- name: Configure AWS Credentials uses: aws-actions/configure-aws-credentials@v2 with: role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role aws-region: us-east-2 This will cause the action to perform an AssumeRoleWithWebIdentity call and return temporary security credentials for...
you configure IAM to accept JWTs from GitHub's OIDC endpoint. This action will then create a JWT unique to the workflow run using the OIDC endpoint, and it will use the JWT to assume the specified role with short-term credentials.
Select the repo scope and workflow scope, and click the Generate token button. workflow scope is needed in case your repository has GitHub Action workflows. Copy the token to your clipboard. You enter this token in Azure Databricks under User Settings > Linked accounts.To...
jobs: myrepo-test: runs-on: ubuntu-latest steps: - name: Configure credentials uses: aws-actions/configure-aws-credentials@v2 with: aws-region: us-east-1 role-to-assume: arn:aws:iam::000000000000:role/github-s3-test role-session-name: GithubActionDeployment Role trusted entities in AWS: ...
For the past hour or so I’ve been getting this error while using this action: Error: OpenIDConnect provider's HTTPS certificate doesn't match configured thumbprint I’ve checked the thumbprint and it’s correctly set, would this be an issue with GitHub, are there any known issues at the...
GitHub Action to login against a Docker registry. Contribute to docker/login-action development by creating an account on GitHub.
this is my action.yml permissions: id-token: write contents: read jobs: deploy: name: Deploy runs-on: ubuntu-latest environment: production env: STAGE: prod steps: - name: Checkout sources with: ref: ${{ github.ref }} uses: actions/checkout@v3 - name: Configure AWS credentials for ...
Then I recalled this from GitHub Action's documentation With the exception of GITHUB_TOKEN, secrets are not passed to the runner when a workflow is triggered from a forked repository. Now the problem is how to ensure the workflow is always triggered by pytorch-bot which will perform the copy...
This GitHub Action facilitates just that. AWS SDKs and Tools look for your credentials in standardized environment variables. In essence, this Action runs through the standard credential resolution flow, and at the end, exports environment variables for you to use later. We support five methods ...
- name: Configure AWS Credentials uses: aws-actions/configure-aws-credentials@v2 with: aws-region: us-east-2 role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role role-session-name: MySessionName In this example, the Action will load the OIDC token from the GitHub-provided...