
frontend-app

backend-app

Tip: Name repositories clearly for easy management.
.github/workflows/deploy.ymlname: Build and Push to ECR
on:
push:
branches:
- main
jobs:
build-and-push:
runs-on: ubuntu-latest
env:
AWS_REGION: ${{ secrets.AWS_REGION }}
AWS_ACCOUNT_ID: ${{ secrets.AWS_ACCOUNT_ID }}
steps:
- name: Checkout code
uses: actions/checkout@v3
- name: Login to Amazon ECR
id: login-ecr
uses: aws-actions/amazon-ecr-login@v1
with:
aws-region: ${{ env.AWS_REGION }}
- name: Build frontend image
run: |
docker build -t frontend-app ./frontend-app
docker tag frontend-app:latest ${{ env.AWS_ACCOUNT_ID }}.dkr.ecr.${{ env.AWS_REGION }}.amazonaws.com/frontend-app:latest
- name: Push frontend image
run: |
docker push ${{ env.AWS_ACCOUNT_ID }}.dkr.ecr.${{ env.AWS_REGION }}.amazonaws.com/frontend-app:latest
- name: Build backend image
run: |
docker build -t backend-app ./backend-app
docker tag backend-app:latest ${{ env.AWS_ACCOUNT_ID }}.dkr.ecr.${{ env.AWS_REGION }}.amazonaws.com/backend-app:latest
- name: Push backend image
run: |
docker push ${{ env.AWS_ACCOUNT_ID }}.dkr.ecr.${{ env.AWS_REGION }}.amazonaws.com/backend-app:latest
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v2
with:
role-to-assume: arn:aws:iam::${{ env.AWS_ACCOUNT_ID }}:role/GitHubActionsRole
aws-region: ${{ env.AWS_REGION }}
To use secrets in GitHub Actions, you need to set up secrets in your repository.

Click New repository secret to add new secrets.
Add the necessary secrets:
AWS_REGION: Your AWS region (e.g., ap-southeast-1).AWS_ACCOUNT_ID: Your AWS account ID.AWS_ACCESS_KEY_ID: Access key ID of IAM user or role.AWS_SECRET_ACCESS_KEY: Secret access key of IAM user or role.
Warning: Make sure these secrets are secure and not shared publicly.
In the workflow file .github/workflows/deploy.yml, you can access secrets using the syntax secrets.<SECRET_NAME>.
Example:
env:
AWS_REGION: ${{ secrets.AWS_REGION }}
AWS_ACCOUNT_ID: ${{ secrets.AWS_ACCOUNT_ID }}
steps:
- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v2
with:
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: ${{ secrets.AWS_REGION }}
latest tag and correct format.