Uploaded image for project: 'Container Tools'
  1. Container Tools
  2. RUN-4065

Configure AWS OIDC Provider & IAM Role

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • None
    • RUN 283

      Summary: Configure the AWS account to trust GitHub Actions and create the IAM Role that the pipeline will assume. Description: We need to set up the "handshake" between GitHub and AWS. This involves adding GitHub as an Identity Provider in AWS IAM and creating a role that trusts your specific GitHub repository.

      • Tasks:
        1. Create OIDC Provider (if not exists):
          • Audience: sts.amazonaws.com
        1. Create IAM Role: Name it standardly, e.g., GitHubAction-PackerBuild-Role.
        1. Attach Trust Policy: Allow sts:AssumeRoleWithWebIdentity only for your specific repo/branch.
          • Condition: token.actions.githubusercontent.com:sub StringLike repo:YourOrg/YourRepo:*
        1. Attach Permission Policy: Attach the policy drafted in Story 1.

      Acceptance Criteria:

      • [ ] AWS OIDC Provider is configured.
      • [ ] IAM Role is created with the correct Trust Policy (scoped to this repo).
      • [ ] Permissions are attached to the Role.
      • [ ] The Role ARN is captured for the next story.

              rh-ee-tizhou Tim Zhou
              bbaude@redhat.com Brent Baude
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: