-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
re-enable AMI deploys #446
base: master
Are you sure you want to change the base?
Conversation
008236a
to
b457dd0
Compare
459a162
to
6ed3ab7
Compare
a5f0dca
to
9e21b8d
Compare
7f6595c
to
d91b169
Compare
Change-type: patch Signed-off-by: Ryan Cooke <[email protected]>
Change-type: patch Signed-off-by: Ryan Cooke <[email protected]>
Required to give the scripts running in the AMI helper image AWS access Change-type: patch Signed-off-by: Ryan Cooke <[email protected]>
Change-type: patch Signed-off-by: Ryan Cooke <[email protected]>
Change-type: patch Signed-off-by: Ryan Cooke <[email protected]>
Change-type: patch Signed-off-by: Ryan Cooke <[email protected]>
Change-type: patch Signed-off-by: Ryan Cooke <[email protected]>
Change-type: patch Signed-off-by: Ryan Cooke <[email protected]>
Change-type: patch Signed-off-by: Ryan Cooke <[email protected]>
AMI names with a + (e.g +rev) aren't permitted Change-type: patch Signed-off-by: Ryan Cooke <[email protected]>
d91b169
to
2972875
Compare
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
DT_ARCH: ${{ steps.balena-lib.outputs.dt_arch }} | ||
run: | | ||
if [ "${DT_ARCH}" = "amd64" ]; then | ||
echo "string=x86_64" >>"${GITHUB_OUTPUT}" |
Check failure
Code scanning / octoscan
Write to "$GITHUB_OUTPUT" in a bash script. Error
if [ "${DT_ARCH}" = "amd64" ]; then | ||
echo "string=x86_64" >>"${GITHUB_OUTPUT}" | ||
elif [ "${DT_ARCH}" = "aarch64" ]; then | ||
echo "string=arm64" >>"${GITHUB_OUTPUT}" |
Check failure
Code scanning / octoscan
Write to "$GITHUB_OUTPUT" in a bash script. Error
VERSION: "${{ steps.balena-lib.outputs.os_version }}" | ||
run: | | ||
if [ "${{ inputs.sign-image }}" = "true" ]; then | ||
echo "string=balenaOS-secureboot-${VERSION}-${MACHINE}" | sed 's/+/-/g' >>"${GITHUB_OUTPUT}" |
Check failure
Code scanning / octoscan
Write to "$GITHUB_OUTPUT" in a bash script. Error
if [ "${{ inputs.sign-image }}" = "true" ]; then | ||
echo "string=balenaOS-secureboot-${VERSION}-${MACHINE}" | sed 's/+/-/g' >>"${GITHUB_OUTPUT}" | ||
else | ||
echo "string=balenaOS-${VERSION}-${MACHINE}" | sed 's/+/-/g' >>"${GITHUB_OUTPUT}" |
Check failure
Code scanning / octoscan
Write to "$GITHUB_OUTPUT" in a bash script. Error
# image_id="$(docker images --format "{{.ID}}" "${image_tag}")" | ||
# echo "id=${image_id}" >>"${GITHUB_OUTPUT}" | ||
image_id="$(docker images --format "{{.ID}}" "${image_tag}")" | ||
echo "id=${image_id}" >>"${GITHUB_OUTPUT}" |
Check failure
Code scanning / octoscan
Write to "$GITHUB_OUTPUT" in a bash script. Error
AWS_ACCESS_KEY_ID: ${{ steps.aws-creds.outputs.aws-access-key-id }} | ||
AWS_SECRET_ACCESS_KEY: ${{ steps.aws-creds.outputs.aws-secret-access-key }} | ||
run: | | ||
docker run --rm -t \ |
Check failure
Code scanning / octoscan
Expression injection, "steps..outputs." is potentially untrusted. Error
Change-type: patch Signed-off-by: Ryan Cooke <[email protected]>
Change-type: patch
Required by:
Initial check to see how far it gets and start debugging