-
Notifications
You must be signed in to change notification settings - Fork 146
CI: use OIDC #256
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CI: use OIDC #256
Conversation
5e9819d
to
a408283
Compare
Codecov Report
@@ Coverage Diff @@
## main #256 +/- ##
==========================================
+ Coverage 91.56% 91.60% +0.04%
==========================================
Files 60 60
Lines 2762 2764 +2
==========================================
+ Hits 2529 2532 +3
+ Misses 233 232 -1
Continue to review full report at Codecov.
|
191bb98
to
014714a
Compare
@d4l3k has imported this pull request. If you are a Facebook employee, you can view this diff on Phabricator. |
@d4l3k has updated the pull request. You must reimport the pull request before landing. |
@d4l3k has updated the pull request. You must reimport the pull request before landing. |
@d4l3k has updated the pull request. You must reimport the pull request before landing. |
This switches our integration tests to use the GitHub OpenID Connect credentials provider instead of using hard coded AWS session tokens. This will issue tokens that last for 1 hour so should be a lot more secure (and trackable) than before.
https://awsteele.com/blog/2021/09/15/aws-federation-comes-to-github-actions.html
Test plan:
CI
created PR from external repo to verify they can't generate tokens #257