
@@ -122,7 +141,7 @@ jobs:
122
141
with :
123
142
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
124
143
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
125
- aws-role-to-assume : ${{ secrets.AWS_CI_ROLE_ARN }}
144
+ aws-role-to-assume : ${{ steps.esc- secrets.outputs .AWS_CI_ROLE_ARN }}
126
145
github-token : ${{ secrets.GITHUB_TOKEN }}
127
146
128
147
- name : unit tests
@@ -136,6 +155,9 @@ jobs:
136
155
id-token : write
137
156
contents : read
138
157
steps :
158
+ - name : Fetch secrets from ESC
159
+ id : esc-secrets
160
+ uses : pulumi/esc-action@v1
139
161
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
140
162
141
163
- name : Set up the environment
@@ -144,7 +166,7 @@ jobs:
144
166
with :
145
167
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
146
168
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
147
- aws-role-to-assume : ${{ secrets.AWS_CI_ROLE_ARN }}
169
+ aws-role-to-assume : ${{ steps.esc- secrets.outputs .AWS_CI_ROLE_ARN }}
148
170
github-token : ${{ secrets.GITHUB_TOKEN }}
149
171
150
172
- name : unit tests
@@ -169,13 +191,16 @@ jobs:
169
191
170
192
steps :
171
193
# Run as first step so we don't delete things that have just been installed
194
+ - name : Fetch secrets from ESC
195
+ id : esc-secrets
196
+ uses : pulumi/esc-action@v1
172
197
- name : Free Disk Space (Ubuntu)
173
198
uses : jlumbroso/free-disk-space@54081f138730dfa15788a46383842cd2f914a1be # v1.3.1
174
199
with :
175
200
tool-cache : false
176
201
swap-storage : false
177
202
dotnet : false
178
-
203
+
179
204
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
180
205
181
206
- name : Set up the environment
@@ -184,7 +209,7 @@ jobs:
184
209
with :
185
210
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
186
211
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
187
- aws-role-to-assume : ${{ secrets.AWS_CI_ROLE_ARN }}
212
+ aws-role-to-assume : ${{ steps.esc- secrets.outputs .AWS_CI_ROLE_ARN }}
188
213
github-token : ${{ secrets.GITHUB_TOKEN }}
189
214
190
215
- name : Run tests
@@ -194,20 +219,20 @@ jobs:
194
219
AWS_SECRET_ACCESS_KEY : ${{ steps.setup.outputs.aws-secret-access-key }}
195
220
AWS_SESSION_TOKEN : ${{ steps.setup.outputs.aws-session-token }}
196
221
AWS_REGION : ${{ steps.setup.outputs.aws-region }}
197
- ARM_CLIENT_ID : ${{ secrets.ARM_CLIENT_ID }}
198
- ARM_CLIENT_SECRET : ${{ secrets.ARM_CLIENT_SECRET }}
222
+ ARM_CLIENT_ID : ${{ steps.esc- secrets.outputs .ARM_CLIENT_ID }}
223
+ ARM_CLIENT_SECRET : ${{ steps.esc- secrets.outputs .ARM_CLIENT_SECRET }}
199
224
ARM_ENVIRONMENT : public
200
225
ARM_LOCATION : westus
201
- ARM_SUBSCRIPTION_ID : ${{ secrets.ARM_SUBSCRIPTION_ID }}
202
- ARM_TENANT_ID : ${{ secrets.ARM_TENANT_ID }}
226
+ ARM_SUBSCRIPTION_ID : ${{ steps.esc- secrets.outputs .ARM_SUBSCRIPTION_ID }}
227
+ ARM_TENANT_ID : ${{ steps.esc- secrets.outputs .ARM_TENANT_ID }}
203
228
GOOGLE_PROJECT : ${{ steps.setup.outputs.google-project-name }}
204
229
GOOGLE_REGION : ${{ steps.setup.outputs.google-region }}
205
230
GOOGLE_ZONE : ${{ steps.setup.outputs.google-zone }}
206
- DIGITALOCEAN_TOKEN : ${{ secrets.DIGITALOCEAN_TOKEN }}
207
- PACKET_AUTH_TOKEN : ${{ secrets.PACKET_AUTH_TOKEN }}
208
- PULUMI_ACCESS_TOKEN : ${{ secrets.PULUMI_ACCESS_TOKEN }}
231
+ DIGITALOCEAN_TOKEN : ${{ steps.esc- secrets.outputs .DIGITALOCEAN_TOKEN }}
232
+ PACKET_AUTH_TOKEN : ${{ steps.esc- secrets.outputs .PACKET_AUTH_TOKEN }}
233
+ PULUMI_ACCESS_TOKEN : ${{ steps.esc- secrets.outputs .PULUMI_ACCESS_TOKEN }}
209
234
PULUMI_API : https://api.pulumi-staging.io
210
- SLACK_WEBHOOK_URL : ${{ secrets.SLACK_WEBHOOK_URL }}
235
+ SLACK_WEBHOOK_URL : ${{ steps.esc- secrets.outputs .SLACK_WEBHOOK_URL }}
211
236
212
237
strategy :
213
238
fail-fast : false
@@ -236,6 +261,9 @@ jobs:
236
261
contents : read
237
262
238
263
steps :
264
+ - name : Fetch secrets from ESC
265
+ id : esc-secrets
266
+ uses : pulumi/esc-action@v1
239
267
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
240
268
241
269
- name : Set up the environment
@@ -244,7 +272,7 @@ jobs:
244
272
with :
245
273
aws-access-key-id : ${{ secrets.AWS_ACCESS_KEY_ID }}
246
274
aws-secret-access-key : ${{ secrets.AWS_SECRET_ACCESS_KEY }}
247
- aws-role-to-assume : ${{ secrets.AWS_CI_ROLE_ARN }}
275
+ aws-role-to-assume : ${{ steps.esc- secrets.outputs .AWS_CI_ROLE_ARN }}
248
276
github-token : ${{ secrets.GITHUB_TOKEN }}
249
277
250
278
- name : Set up Minikube
@@ -281,6 +309,6 @@ jobs:
281
309
AWS_SECRET_ACCESS_KEY : ${{ steps.setup.outputs.aws-secret-access-key }}
282
310
AWS_SESSION_TOKEN : ${{ steps.setup.outputs.aws-session-token }}
283
311
AWS_REGION : ${{ steps.setup.outputs.aws-region }}
284
- PULUMI_ACCESS_TOKEN : ${{ secrets.PULUMI_ACCESS_TOKEN }}
312
+ PULUMI_ACCESS_TOKEN : ${{ steps.esc- secrets.outputs .PULUMI_ACCESS_TOKEN }}
285
313
PULUMI_API : https://api.pulumi-staging.io
286
314
INFRA_STACK_NAME : ${{ github.sha }}-${{ github.run_number }}
0 commit comments