-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update AWS upload action role setting #4
Comments
So, the difference between our current approach and the recommended one is that for our current approach, we have created an IAM user (a user outside of the federated user management provided by the corporate Active Directory, so administered entirely by us) in our dev AWS account and given that user extremely limited permissions. It can only write to (no reading from or listing contents) a specific S3 bucket; this is the entire permission set: {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:PutObject"
],
"Resource": [
"arn:aws:s3:::<name of the S3 bucket we use in our CI/CD pipelines>/*"
]
}
]
} We've then generated a set of creds for that user, which we add as secrets on each GitHub repo that needs to push to S3. The creds never expire. With the recommended approach, we would define a role(s) in the AWS account rather than a user, and that role would have the same limited set of permissions as above. We would then configure our actions jobs to use GitHub's OIDC AWS identity provider. The general benefits of switching to the recommended approach seem to be:
The benefits are fairly marginal, so I don't think there's any urgency around switching, but the recommended approach is better. To switch, we'd need to figure out the OIDC bit - we've never done that before. From a quick scan of the docs, I'm not 100% sure whether we'd do that ourselves in the AWS account via IAM or if it would be a central IT thing. Both approaches seem possible. We'd need to speak to central IT first. |
OK, so it sounds like something to do on a quiet day. I'll leave the issue open for now. |
The recommended method to set up the aws upload action "role" is to set
role-to-assume
. I'm not sufficiently familiar with AWS to know if we should be following this recommendation. Can you comment @mfitz?The text was updated successfully, but these errors were encountered: