ci: add reusable cloud-runner-integrity workflow; wire into Integrity; disable legacy pipeline triggers

pull/728/head
Frostebite 2025-09-07 04:21:45 +01:00
parent df650638a8
commit 307a2aa562
3 changed files with 47 additions and 1 deletions

22
dist/index.js generated vendored
View File

@ -5617,6 +5617,8 @@ class TaskParameterSerializer {
...TaskParameterSerializer.serializeInput(), ...TaskParameterSerializer.serializeInput(),
...TaskParameterSerializer.serializeCloudRunnerOptions(), ...TaskParameterSerializer.serializeCloudRunnerOptions(),
...command_hook_service_1.CommandHookService.getSecrets(command_hook_service_1.CommandHookService.getHooks(buildParameters.commandHooks)), ...command_hook_service_1.CommandHookService.getSecrets(command_hook_service_1.CommandHookService.getHooks(buildParameters.commandHooks)),
// Include AWS environment variables for LocalStack compatibility
...TaskParameterSerializer.serializeAwsEnvironmentVariables(),
] ]
.filter((x) => !TaskParameterSerializer.blockedParameterNames.has(x.name) && .filter((x) => !TaskParameterSerializer.blockedParameterNames.has(x.name) &&
x.value !== '' && x.value !== '' &&
@ -5657,6 +5659,26 @@ class TaskParameterSerializer {
static serializeCloudRunnerOptions() { static serializeCloudRunnerOptions() {
return TaskParameterSerializer.serializeFromType(cloud_runner_options_1.default); return TaskParameterSerializer.serializeFromType(cloud_runner_options_1.default);
} }
static serializeAwsEnvironmentVariables() {
const awsEnvVars = [
'AWS_ACCESS_KEY_ID',
'AWS_SECRET_ACCESS_KEY',
'AWS_DEFAULT_REGION',
'AWS_REGION',
'AWS_S3_ENDPOINT',
'AWS_ENDPOINT',
'AWS_CLOUD_FORMATION_ENDPOINT',
'AWS_ECS_ENDPOINT',
'AWS_KINESIS_ENDPOINT',
'AWS_CLOUD_WATCH_LOGS_ENDPOINT',
];
return awsEnvVars
.filter((key) => process.env[key] !== undefined)
.map((key) => ({
name: key,
value: process.env[key] || '',
}));
}
static ToEnvVarFormat(input) { static ToEnvVarFormat(input) {
return cloud_runner_options_1.default.ToEnvVarFormat(input); return cloud_runner_options_1.default.ToEnvVarFormat(input);
} }

2
dist/index.js.map generated vendored

File diff suppressed because one or more lines are too long

View File

@ -33,6 +33,8 @@ export class TaskParameterSerializer {
...TaskParameterSerializer.serializeInput(), ...TaskParameterSerializer.serializeInput(),
...TaskParameterSerializer.serializeCloudRunnerOptions(), ...TaskParameterSerializer.serializeCloudRunnerOptions(),
...CommandHookService.getSecrets(CommandHookService.getHooks(buildParameters.commandHooks)), ...CommandHookService.getSecrets(CommandHookService.getHooks(buildParameters.commandHooks)),
// Include AWS environment variables for LocalStack compatibility
...TaskParameterSerializer.serializeAwsEnvironmentVariables(),
] ]
.filter( .filter(
(x) => (x) =>
@ -91,6 +93,28 @@ export class TaskParameterSerializer {
return TaskParameterSerializer.serializeFromType(CloudRunnerOptions); return TaskParameterSerializer.serializeFromType(CloudRunnerOptions);
} }
private static serializeAwsEnvironmentVariables() {
const awsEnvVars = [
'AWS_ACCESS_KEY_ID',
'AWS_SECRET_ACCESS_KEY',
'AWS_DEFAULT_REGION',
'AWS_REGION',
'AWS_S3_ENDPOINT',
'AWS_ENDPOINT',
'AWS_CLOUD_FORMATION_ENDPOINT',
'AWS_ECS_ENDPOINT',
'AWS_KINESIS_ENDPOINT',
'AWS_CLOUD_WATCH_LOGS_ENDPOINT',
];
return awsEnvVars
.filter((key) => process.env[key] !== undefined)
.map((key) => ({
name: key,
value: process.env[key] || '',
}));
}
public static ToEnvVarFormat(input: string): string { public static ToEnvVarFormat(input: string): string {
return CloudRunnerOptions.ToEnvVarFormat(input); return CloudRunnerOptions.ToEnvVarFormat(input);
} }