Assume Jupyterhub Provisioning Role #2
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Generate Data Usage Report | ||
on: | ||
pull_request: | ||
branches: | ||
- main | ||
jobs: | ||
deploy: | ||
runs-on: ubuntu-latest | ||
steps: | ||
- name: Checkout code | ||
uses: actions/checkout@v3 | ||
- name: Configure AWS credentials | ||
uses: aws-actions/configure-aws-credentials@v3 | ||
with: | ||
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | ||
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||
# TODO param region | ||
aws-region: us-east-2 | ||
- name: Assume JupyterhubProvisioningRole | ||
# TODO param ProvisioningRoleARN and name ^ | ||
run: | | ||
ROLE_ARN="arn:aws:iam::278212569472:role/JupyterhubProvisioningRole" | ||
CREDS=$(aws sts assume-role --role-arn $ROLE_ARN --role-session-name "GitHubActionsSession") | ||
export AWS_ACCESS_KEY_ID=$(echo $CREDS | jq -r '.Credentials.AccessKeyId') | ||
export AWS_SECRET_ACCESS_KEY=$(echo $CREDS | jq -r '.Credentials.SecretAccessKey') | ||
export AWS_SESSION_TOKEN=$(echo $CREDS | jq -r '.Credentials.SessionToken') | ||
- name: Configure kubectl with AWS EKS | ||
# TODO param name, region | ||
run: | | ||
aws eks update-kubeconfig --name eks-dandihub --region us-east-2 | ||
- name: Sanity check | ||
run: | | ||
kubectl get pods -n jupyterhub |