-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
allow OIDC instead of keys #12
Comments
@exussum12 thought id let you know that i decided to fork this to see if I could get it working. after gutting a few things, it seems to work by simply removing the parameters. note: i do not recommend pointing to my fork, but you could always do the same until the real one is fixed :) |
Looks good and thanks for experimenting and confirming it works @forensicmike. I'll try to get it implemented as an option soon. |
I did a bit more experimenting and wanted to share what I found about how the aws-actions/configure-aws-credentials@v1 action works, which is the recommended way to implement the OIDC connectivity. it appears that after successfully completing, every step afterwards on that same job will automatically include the following (it shows up in the action runner output):
|
@forensicmike yeah I ended up just writing a simple script when I couldn't find a preexisting action Probably needed some docs adding too about adding
Thanks for looking! |
Great, thanks. Will definitely be easier to leverage that action to set things up. |
Yeah, that caught me as well. Also think there needs to be a bit more more fanfare around the need to manually setup the trust policy in AWS lest any repo on Github can assume that role if they possess the role ARN.. |
@chetan Sorry to revive such and old issue, but why is this marked as completed? If I'm understanding correctly, this action will still fail if the
The fork @forensicmike made removed the checks for those parameters and presumed that the caller had already called the What am I missing? |
@johnmcase successfully running the If you're seeing an issue than you may need to look into the output of that action to see what's going on. You can refer to the readme in this repo and the test action for some more examples. |
Github supports open id connect to get credentials from AWS, This repo rejects anything which does not pass though the AWS creds.
Could OIDC support be added?
The text was updated successfully, but these errors were encountered: