Skip to content

Commit

Permalink
Add GH workflow to check EKS access
Browse files Browse the repository at this point in the history
  • Loading branch information
manics committed Jun 7, 2023
1 parent 1a07422 commit dcedf90
Show file tree
Hide file tree
Showing 2 changed files with 42 additions and 1 deletion.
41 changes: 41 additions & 0 deletions .github/workflows/aws-dev.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
# This is a temporary workflow to check whether AWS OIDC EKS access is working
name: AWS development

concurrency: awsdev-eks

on:
push:
branches:
- aws-curvenote

# Global environment variables
env:
AWS_REGION: us-east-2

jobs:
# In this dedicated job to deploy our staging environment we build and push
# images that the jobs to deploy to the production environments depend on.
awsdev-eks:
runs-on: ubuntu-22.04
continue-on-error: ${{ matrix.experimental }}
timeout-minutes: 5
# These permissions are needed to interact with GitHub's OIDC Token endpoint.
permissions:
id-token: write
contents: read

steps:
- name: Checkout
uses: actions/checkout@v3

- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v2
with:
role-to-assume: arn:aws:iam::${{ secrets.AWS_CURVENOTE_ACCOUNT_ID }}:role/binderhub-github-oidc-mybinderorgdeploy
aws-region: us-east-2

- name: Check EKS access
run: |
aws sts get-caller-identity
aws eks update-kubeconfig --name binderhub
kubectl get nodes
2 changes: 1 addition & 1 deletion terraform/aws/curvenote/github-oidc.tf
Original file line number Diff line number Diff line change
Expand Up @@ -53,4 +53,4 @@ resource "aws_iam_role" "github_oidc_mybinderorgdeploy" {
})
}
permissions_boundary = local.permissions_boundary_arn
}
}

0 comments on commit dcedf90

Please sign in to comment.