@@ -14,9 +14,9 @@ The process flow for OIDC is:
14
14
15
15
One-time setup to get this working:
16
16
1 . Define GitHub as an Identity Provider in your AWS account
17
- 2 . Define what GitHub is allowed to do (IAM policy )
18
- 3 . Define the GitHub role (IAM role )
19
- 4 . Define the GitHub Action
17
+ 2 . Define what GitHub is allowed to do (IAM Role Policy )
18
+ 3 . Define the GitHub role (IAM Role )
19
+ 4 . Hook this into your GitHub Action
20
20
21
21
NB: You should script as much of this as possible, where it is safe to do so.
22
22
@@ -91,13 +91,14 @@ Trust policy:
91
91
Attach the policy created earlier ("GitHubS3DeployPolicy")
92
92
93
93
94
- ## Define the GitHub Action
94
+ ## Hook this into your GitHub Action
95
95
96
- Define ASSUME_ROLE_ARN ("GitHubS3DeployRole" from earlier) and AWS_S3_BUCKET_NAME in GitHub Repo Secrets.
97
- Example below just syncs the "view-stack" folder into the s3 bucket.
96
+ Define two GitHub Secrets to hold the ASSUME_ROLE_ARN ("GitHubS3DeployRole" from earlier) and AWS_S3_BUCKET_NAME.
97
+ Use "aws-actions/configure-aws-credentials@v2" to assume that role.
98
+ Example below just syncs two folders into the s3 bucket.
98
99
99
100
``` yaml
100
- name : deploy-radar
101
+ name : deploy-app
101
102
102
103
on :
103
104
push :
@@ -131,9 +132,9 @@ All done!
131
132
132
133
## Testing
133
134
134
- Some basic test cases below. Add your own too!
135
- You should look to automate these where possibly .
136
- I've included my specific tests, and results - some helpful notes in there.
135
+ Some basic test cases below to make sure you've secured this properly . Add your own too.
136
+ You should look to automate these where possible .
137
+ I've included my specific tests, and results - may be some helpful notes in there.
137
138
138
139
Ensure success
139
140
- GitHub: edit "view-stack/index.html"
0 commit comments