Connecting GitHub Actions To AWS Using OIDC

แชร์
ฝัง
  • เผยแพร่เมื่อ 18 ม.ค. 2025

ความคิดเห็น • 15

  • @scriptkeeper8243
    @scriptkeeper8243 ปีที่แล้ว +4

    It's great that John Malkovich is giving tutorials!

  • @nanditasahu2358
    @nanditasahu2358 2 ปีที่แล้ว +1

    Thanks for the video :)

  • @dma98
    @dma98 ปีที่แล้ว +1

    Awesome video, quick and step by step perfectly explained. I have one concern though, you hid the arn throughout the whole video, however, it is simple text in the workflow since you've shared the repo. I'm new to this world still, but maybe worth to take it out in a repo secret? Just a suggestion, otherwise love the video

    • @GoForthandCloud
      @GoForthandCloud  ปีที่แล้ว

      I passed this along to Matt - stay tuned for his response!

    • @matthewbarlow9123
      @matthewbarlow9123 ปีที่แล้ว +1

      Thank you for the comment! The ARN in the github repo is using a made-up AWS Account ID. AWS Account IDs aren't really sensitive, they are identifying information. When implementing OIDC workflows, I do prefer to put them into a GitHub Action Secret or a GitHub Action Variable, which can be referenced like this in the workflow: 'role-to-assume: ${{ vars.OIDC_ROLE }}'

  • @jacoboram100
    @jacoboram100 2 ปีที่แล้ว +1

    I followed exactly the same steps but I am unable to run my workflow..Issue is No OpenIDConnect provider found in your account for..could you please confirm if anything else needs as a part of setup

  • @zimcanit6647
    @zimcanit6647 2 ปีที่แล้ว +1

    Great video!

  • @subhammisra3631
    @subhammisra3631 2 ปีที่แล้ว +1

    Awesome video. I was able to successfully configure and run my composite workflows. But, still stuck with using reusable workflows, in my use case, I want to invoke the reusable workflow which is in an internal repository from any repository in my github organization. Also, the aws assume role action is configured in the reusable workflow, not in caller workflow.

    • @matthewbarlow9123
      @matthewbarlow9123 2 ปีที่แล้ว

      I think the issue you are describing is that you want to be able to run the workflow from any repository in the org, but the AWS policy specifies the repository. This is indeed an issue with the OIDC implementation, that you can only validate the "sub" claim in the JWT on the AWS side. If all of your repositories were private, then you could use a wildcard and whitelist the entire org. However, if you have a mix of public and private repos this would not be secure. The alternative, which is not a great one, is to whitelist all of your repositories in the policy. If I misunderstood your question, then let me know.

  • @adamrusso3871
    @adamrusso3871 ปีที่แล้ว

    I'm trying to follow this, and I got as far as commiting the deploy.yml file when it throws an error:
    "Run pip install -r requirements.txt
    Defaulting to user installation because normal site-packages is not writeable
    ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt'
    Error: Process completed with exit code 1."
    Is this a permissions problem or is requirements.txt no longer available?

  • @garth-baker-blog
    @garth-baker-blog 2 ปีที่แล้ว +1

    You covered your IAM role id but it uncovers before you switch pages. I would delete that role if you dont want people fiddling.
    Great video though!
    Thank you :)

    • @matthewbarlow9123
      @matthewbarlow9123 2 ปีที่แล้ว +1

      The role has indeed been deleted and we will blur that out. Thank you for watching!

    • @GoForthandCloud
      @GoForthandCloud  2 ปีที่แล้ว

      Hi Garth, thank you for pointing this out. This issue has been resolved!

  • @JagadishKP-f3v
    @JagadishKP-f3v ปีที่แล้ว

    Hi I have tried the exact steps you have shown in video but getting into this below error and suggestions to work on this: Error: User: arn:aws:iam::***:user/jagadish is not authorized to perform: sts:TagSession on resource: arn:aws:iam::***:role/gh-acrtions-role

    • @matthewbarlow9123
      @matthewbarlow9123 ปีที่แล้ว

      When do you get this error, when the github action runs? Also check the spelling of your role "gh-acrtions-role".