Skip to content

Commit

Permalink
Remove all debug scripts in cd.yaml
Browse files Browse the repository at this point in the history
Remove all debug scripts in cd.yaml
  • Loading branch information
pkong-ds authored May 23, 2024
2 parents f291df6 + 81e4234 commit fc5a468
Showing 1 changed file with 0 additions and 51 deletions.
51 changes: 0 additions & 51 deletions .github/workflows/cd.yaml
Original file line number Diff line number Diff line change
@@ -5,9 +5,6 @@ concurrency:
cancel-in-progress: true

on:
pull_request:
branches:
- test-cd
push:
branches:
- test-cd # dont run cd until pageship deployment with github OIDC token is resolved
@@ -24,54 +21,6 @@ jobs:
- uses: actions/setup-node@v3
with:
node-version: 18
- name: Debug github actions env variables
run: |
echo hihi
echo hihi2
echo ACTIONS_RUNTIME_TOKEN___${ACTIONS_RUNTIME_TOKEN}
echo ${ACTIONS_ID_TOKEN_REQUEST_URL}
echo $ACTIONS_RUNTIME_TOKEN
echo $ACTIONS_ID_TOKEN_REQUEST_URL
echo ------------
env
echo hihiend
# START https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-cloud-providers#requesting-the-jwt-using-the-actions-core-toolkit
- name: Install OIDC Client from Core Package
run: npm install @actions/core@1.6.0 @actions/http-client
- name: Get Id Token
uses: actions/github-script@v6
id: idtoken
with:
script: |
const coredemo = require('@actions/core')
let id_token = await coredemo.getIDToken()
console.log(id_token)
coredemo.setOutput('id_token', id_token)
# END https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-cloud-providers#requesting-the-jwt-using-the-actions-core-toolkit
# START https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-cloud-providers#requesting-the-jwt-using-environment-variables
- uses: actions/github-script@v6
id: script
timeout-minutes: 10
with:
debug: true
script: |
const token = process.env['ACTIONS_RUNTIME_TOKEN']
const runtimeUrl = process.env['ACTIONS_ID_TOKEN_REQUEST_URL']
core.setOutput('TOKEN', token.trim())
core.setOutput('IDTOKENURL', runtimeUrl.trim())
- run: |
IDTOKEN=$(curl -H "Authorization: bearer ${{steps.script.outputs.TOKEN}}" ${{steps.script.outputs.IDTOKENURL}} -H "Accept: application/json; api-version=2.0" -H "Content-Type: application/json" -d "{}" | jq -r '.value')
echo $IDTOKEN
jwtd() {
if [[ -x $(command -v jq) ]]; then
jq -R 'split(".") | .[0],.[1] | @base64d | fromjson' <<< "${1}"
echo "Signature: $(echo "${1}" | awk -F'.' '{print $3}')"
fi
}
jwtd $IDTOKEN
echo "idToken=${IDTOKEN}" >> $GITHUB_OUTPUT
id: tokenid
# END https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-cloud-providers#requesting-the-jwt-using-environment-variables
- run: npm ci
- name: Set env to staging
run: |

0 comments on commit fc5a468

Please sign in to comment.