Compare commits

...

4 Commits

Author SHA1 Message Date
bert-e 43df4124b0 Merge branch 'w/7.70/improvement/CLDSRV-438-update-tests-AWS-keys' into tmp/octopus/w/8.6/improvement/CLDSRV-438-update-tests-AWS-keys 2023-08-25 13:08:18 +00:00
bert-e bb5d15a23d Merge branch 'w/7.10/improvement/CLDSRV-438-update-tests-AWS-keys' into tmp/octopus/w/7.70/improvement/CLDSRV-438-update-tests-AWS-keys 2023-08-25 13:08:18 +00:00
Anurag Mittal 2a1aa4ad60
Merge remote-tracking branch 'origin/improvement/CLDSRV-438-update-tests-AWS-keys' into w/7.10/improvement/CLDSRV-438-update-tests-AWS-keys 2023-08-25 15:07:37 +02:00
Anurag Mittal 5e11f6df4f
CLDSRV-438: update AWS backend bucket and keys
Platform Engineering team is trying to limit IAM accounts in AWS. This
change moved AWS backend one to the same account as used by the 2nd aws
backend specified in the CI
2023-08-25 10:10:53 +02:00
4 changed files with 9 additions and 9 deletions

View File

@ -39,8 +39,8 @@ env:
${{ secrets.B2BACKEND_B2_STORAGE_ACCESS_KEY }}
GOOGLE_SERVICE_EMAIL: "${{ secrets.GCP_SERVICE_EMAIL }}"
GOOGLE_SERVICE_KEY: "${{ secrets.GCP_SERVICE_KEY }}"
AWS_S3_BACKEND_ACCESS_KEY: "${{ secrets.AWS_S3_BACKEND_ACCESS_KEY }}"
AWS_S3_BACKEND_SECRET_KEY: "${{ secrets.AWS_S3_BACKEND_SECRET_KEY }}"
AWS_S3_BACKEND_ACCESS_KEY: "${{ secrets.AWS_S3_BACKEND_ACCESS_KEY_3 }}"
AWS_S3_BACKEND_SECRET_KEY: "${{ secrets.AWS_S3_BACKEND_SECRET_KEY_3 }}"
AWS_S3_BACKEND_ACCESS_KEY_2: "${{ secrets.AWS_S3_BACKEND_ACCESS_KEY_2 }}"
AWS_S3_BACKEND_SECRET_KEY_2: "${{ secrets.AWS_S3_BACKEND_SECRET_KEY_2 }}"
AWS_GCP_BACKEND_ACCESS_KEY: "${{ secrets.AWS_GCP_BACKEND_ACCESS_KEY }}"

View File

@ -49,7 +49,7 @@
"legacyAwsBehavior": true,
"details": {
"awsEndpoint": "s3.amazonaws.com",
"bucketName": "multitester555",
"bucketName": "cloudserver-ci-aws-backend-test-bucket",
"bucketMatch": true,
"credentialsProfile": "default",
"serverSideEncryption": true
@ -61,7 +61,7 @@
"legacyAwsBehavior": true,
"details": {
"awsEndpoint": "s3.amazonaws.com",
"bucketName": "multitester555",
"bucketName": "cloudserver-ci-aws-backend-test-bucket",
"bucketMatch": true,
"credentialsProfile": "default"
}
@ -72,7 +72,7 @@
"legacyAwsBehavior": true,
"details": {
"awsEndpoint": "s3.amazonaws.com",
"bucketName": "multitester555",
"bucketName": "cloudserver-ci-aws-backend-test-bucket",
"bucketMatch": false,
"credentialsProfile": "default"
}

View File

@ -41,7 +41,7 @@
"legacyAwsBehavior": true,
"details": {
"awsEndpoint": "s3.amazonaws.com",
"bucketName": "multitester555",
"bucketName": "cloudserver-ci-aws-backend-test-bucket",
"bucketMatch": true,
"credentialsProfile": "default",
"serverSideEncryption": true
@ -53,7 +53,7 @@
"legacyAwsBehavior": true,
"details": {
"awsEndpoint": "s3.amazonaws.com",
"bucketName": "multitester555",
"bucketName": "cloudserver-ci-aws-backend-test-bucket",
"bucketMatch": true,
"credentialsProfile": "default"
}
@ -76,7 +76,7 @@
"legacyAwsBehavior": true,
"details": {
"awsEndpoint": "s3.amazonaws.com",
"bucketName": "multitester555",
"bucketName": "cloudserver-ci-aws-backend-test-bucket",
"bucketMatch": false,
"credentialsProfile": "default"
}

View File

@ -30,7 +30,7 @@ const body = Buffer.from('I am a body', 'utf8');
const memLocation = 'scality-internal-mem';
const fileLocation = 'scality-internal-file';
const awsBucket = 'multitester555';
const awsBucket = 'cloudserver-ci-aws-backend-test-bucket';
const awsLocation = 'awsbackend';
const awsLocation2 = 'awsbackend2';
const awsLocationMismatch = 'awsbackendmismatch';