Skip to content

Commit ff1db45

Browse files
STG to PROD
Merge pull request #26 from KeyValueSoftwareSystems/stg
2 parents 3a08c55 + 18dcd06 commit ff1db45

File tree

10 files changed

+204
-164
lines changed

10 files changed

+204
-164
lines changed

.github/workflows/cd-server.yaml

Lines changed: 65 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -15,28 +15,31 @@ on:
1515
required: true
1616
type: string
1717
description: Provide tag (Eg:v3.14.0)
18-
18+
permissions:
19+
id-token: write
20+
contents: write
21+
packages: read
22+
actions: read
1923
env:
20-
SERVICE_NAME: conductor-server
24+
SERVICE_NAME: conductor
2125
AWS_REGION: "ap-south-1"
22-
26+
HELM_CHART_NAME: "application-helm-chart"
2327

2428
jobs:
2529
prepare-env:
2630
name: Prepare Env
27-
runs-on: 'ubuntu-latest'
31+
runs-on: "ubuntu-latest"
2832
timeout-minutes: 2
2933
outputs:
3034
AWS_ROLE: ${{ steps.vars.outputs.AWS_ROLE }}
3135
ENV: ${{ steps.vars.outputs.ENV }}
3236
PROJECT_PREFIX: ${{ steps.vars.outputs.PROJECT_PREFIX }}
33-
ECS_CLUSTER: ${{ steps.set_env.outputs.ECS_CLUSTER }}
34-
ECS_SERVICE: ${{ steps.set_env.outputs.ECS_SERVICE }}
35-
TASK_DEFINITION: ${{ steps.set_env.outputs.TASK_DEFINITION }}
36-
CONTAINER_NAME: ${{ steps.set_env.outputs.CONTAINER_NAME }}
37+
K8S_CLUSTER: ${{ steps.vars.outputs.K8S_CLUSTER }}
3738
ECR_REPOSITORY: ${{ steps.set_env.outputs.ECR_REPOSITORY }}
39+
ENVIRONMENT_BUCKET: ${{ steps.set_env.outputs.ENVIRONMENT_BUCKET }}
3840
SLACK_WEBHOOK_URL: ${{ steps.vars.outputs.SLACK_WEBHOOK_URL }}
39-
41+
AWS_ACCOUNT_ID: ${{ steps.vars.outputs.AWS_ACCOUNT_ID}}
42+
4043
steps:
4144
- id: vars
4245
shell: bash
@@ -45,7 +48,7 @@ jobs:
4548
ENV=${{ github.event.inputs.environment }}
4649
IMAGE_TAG=${{ github.event.inputs.tag }}
4750
echo $BRANCH
48-
51+
4952
if [ -z "$ENV" ]
5053
then
5154
case $BRANCH in
@@ -67,17 +70,23 @@ jobs:
6770
then
6871
echo "AWS_ROLE=PRD_AWS_ROLE" >> $GITHUB_OUTPUT
6972
echo "PROJECT_PREFIX=sirn-prd-mb" >> $GITHUB_OUTPUT
70-
echo "SLACK_WEBHOOK_URL=PRD_SLACK_WEBHOOK_URL" >> $GITHUB_OUTPUT
73+
echo "SLACK_WEBHOOK_URL=PRD_SLACK_WEBHOOK_URL" >> $GITHUB_OUTPUT
74+
echo "AWS_ACCOUNT_ID=PRD_AWS_ACCOUNT_ID" >> $GITHUB_OUTPUT
75+
echo "K8S_CLUSTER=sirn-prd-mb-prime" >> $GITHUB_OUTPUT
7176
elif [ $ENV == 'stg' ]
7277
then
7378
echo "AWS_ROLE=STG_AWS_ROLE" >> $GITHUB_OUTPUT
7479
echo "PROJECT_PREFIX=sirn-stg-mb" >> $GITHUB_OUTPUT
75-
echo "SLACK_WEBHOOK_URL=DEV_SLACK_WEBHOOK_URL" >> $GITHUB_OUTPUT
80+
echo "SLACK_WEBHOOK_URL=DEV_SLACK_WEBHOOK_URL" >> $GITHUB_OUTPUT
81+
echo "AWS_ACCOUNT_ID=NON_PRD_AWS_ACCOUNT_ID" >> $GITHUB_OUTPUT
82+
echo "K8S_CLUSTER=sirn-dev-mb-prime" >> $GITHUB_OUTPUT
7683
elif [ $ENV == 'dev' ]
7784
then
7885
echo "AWS_ROLE=DEV_AWS_ROLE" >> $GITHUB_OUTPUT
7986
echo "PROJECT_PREFIX=sirn-dev-mb" >> $GITHUB_OUTPUT
8087
echo "SLACK_WEBHOOK_URL=DEV_SLACK_WEBHOOK_URL" >> $GITHUB_OUTPUT
88+
echo "AWS_ACCOUNT_ID=NON_PRD_AWS_ACCOUNT_ID" >> $GITHUB_OUTPUT
89+
echo "K8S_CLUSTER=sirn-dev-mb-prime" >> $GITHUB_OUTPUT
8190
else
8291
echo "Branch not configured!"
8392
exit 1
@@ -89,68 +98,65 @@ jobs:
8998
id: set_env
9099
run: |
91100
PROJECT_PREFIX=${{ steps.vars.outputs.PROJECT_PREFIX }}
92-
echo "ECR_REPOSITORY=$PROJECT_PREFIX-ecr-$SERVICE_NAME" >> $GITHUB_OUTPUT
93-
echo "ECS_CLUSTER=$PROJECT_PREFIX-ecs-cluster" >> $GITHUB_OUTPUT
94-
echo "ECS_SERVICE=$PROJECT_PREFIX-svc-$SERVICE_NAME" >> $GITHUB_OUTPUT
95-
echo "TASK_DEFINITION=$PROJECT_PREFIX-td-$SERVICE_NAME" >> $GITHUB_OUTPUT
96-
echo "CONTAINER_NAME=$PROJECT_PREFIX-cntr-$SERVICE_NAME" >> $GITHUB_OUTPUT
101+
echo "ENVIRONMENT_BUCKET=$PROJECT_PREFIX-s3-environment" >> $GITHUB_OUTPUT
97102
echo ":seedling: Branch:${GITHUB_REF#refs/heads/}" >> $GITHUB_STEP_SUMMARY
98-
103+
echo "ECR_REPOSITORY=$PROJECT_PREFIX-ecr-conductor-server" >> $GITHUB_OUTPUT
104+
99105
# Deploy Conductor UI Image to ECS
100-
deploy-server-image:
101-
name: Deploy Server Image
102-
runs-on: 'ubuntu-latest'
103-
timeout-minutes: 20
106+
deploy-to-k8s:
107+
name: Deploy to k8s
108+
runs-on: ubuntu-latest
109+
container:
110+
image: public.ecr.aws/kvsiren-dev/pipeline/helm-deploy:latest
111+
timeout-minutes: 15
104112
permissions:
105113
id-token: write
106114
pull-requests: write
107115
contents: read
108-
needs: prepare-env
116+
needs:
117+
- prepare-env
109118
env:
110-
AWS_ROLE: ${{ needs.prepare-env.outputs.AWS_ROLE }}
111-
ENV: ${{ needs.prepare-env.outputs.ENV }}
112-
PROJECT_PREFIX: ${{needs.prepare-env.outputs.PROJECT_PREFIX}}
113-
ECR_REPOSITORY: ${{needs.prepare-env.outputs.ECR_REPOSITORY}}
114-
IMAGE_TAG: ${{ github.event.inputs.tag }}
115-
ECS_CLUSTER: ${{ needs.prepare-env.outputs.ECS_CLUSTER }}
116-
ECS_SERVICE: ${{ needs.prepare-env.outputs.ECS_SERVICE }}
117-
TASK_DEFINITION: ${{ needs.prepare-env.outputs.TASK_DEFINITION }}
118-
CONTAINER_NAME: ${{ needs.prepare-env.outputs.CONTAINER_NAME }}
119-
119+
AWS_ACCOUNT_ID: ${{ needs.prepare-env.outputs.AWS_ACCOUNT_ID }}
120+
ECR_REPOSITORY: ${{ needs.prepare-env.outputs.ECR_REPOSITORY }}
120121
steps:
121122
- name: Checkout code from action
122123
uses: actions/checkout@v2
123124

125+
- name: Checkout values.yaml from siren-infra
126+
uses: actions/checkout@v4
127+
with:
128+
repository: KeyvalueSoftwareSystems/siren-infra
129+
ref: main
130+
token: ${{secrets.SIREN_PAT}}
131+
sparse-checkout: |
132+
k8s/siren-services/${{ env.SERVICE_NAME }}/${{ needs.prepare-env.outputs.ENV }}-values.yaml
133+
sparse-checkout-cone-mode: false
134+
135+
- name: Rename values.yaml for Helm
136+
shell: bash
137+
run: |
138+
cp k8s/siren-services/${{ env.SERVICE_NAME }}/${{ needs.prepare-env.outputs.ENV }}-values.yaml ./values.yaml
139+
cat ./values.yaml
140+
124141
- name: Configure AWS credentials
125142
uses: aws-actions/configure-aws-credentials@v4
126143
with:
127-
role-to-assume: ${{ secrets[env.AWS_ROLE] }}
144+
role-to-assume: arn:aws:iam::${{ vars[env.AWS_ACCOUNT_ID] }}:role/github-actions
128145
aws-region: ${{ env.AWS_REGION }}
129146

130-
- name: Amazon ECR Login
131-
id: login-ecr
132-
uses: aws-actions/amazon-ecr-login@v1.7.0
147+
- name: Deploy to Kubernetes
148+
shell: bash
149+
run: |
150+
aws eks update-kubeconfig --name ${{ needs.prepare-env.outputs.K8S_CLUSTER }}
151+
aws ecr get-login-password --region ${{ env.AWS_REGION }} | helm registry login --username AWS --password-stdin ${{ vars[env.AWS_ACCOUNT_ID] }}.dkr.ecr.${{ env.AWS_REGION }}.amazonaws.com
133152
134-
- name: Check if image tag exists in ECR
135-
id: check-image-existence
136-
run: |
137-
if aws ecr describe-images --repository-name "${{ env.ECR_REPOSITORY }}" --region "${{ env.AWS_REGION }}" --image-ids imageTag="${{ env.IMAGE_TAG }}" 2>&1 | grep -q "imageTag"; then
138-
echo "Image tag $IMAGE_TAG exists in ECR"
139-
else
140-
echo "Error: Image tag $IMAGE_TAG does not exist in ECR"
141-
exit 1
142-
fi
153+
# Construct base Helm command
154+
HELM_CMD="helm upgrade --install ${{ env.SERVICE_NAME }} oci://${{ vars[env.AWS_ACCOUNT_ID] }}.dkr.ecr.${{ env.AWS_REGION }}.amazonaws.com/${{ env.HELM_CHART_NAME }} \
155+
--namespace ${{ needs.prepare-env.outputs.ENV }} \
156+
--values values.yaml \
157+
--set default.image.repository='${{ vars[env.AWS_ACCOUNT_ID] }}.dkr.ecr.${{ env.AWS_REGION }}.amazonaws.com/${{ env.ECR_REPOSITORY }}' \
158+
--set default.image.tag='${{ github.event.inputs.tag }}'"
143159
144-
- name: Deploy backend
145-
id: deploy_backend
146-
uses: ./.github/actions/deploy-ecs
147-
env:
148-
APP_IMAGE: ${{ steps.login-ecr.outputs.registry }}/${{ env.ECR_REPOSITORY }}:${{ env.IMAGE_TAG }}
149-
with:
150-
aws-region : ${{ env.AWS_REGION }}
151-
aws-role: ${{ secrets[env.AWS_ROLE] }}
152-
task-definition: ${{ env.TASK_DEFINITION }}
153-
container-name: ${{ env.CONTAINER_NAME }}
154-
ecs-service: ${{ env.ECS_SERVICE }}
155-
ecs-cluster: ${{ env.ECS_CLUSTER }}
156-
image: ${{ env.APP_IMAGE }}
160+
# Run the Helm command
161+
echo "Running: $HELM_CMD"
162+
eval $HELM_CMD

.github/workflows/cd-ui.yaml

Lines changed: 61 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,15 @@ on:
1515
required: true
1616
type: string
1717
description: Provide tag (Eg:v3.14.0)
18-
18+
permissions:
19+
id-token: write
20+
contents: write
21+
packages: read
22+
actions: read
1923
env:
2024
SERVICE_NAME: conductor-ui
2125
AWS_REGION: "ap-south-1"
26+
HELM_CHART_NAME: "application-helm-chart"
2227

2328
jobs:
2429
prepare-env:
@@ -29,13 +34,12 @@ jobs:
2934
AWS_ROLE: ${{ steps.vars.outputs.AWS_ROLE }}
3035
ENV: ${{ steps.vars.outputs.ENV }}
3136
PROJECT_PREFIX: ${{ steps.vars.outputs.PROJECT_PREFIX }}
32-
ECS_CLUSTER: ${{ steps.set_env.outputs.ECS_CLUSTER }}
33-
ECS_SERVICE: ${{ steps.set_env.outputs.ECS_SERVICE }}
34-
TASK_DEFINITION: ${{ steps.set_env.outputs.TASK_DEFINITION }}
35-
CONTAINER_NAME: ${{ steps.set_env.outputs.CONTAINER_NAME }}
37+
K8S_CLUSTER: ${{ steps.vars.outputs.K8S_CLUSTER }}
3638
ECR_REPOSITORY: ${{ steps.set_env.outputs.ECR_REPOSITORY }}
39+
ENVIRONMENT_BUCKET: ${{ steps.set_env.outputs.ENVIRONMENT_BUCKET }}
3740
SLACK_WEBHOOK_URL: ${{ steps.vars.outputs.SLACK_WEBHOOK_URL }}
38-
41+
AWS_ACCOUNT_ID: ${{ steps.vars.outputs.AWS_ACCOUNT_ID}}
42+
3943
steps:
4044
- id: vars
4145
shell: bash
@@ -44,7 +48,7 @@ jobs:
4448
ENV=${{ github.event.inputs.environment }}
4549
IMAGE_TAG=${{ github.event.inputs.tag }}
4650
echo $BRANCH
47-
51+
4852
if [ -z "$ENV" ]
4953
then
5054
case $BRANCH in
@@ -67,16 +71,22 @@ jobs:
6771
echo "AWS_ROLE=PRD_AWS_ROLE" >> $GITHUB_OUTPUT
6872
echo "PROJECT_PREFIX=sirn-prd-mb" >> $GITHUB_OUTPUT
6973
echo "SLACK_WEBHOOK_URL=PRD_SLACK_WEBHOOK_URL" >> $GITHUB_OUTPUT
74+
echo "AWS_ACCOUNT_ID=PRD_AWS_ACCOUNT_ID" >> $GITHUB_OUTPUT
75+
echo "K8S_CLUSTER=sirn-prd-mb-prime" >> $GITHUB_OUTPUT
7076
elif [ $ENV == 'stg' ]
7177
then
7278
echo "AWS_ROLE=STG_AWS_ROLE" >> $GITHUB_OUTPUT
7379
echo "PROJECT_PREFIX=sirn-stg-mb" >> $GITHUB_OUTPUT
7480
echo "SLACK_WEBHOOK_URL=DEV_SLACK_WEBHOOK_URL" >> $GITHUB_OUTPUT
81+
echo "AWS_ACCOUNT_ID=NON_PRD_AWS_ACCOUNT_ID" >> $GITHUB_OUTPUT
82+
echo "K8S_CLUSTER=sirn-dev-mb-prime" >> $GITHUB_OUTPUT
7583
elif [ $ENV == 'dev' ]
7684
then
7785
echo "AWS_ROLE=DEV_AWS_ROLE" >> $GITHUB_OUTPUT
7886
echo "PROJECT_PREFIX=sirn-dev-mb" >> $GITHUB_OUTPUT
7987
echo "SLACK_WEBHOOK_URL=DEV_SLACK_WEBHOOK_URL" >> $GITHUB_OUTPUT
88+
echo "AWS_ACCOUNT_ID=NON_PRD_AWS_ACCOUNT_ID" >> $GITHUB_OUTPUT
89+
echo "K8S_CLUSTER=sirn-dev-mb-prime" >> $GITHUB_OUTPUT
8090
else
8191
echo "Branch not configured!"
8292
exit 1
@@ -88,68 +98,65 @@ jobs:
8898
id: set_env
8999
run: |
90100
PROJECT_PREFIX=${{ steps.vars.outputs.PROJECT_PREFIX }}
91-
echo "ECR_REPOSITORY=$PROJECT_PREFIX-ecr-$SERVICE_NAME" >> $GITHUB_OUTPUT
92-
echo "ECS_CLUSTER=$PROJECT_PREFIX-ecs-cluster" >> $GITHUB_OUTPUT
93-
echo "ECS_SERVICE=$PROJECT_PREFIX-svc-$SERVICE_NAME" >> $GITHUB_OUTPUT
94-
echo "TASK_DEFINITION=$PROJECT_PREFIX-td-$SERVICE_NAME" >> $GITHUB_OUTPUT
95-
echo "CONTAINER_NAME=$PROJECT_PREFIX-cntr-$SERVICE_NAME" >> $GITHUB_OUTPUT
101+
echo "ENVIRONMENT_BUCKET=$PROJECT_PREFIX-s3-environment" >> $GITHUB_OUTPUT
96102
echo ":seedling: Branch:${GITHUB_REF#refs/heads/}" >> $GITHUB_STEP_SUMMARY
97-
103+
echo "ECR_REPOSITORY=$PROJECT_PREFIX-ecr-conductor-ui" >> $GITHUB_OUTPUT
104+
98105
# Deploy Conductor UI Image to ECS
99-
deploy-ui-image:
100-
name: Deploy UI Image
101-
runs-on: 'ubuntu-latest'
102-
timeout-minutes: 20
106+
deploy-to-k8s:
107+
name: Deploy to k8s
108+
runs-on: ubuntu-latest
109+
container:
110+
image: public.ecr.aws/kvsiren-dev/pipeline/helm-deploy:latest
111+
timeout-minutes: 15
103112
permissions:
104113
id-token: write
105114
pull-requests: write
106115
contents: read
107-
needs: prepare-env
116+
needs:
117+
- prepare-env
108118
env:
109-
AWS_ROLE: ${{ needs.prepare-env.outputs.AWS_ROLE }}
110-
ENV: ${{ needs.prepare-env.outputs.ENV }}
111-
PROJECT_PREFIX: ${{needs.prepare-env.outputs.PROJECT_PREFIX}}
112-
ECR_REPOSITORY: ${{needs.prepare-env.outputs.ECR_REPOSITORY}}
113-
IMAGE_TAG: ${{ github.event.inputs.tag }}
114-
ECS_CLUSTER: ${{ needs.prepare-env.outputs.ECS_CLUSTER }}
115-
ECS_SERVICE: ${{ needs.prepare-env.outputs.ECS_SERVICE }}
116-
TASK_DEFINITION: ${{ needs.prepare-env.outputs.TASK_DEFINITION }}
117-
CONTAINER_NAME: ${{ needs.prepare-env.outputs.CONTAINER_NAME }}
118-
119+
AWS_ACCOUNT_ID: ${{ needs.prepare-env.outputs.AWS_ACCOUNT_ID }}
120+
ECR_REPOSITORY: ${{ needs.prepare-env.outputs.ECR_REPOSITORY }}
119121
steps:
120122
- name: Checkout code from action
121123
uses: actions/checkout@v2
122124

