diff --git a/.github/workflows/reusable-ecr-build-push.yml b/.github/workflows/reusable-ecr-build-push.yml new file mode 100644 index 0000000..b5eb114 --- /dev/null +++ b/.github/workflows/reusable-ecr-build-push.yml @@ -0,0 +1,69 @@ +name: Reusable workflow to build and push Docker image to Amazon ECR + +on: + workflow_call: + inputs: + ecr-repo: + description: 'name of the ECR repository' + required: true + type: string + ecr-repo-aws-region: + description: 'AWS Region for ECR Repository' + required: true + type: string + secrets: + AWS_ACCOUNT: + description: 'AWS Account ID' + required: true + +# Permission can be added at job level or workflow level +permissions: + id-token: write # This is required for requesting the JWT + contents: read # This is required for actions/checkout + +jobs: + build-and-push: + runs-on: ubuntu-latest + steps: + - name: Checkout code + uses: actions/checkout@9bb56186c3b09b4f86b1c65136769dd318469633 # v4.1.2 + + - name: configure aws credentials + uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2 + with: + role-to-assume: arn:aws:iam::${{ secrets.AWS_ACCOUNT }}:role/gha-oidc-cicd + role-session-name: GitHub_to_AWS_via_FederatedOIDC + aws-region: ${{ inputs.ecr-repo-aws-region }} + + - name: Sts GetCallerIdentity + run: | + aws sts get-caller-identity + + # - name: Get AWS ECR login using oidc token + # run: | + # aws ecr get-login-password --region ${{ inputs.aws-region }} | docker login --username AWS --password-stdin ${{ secrets.AWS_ACCOUNT_STORY_SERVICES_STAGING }}.dkr.ecr.${{ inputs.aws-region }}.amazonaws.com + + # - name: Docker build + # run: | + # docker build -f ./dockerfile/api/Dockerfile \ + # -t ${{ secrets.AWS_ACCOUNT_STORY_SERVICES_STAGING }}.dkr.ecr.${{ inputs.aws-region }}.amazonaws.com/${{ inputs.ecr-repo-stg }}:${{ github.sha }} \ + # -t ${{ secrets.AWS_ACCOUNT_STORY_SERVICES_STAGING }}.dkr.ecr.${{ inputs.aws-region }}.amazonaws.com/${{ inputs.ecr-repo-stg }}:latest . + + # - name: Run Trivy vulnerability scanner + # uses: aquasecurity/trivy-action@d710430a6722f083d3b36b8339ff66b32f22ee55 # v0.19.0 + # with: + # image-ref: 478656756051.dkr.ecr.${{ inputs.aws-region }}.amazonaws.com/${{ inputs.ecr-repo-stg }}:${{ github.sha }} + # format: 'table' + # ignore-unfixed: true + # vuln-type: 'os,library' + # severity: 'CRITICAL,HIGH' + + # - name: Docker push to AWS ECR + # run: | + # docker push ${{ secrets.AWS_ACCOUNT_STORY_SERVICES_STAGING }}.dkr.ecr.${{ inputs.aws-region }}.amazonaws.com/${{ inputs.ecr-repo-stg }}:${{ github.sha }} + # docker push ${{ secrets.AWS_ACCOUNT_STORY_SERVICES_STAGING }}.dkr.ecr.${{ inputs.aws-region }}.amazonaws.com/${{ inputs.ecr-repo-stg }}:latest + + # # [Extremely Important] + # - name: Remove the cached AWS credentials from the runner + # run: | + # rm -rf /home/runner/.docker/config.json