79
79
# This also ensures that PR CI (which doesn't get write access to S3) works, as it cannot
80
80
# access the environment.
81
81
#
82
- # We only enable the environment for the rust-lang/rust repository, so that rust-lang-ci/rust
83
- # CI works until we migrate off it (since that repository doesn't contain the environment).
84
- environment : ${{ ((github.repository == 'rust-lang/rust' && (github.ref == 'refs/heads/try' || github.ref == 'refs/heads/auto')) && 'bors') || '' }}
82
+ # We only enable the environment for the rust-lang/rust repository, so that CI works on forks.
83
+ environment : ${{ ((github.repository == 'rust-lang/rust' && (github.ref == 'refs/heads/try' || github.ref == 'refs/heads/try-perf' || github.ref == 'refs/heads/auto')) && 'bors') || '' }}
85
84
env :
86
85
CI_JOB_NAME : ${{ matrix.name }}
87
86
CI_JOB_DOC_URL : ${{ matrix.doc_url }}
@@ -234,8 +233,8 @@ jobs:
234
233
fi
235
234
exit ${STATUS}
236
235
env :
237
- AWS_ACCESS_KEY_ID : ${{ (github.repository == 'rust-lang/rust' && secrets.CACHES_AWS_ACCESS_KEY_ID) || env .CACHES_AWS_ACCESS_KEY_ID }}
238
- AWS_SECRET_ACCESS_KEY : ${{ (github.repository == 'rust-lang/rust' && secrets.CACHES_AWS_SECRET_ACCESS_KEY) || secrets[format('AWS_SECRET_ACCESS_KEY_{0}', env.CACHES_AWS_ACCESS_KEY_ID)] }}
236
+ AWS_ACCESS_KEY_ID : ${{ secrets.CACHES_AWS_ACCESS_KEY_ID }}
237
+ AWS_SECRET_ACCESS_KEY : ${{ secrets.CACHES_AWS_SECRET_ACCESS_KEY }}
239
238
240
239
- name : create github artifacts
241
240
run : src/ci/scripts/create-doc-artifacts.sh
@@ -257,8 +256,8 @@ jobs:
257
256
- name : upload artifacts to S3
258
257
run : src/ci/scripts/upload-artifacts.sh
259
258
env :
260
- AWS_ACCESS_KEY_ID : ${{ (github.repository == 'rust-lang/rust' && secrets.ARTIFACTS_AWS_ACCESS_KEY_ID) || env .ARTIFACTS_AWS_ACCESS_KEY_ID }}
261
- AWS_SECRET_ACCESS_KEY : ${{ (github.repository == 'rust-lang/rust' && secrets.ARTIFACTS_AWS_SECRET_ACCESS_KEY) || secrets[format('AWS_SECRET_ACCESS_KEY_{0}', env.ARTIFACTS_AWS_ACCESS_KEY_ID)] }}
259
+ AWS_ACCESS_KEY_ID : ${{ secrets.ARTIFACTS_AWS_ACCESS_KEY_ID }}
260
+ AWS_SECRET_ACCESS_KEY : ${{ secrets.ARTIFACTS_AWS_SECRET_ACCESS_KEY }}
262
261
# Adding a condition on DEPLOY=1 or DEPLOY_ALT=1 is not needed as all deploy
263
262
# builders *should* have the AWS credentials available. Still, explicitly
264
263
# adding the condition is helpful as this way CI will not silently skip
0 commit comments