Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Copy workflow for OCB components test and tagging from aws-ocb-dev branch #264

Merged
merged 1 commit into from
Dec 6, 2024

Conversation

jj22ee
Copy link

@jj22ee jj22ee commented Dec 5, 2024

Description:

Copy workflow for OCB components to the default branch from aws-ocb-dev branch in order to execute workflow dispatch in https://github.com/amazon-contributing/opentelemetry-collector-contrib/actions

  • The workflow checks out the aws-ocb-dev branch

Link to tracking Issue:

Testing:

Documentation:

Copy link
Collaborator

@mxiamxia mxiamxia left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@v4
with:
role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ secrets.E2E_TEST_ROLE_NAME }}

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why do this a 2nd time? Are we using one acct role to assume to another acct role? Curious what the overall setup here is.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are we using one acct role to assume to another acct role

Yes. We can workaround this by just adding the 2nd's account's role as another secret, but currently we re-use the existing secret of the 1st account to minimize the number of secrets we add to this repo. BTW the 1st account is currently being used to run the e2e test in the release workflow.

@mxiamxia mxiamxia merged commit 66e9942 into amazon-contributing:aws-cwa-dev Dec 6, 2024
139 of 146 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants