Skip to content
Closed
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
Update nix.yml
  • Loading branch information
minikin committed Mar 6, 2023
commit 19a37d1915670cd86f82cb01aa5b95cb03a17a73
36 changes: 8 additions & 28 deletions .github/workflows/nix.yml
Original file line number Diff line number Diff line change
Expand Up @@ -42,13 +42,8 @@ jobs:
concurrency:
group: ${{ github.workflow }}
steps:
- name: Harden Runner
uses: step-security/harden-runner@c8454efe5d0bdefd25384362fe217428ca277d57 # v2.2.0
with:
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs

- name: Standard Discovery
uses: divnix/std-action/discover@ee2bde0566b88637cbf47b8efedb6a5063caadd1 # v0.0.4
uses: divnix/std-action/[email protected]
id: discovery
build-packages:
needs: discover
Expand All @@ -59,17 +54,12 @@ jobs:
name: ${{ matrix.target.cell }} - ${{ matrix.target.name }}
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@c8454efe5d0bdefd25384362fe217428ca277d57 # v2.2.0
with:
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs

- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # v1.7.0
uses: aws-actions/[email protected]
with:
role-to-assume: ${{ env.AWS_ROLE_ARN }}
aws-region: ${{ env.AWS_REGION }}
- uses: divnix/std-action/run@ee2bde0566b88637cbf47b8efedb6a5063caadd1 # v0.0.4
- uses: divnix/std-action/[email protected]
with:
extra_nix_config: |
${{ needs.discover.outputs.nix_conf }}
Expand All @@ -85,17 +75,12 @@ jobs:
name: ${{ matrix.target.cell }} - ${{ matrix.target.name }}
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@c8454efe5d0bdefd25384362fe217428ca277d57 # v2.2.0
with:
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs

- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # v1.7.0
uses: aws-actions/[email protected]
with:
role-to-assume: ${{ env.AWS_ROLE_ARN }}
aws-region: ${{ env.AWS_REGION }}
- uses: divnix/std-action/run@ee2bde0566b88637cbf47b8efedb6a5063caadd1 # v0.0.4
- uses: divnix/std-action/[email protected]
with:
extra_nix_config: |
${{ needs.discover.outputs.nix_conf }}
Expand All @@ -114,23 +99,18 @@ jobs:
name: ${{ matrix.target.cell }} - ${{ matrix.target.name }}
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@c8454efe5d0bdefd25384362fe217428ca277d57 # v2.2.0
with:
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs

- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # v1.7.0
uses: aws-actions/[email protected]
with:
role-to-assume: ${{ env.AWS_ROLE_ARN }}
aws-region: ${{ env.AWS_REGION }}
- name: Configure Registry
run: |
aws ecr get-login-password --region eu-central-1 | docker login --username AWS --password-stdin "${{ env.ECR_REGISTRY }}"
- uses: divnix/std-action/run@ee2bde0566b88637cbf47b8efedb6a5063caadd1 # v0.0.4
- uses: divnix/std-action/[email protected]
with:
extra_nix_config: |
${{ needs.discover.outputs.nix_conf }}
json: ${{ toJSON(matrix.target) }}
nix_key: ${{ secrets.NIX_SIGNING_KEY }}
cache: ${{ env.S3_CACHE }}
cache: ${{ env.S3_CACHE }}