125+
- name: Checkout values.yaml from siren-infra
126+
uses: actions/checkout@v4
127+
with:
128+
repository: KeyvalueSoftwareSystems/siren-infra
129+
ref: main
130+
token: ${{secrets.SIREN_PAT}}
131+
sparse-checkout: |
132+
k8s/siren-services/${{ env.SERVICE_NAME }}/${{ needs.prepare-env.outputs.ENV }}-values.yaml
133+
sparse-checkout-cone-mode: false
134+
135+
- name: Rename values.yaml for Helm
136+
shell: bash
137+
run: |
138+
cp k8s/siren-services/${{ env.SERVICE_NAME }}/${{ needs.prepare-env.outputs.ENV }}-values.yaml ./values.yaml
139+
cat ./values.yaml
140+
123141
- name: Configure AWS credentials
124142
uses: aws-actions/configure-aws-credentials@v4
125143
with:
126-
role-to-assume: ${{ secrets[env.AWS_ROLE] }}
144+
role-to-assume: arn:aws:iam::${{ vars[env.AWS_ACCOUNT_ID] }}:role/github-actions
127145
aws-region: ${{ env.AWS_REGION }}
128146

129-
- name: Amazon ECR Login
130-
id: login-ecr
131-
uses: aws-actions/amazon-ecr-login@v1.7.0
147+
- name: Deploy to Kubernetes
148+
shell: bash
149+
run: |
150+
aws eks update-kubeconfig --name ${{ needs.prepare-env.outputs.K8S_CLUSTER }}
151+
aws ecr get-login-password --region ${{ env.AWS_REGION }} | helm registry login --username AWS --password-stdin ${{ vars[env.AWS_ACCOUNT_ID] }}.dkr.ecr.${{ env.AWS_REGION }}.amazonaws.com
132152
133-
- name: Check if image tag exists in ECR
134-
id: check-image-existence
135-
run: |
136-
if aws ecr describe-images --repository-name "${{ env.ECR_REPOSITORY }}" --region "${{ env.AWS_REGION }}" --image-ids imageTag="${{ env.IMAGE_TAG }}" 2>&1 | grep -q "imageTag"; then
137-
echo "Image tag $IMAGE_TAG exists in ECR"
138-
else
139-
echo "Error: Image tag $IMAGE_TAG does not exist in ECR"
140-
exit 1
141-
fi
153+
# Construct base Helm command
154+
HELM_CMD="helm upgrade --install ${{ env.SERVICE_NAME }} oci://${{ vars[env.AWS_ACCOUNT_ID] }}.dkr.ecr.${{ env.AWS_REGION }}.amazonaws.com/${{ env.HELM_CHART_NAME }} \
155+
--namespace ${{ needs.prepare-env.outputs.ENV }} \
156+
--values values.yaml \
157+
--set default.image.repository='${{ vars[env.AWS_ACCOUNT_ID] }}.dkr.ecr.${{ env.AWS_REGION }}.amazonaws.com/${{ env.ECR_REPOSITORY }}' \
158+
--set default.image.tag='${{ github.event.inputs.tag }}'"
142159
143-
- name: Deploy backend
144-
id: deploy_backend
145-
uses: ./.github/actions/deploy-ecs
146-
env:
147-
APP_IMAGE: ${{ steps.login-ecr.outputs.registry }}/${{ env.ECR_REPOSITORY }}:${{ env.IMAGE_TAG }}
148-
with:
149-
aws-region : ${{ env.AWS_REGION }}
150-
aws-role: ${{ secrets[env.AWS_ROLE] }}
151-
task-definition: ${{ env.TASK_DEFINITION }}
152-
container-name: ${{ env.CONTAINER_NAME }}
153-
ecs-service: ${{ env.ECS_SERVICE }}
154-
ecs-cluster: ${{ env.ECS_CLUSTER }}
155-
image: ${{ env.APP_IMAGE }}
160+
# Run the Helm command
161+
echo "Running: $HELM_CMD"
162+
eval $HELM_CMD

.github/workflows/ci-server-.yaml

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,6 @@ jobs:
2929
AWS_ROLE: ${{ steps.vars.outputs.AWS_ROLE }}
3030
ENV: ${{ steps.vars.outputs.ENV }}
3131
PROJECT_PREFIX: ${{ steps.vars.outputs.PROJECT_PREFIX }}
32-
ECS_CLUSTER: ${{ steps.set_env.outputs.ECS_CLUSTER }}
3332
ECR_REPOSITORY: ${{ steps.set_env.outputs.ECR_REPOSITORY }}
3433
ENVIRONMENT_BUCKET: ${{ steps.set_env.outputs.ENVIRONMENT_BUCKET }}
3534
SLACK_WEBHOOK_URL: ${{ steps.vars.outputs.SLACK_WEBHOOK_URL }}
@@ -88,7 +87,6 @@ jobs:
8887
id: set_env
8988
run: |
9089
PROJECT_PREFIX=${{ steps.vars.outputs.PROJECT_PREFIX }}
91-
echo "ECS_CLUSTER=$PROJECT_PREFIX-ecs-cluster" >> $GITHUB_OUTPUT
9290
echo "ECR_REPOSITORY=$PROJECT_PREFIX-ecr-$SERVICE_NAME" >> $GITHUB_OUTPUT
9391
echo "ENVIRONMENT_BUCKET=$PROJECT_PREFIX-s3-environment" >> $GITHUB_OUTPUT
9492
echo ":seedling: Branch:${GITHUB_REF#refs/heads/}" >> $GITHUB_STEP_SUMMARY
@@ -133,10 +131,6 @@ jobs:
133131
role-to-assume: ${{ secrets[env.AWS_ROLE] }}
134132
aws-region: ${{ env.AWS_REGION }}
135133

136-
- name: Download S3 file
137-
run: |
138-
aws s3 cp s3://${PROJECT_PREFIX}-s3-environment/conductor-server/conductor-server.properties ./docker/server/config/conductor-server.properties
139-
140134
- name: Amazon ECR Login
141135
id: login-ecr
142136
uses: aws-actions/amazon-ecr-login@v1.7.0

0 commit comments

Comments
 (0)