|
41 | 41 | - name: Configure aws credentials |
42 | 42 | uses: aws-actions/configure-aws-credentials@v1 |
43 | 43 | with: |
44 | | - role-to-assume: ${{ steps.get-vars.outputs.aws-oidc-role }} |
| 44 | + role-to-assume: $\{{ steps.get-vars.outputs.aws-oidc-role }} |
45 | 45 | role-session-name: pr-role-session |
46 | 46 | aws-region: us-east-1 |
47 | 47 |
|
|
53 | 53 | uses: docker/login-action@v2 |
54 | 54 | with: |
55 | 55 | registry: ghcr.io |
56 | | - username: ${{ github.actor }} |
57 | | - password: ${{ secrets.PACKAGE_TOKEN }} |
| 56 | + username: $\{{ github.actor }} |
| 57 | + password: $\{{ secrets.PACKAGE_TOKEN }} |
58 | 58 |
|
59 | 59 | - name: Pull security-scan |
60 | 60 | run: | |
|
66 | 66 | --user root \ |
67 | 67 | -v /var/run/docker.sock:/var/run/docker.sock \ |
68 | 68 | -v `pwd`:`pwd` \ |
69 | | - -e AWS_ACCESS_KEY_ID=${{ env.AWS_ACCESS_KEY_ID }} \ |
70 | | - -e AWS_SECRET_ACCESS_KEY=${{ env.AWS_SECRET_ACCESS_KEY }} \ |
71 | | - -e AWS_SESSION_TOKEN=${{ env.AWS_SESSION_TOKEN }} \ |
| 69 | + -e AWS_ACCESS_KEY_ID=$\{{ env.AWS_ACCESS_KEY_ID }} \ |
| 70 | + -e AWS_SECRET_ACCESS_KEY=$\{{ env.AWS_SECRET_ACCESS_KEY }} \ |
| 71 | + -e AWS_SESSION_TOKEN=$\{{ env.AWS_SESSION_TOKEN }} \ |
72 | 72 | -e GITHUB_REPOSITORY=$GITHUB_REPOSITORY \ |
73 | 73 | -e GITHUB_REF_NAME=$GITHUB_REF_NAME \ |
74 | 74 | -e GITHUB_RUN_NUMBER=$GITHUB_RUN_NUMBER \ |
|
84 | 84 | - name: Run transponder |
85 | 85 | run: | |
86 | 86 | docker run --rm -v `pwd`:`pwd` -w `pwd` \ |
87 | | - -e J1_API_KEY=${{ secrets.J1_API_KEY_TRANSPONDER }} \ |
88 | | - -e J1_API_DOMAIN=${{ secrets.J1_API_DOMAIN_TRANSPONDER }} \ |
89 | | - -e J1_ACCOUNT_ID=${{ secrets.J1_ACCOUNT_ID_TRANSPONDER }} \ |
| 87 | + -e J1_API_KEY=$\{{ secrets.J1_API_KEY_TRANSPONDER }} \ |
| 88 | + -e J1_API_DOMAIN=$\{{ secrets.J1_API_DOMAIN_TRANSPONDER }} \ |
| 89 | + -e J1_ACCOUNT_ID=$\{{ secrets.J1_ACCOUNT_ID_TRANSPONDER }} \ |
90 | 90 | $TRANSPONDER_DOCKER_IMAGE |
0 commit comments