You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| [✅ Recommended] Assume Role directly using GitHub OIDC provider | | ✔ | | | ✔ |
167
+
| IAM User | ✔ | | | | |
168
+
| Assume Role using IAM User credentials | ✔ | ✔ | | | |
169
+
| Assume Role using WebIdentity Token File credentials | | ✔ | ✔ | | |
170
+
| Assume Role using existing credentials | | ✔ | | ✔ | |
171
+
172
+
*Note: `role-chaining` is not necessary to use existing credentials in every use case. If you're getting a "Credentials loaded by the SDK do not match" error, try enabling this prop.
171
173
172
174
### Credential Lifetime
173
175
The default session duration is **1 hour**.
@@ -268,6 +270,15 @@ Your account ID is not masked by default in workflow logs since it's not conside
268
270
#### Unset current credentials
269
271
Sometimes, existing credentials in your runner can get in the way of the intended outcome, and the recommended solution is to include another step in your workflow which unsets the environment variables set by this action. Now if you set the `unset-current-credentials` input to `true`, the workaround is made eaiser
270
272
273
+
#### Special characters in AWS_SECRET_ACCESS_KEY
274
+
Some edge cases are unable to properly parse an `AWS_SECRET_ACCESS_KEY` if it
275
+
contains special characters. For more information, please see the
If you set the `special-characters-workaround` option, this action will
278
+
continually retry fetching credentials until we get one that does not have
279
+
special characters. This option overrides the `disable-retry` and
280
+
`retry-max-attempts`options.
281
+
271
282
## OIDC
272
283
273
284
We recommend using [GitHub's OIDC provider](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services) to get short-lived AWS credentials needed for your actions. When using OIDC, this action will create a JWT unique to the workflow run, and it will use this JWT to assume the role. For this action to create the JWT, it is required for your workflow to have the `id-token: write` permission:
Copy file name to clipboardexpand all lines: action.yml
+3
Original file line number
Diff line number
Diff line change
@@ -70,6 +70,9 @@ inputs:
70
70
retry-max-attempts:
71
71
description: The maximum number of attempts it will attempt to retry the assume role call. By default it will retry 12 times
72
72
required: false
73
+
special-characters-workaround:
74
+
description: Some environments do not support special characters in AWS_SECRET_ACCESS_KEY. This option will retry fetching credentials until the secret access key does not contain special characters. This option overrides disable-retry and retry-max-attempts. This option is disabled by default
75
+
required: false
73
76
outputs:
74
77
aws-account-id:
75
78
description: The AWS account ID for the provided credentials
0 commit comments