You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Additional parameters of aws cloudformation deploy
58
68
required: false
59
69
type: string
60
-
70
+
61
71
outputs:
62
72
stackOutputs:
63
73
description: Stringified json containing outputs of cloudformation stack
@@ -66,10 +76,10 @@ on:
66
76
secrets:
67
77
awsAccessKeyId:
68
78
description: AWS access key ID
69
-
required: true
79
+
required: false
70
80
awsSecretAccessKey:
71
81
description: AWS secret access key
72
-
required: true
82
+
required: false
73
83
slackToken:
74
84
description: Slack API token
75
85
required: false
@@ -124,6 +134,7 @@ jobs:
124
134
uses: actions/checkout@v4
125
135
126
136
- name: assume IAM role
137
+
if: inputs.useOIDC == false
127
138
uses: aws-actions/configure-aws-credentials@v4
128
139
with:
129
140
aws-access-key-id: ${{ secrets.awsAccessKeyId }}
@@ -136,6 +147,30 @@ jobs:
136
147
# which does not work for cross-account assume
137
148
role-skip-session-tagging: true
138
149
150
+
# First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only.
0 commit comments