Skip to content

Commit 818b780

Browse files
bluesentinelsecMichael Long
andauthored
Update workflows to use IAM role auth (#49)
* add IAM role authentication --------- Co-authored-by: Michael Long <mlongii@amazon.com>
1 parent 37617b0 commit 818b780

File tree

9 files changed

+10
-7
lines changed

9 files changed

+10
-7
lines changed

.github/workflows/build_scan_container.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ jobs:
4444
aws-region: ${{ secrets.AWS_REGION }}
4545
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
4646
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
47-
# TODO: use an IAM role
47+
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
4848

4949
- name: Scan built image with Inspector
5050
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0

.github/workflows/example_display_findings.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ jobs:
2323
aws-region: ${{ secrets.AWS_REGION }}
2424
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
2525
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
26+
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
2627

2728

2829
# modify this block to scan your intended artifact

.github/workflows/run_unit_tests.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ jobs:
2323
aws-region: ${{ secrets.AWS_REGION }}
2424
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
2525
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
26-
# TODO: use an IAM role
26+
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
2727

2828
- name: Run unit tests
2929
run: make test

.github/workflows/test_archive.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828
aws-region: ${{ secrets.AWS_REGION }}
2929
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
3030
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
31-
# TODO: use an IAM role
31+
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
3232

3333
- name: Test archive scan
3434
id: inspector

.github/workflows/test_binary.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828
aws-region: ${{ secrets.AWS_REGION }}
2929
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
3030
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
31-
# TODO: use an IAM role
31+
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
3232

3333
- name: Test binary scan
3434
id: inspector

.github/workflows/test_containers.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828
aws-region: ${{ secrets.AWS_REGION }}
2929
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
3030
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
31-
# TODO: use an IAM role
31+
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
3232

3333
- name: Test container scan
3434
id: inspector

.github/workflows/test_installation.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,10 @@ jobs:
2222
- name: Configure AWS credentials
2323
uses: aws-actions/configure-aws-credentials@v4
2424
with:
25-
aws-region: 'us-east-1'
25+
aws-region: ${{ secrets.AWS_REGION }}
2626
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
2727
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
28+
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
2829

2930
- name: Test Amazon Inspector GitHub Actions plugin
3031
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main

.github/workflows/test_repository.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ jobs:
2727
aws-region: ${{ secrets.AWS_REGION }}
2828
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
2929
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
30-
# TODO: use an IAM role
30+
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
3131

3232
- name: Test repository scan
3333
id: inspector

.github/workflows/test_vuln_thresholds.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ jobs:
2727
aws-region: ${{ secrets.AWS_REGION }}
2828
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
2929
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
30+
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
3031

3132
- name: Scan artifact with Inspector
3233
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main

0 commit comments

Comments
 (0)