-
Story
-
Resolution: Unresolved
-
Undefined
-
None
-
None
-
None
Summary: Configure the AWS account to trust GitHub Actions and create the IAM Role that the pipeline will assume. Description: We need to set up the "handshake" between GitHub and AWS. This involves adding GitHub as an Identity Provider in AWS IAM and creating a role that trusts your specific GitHub repository.
- Tasks:
-
- Create OIDC Provider (if not exists):
-
-
- Audience: sts.amazonaws.com
-
-
- Create IAM Role: Name it standardly, e.g., GitHubAction-PackerBuild-Role.
-
- Attach Trust Policy: Allow sts:AssumeRoleWithWebIdentity only for your specific repo/branch.
-
-
- Condition: token.actions.githubusercontent.com:sub StringLike repo:YourOrg/YourRepo:*
-
-
- Attach Permission Policy: Attach the policy drafted in Story 1.
Acceptance Criteria:
- [ ] AWS OIDC Provider is configured.
- [ ] IAM Role is created with the correct Trust Policy (scoped to this repo).
- [ ] Permissions are attached to the Role.
- [ ] The Role ARN is captured for the next story.
- split from
-
RUN-3994 Switch aws creds to openid connection (part 2)
-
- Closed
-