From ea0f452eba60b65ef6f76551f43519086761d6dc Mon Sep 17 00:00:00 2001 From: Bart van der Braak Date: Tue, 21 Nov 2023 14:50:36 +0100 Subject: [PATCH] fix: return to use oidc secrets --- .github/workflows/e2e.yml | 20 +++++++++++++++----- 1 file changed, 15 insertions(+), 5 deletions(-) diff --git a/.github/workflows/e2e.yml b/.github/workflows/e2e.yml index f2496d0..af05643 100644 --- a/.github/workflows/e2e.yml +++ b/.github/workflows/e2e.yml @@ -40,7 +40,9 @@ jobs: - uses: actions/checkout@v3 - uses: azure/login@v1 with: - creds: ${{ secrets.AZURE_CREDENTIALS }} + client-id: ${{ secrets.AZURE_CLIENT_ID }} + tenant-id: ${{ secrets.AZURE_TENANT_ID }} + subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }} - name: Deploy Bicep template uses: azure/arm-deploy@v1 with: @@ -59,7 +61,9 @@ jobs: - uses: actions/download-artifact@v3.0.2 - uses: azure/login@v1 with: - creds: ${{ secrets.AZURE_CREDENTIALS }} + client-id: ${{ secrets.AZURE_CLIENT_ID }} + tenant-id: ${{ secrets.AZURE_TENANT_ID }} + subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }} - name: Use Keyweave with No Access Policies run: ./keyweave --vault-name ${{ env.VAULT_NAME}} @@ -72,7 +76,9 @@ jobs: - uses: actions/download-artifact@v3.0.2 - uses: azure/login@v1 with: - creds: ${{ secrets.AZURE_CREDENTIALS }} + client-id: ${{ secrets.AZURE_CLIENT_ID }} + tenant-id: ${{ secrets.AZURE_TENANT_ID }} + subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }} - name: Use Keyweave with Only Get Access Policy run: ./keyweave --vault-name ${{ env.VAULT_NAME}} @@ -85,7 +91,9 @@ jobs: - uses: actions/download-artifact@v3.0.2 - uses: azure/login@v1 with: - creds: ${{ secrets.AZURE_CREDENTIALS }} + client-id: ${{ secrets.AZURE_CLIENT_ID }} + tenant-id: ${{ secrets.AZURE_TENANT_ID }} + subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }} - name: Use Keyweave with Only List Access Policy run: ./keyweave --vault-name ${{ env.VAULT_NAME}} get-list-test: @@ -97,6 +105,8 @@ jobs: - uses: actions/download-artifact@v3.0.2 - uses: azure/login@v1 with: - creds: ${{ secrets.AZURE_CREDENTIALS }} + client-id: ${{ secrets.AZURE_CLIENT_ID }} + tenant-id: ${{ secrets.AZURE_TENANT_ID }} + subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }} - name: Use Keyweave with both Get and List Access Policies run: ./keyweave --vault-name ${{ env.VAULT_NAME}}