From 8fd1e4ac082f6fd080484c449dd93fb712e48751 Mon Sep 17 00:00:00 2001 From: Riley Snyder Date: Fri, 3 Oct 2025 09:31:13 -0500 Subject: [PATCH 1/2] Update aws-oidc-token-plugin.md --- .../continuous-integration/secure-ci/aws-oidc-token-plugin.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/continuous-integration/secure-ci/aws-oidc-token-plugin.md b/docs/continuous-integration/secure-ci/aws-oidc-token-plugin.md index f3869dc04f6..bd3afe85125 100644 --- a/docs/continuous-integration/secure-ci/aws-oidc-token-plugin.md +++ b/docs/continuous-integration/secure-ci/aws-oidc-token-plugin.md @@ -23,7 +23,7 @@ For more on configuring AWS for OIDC, refer to [AWS OIDC setup](https://docs.aws name: assume-role-with-oidc identifier: assume_role_with_oidc spec: - image: harnesscommunity/drone-aws-oidc + image: plugins/aws-oidc settings: role_arn: arn:aws:iam::123456789012:role/harness-ci-role role_session_name: foo # defaults to harness-aws-oidc @@ -77,4 +77,4 @@ Example: [AWS OIDC plugin GitHub Repo](https://github.com/harness-community/drone-aws-oidc) -[GCP OIDC Token Plugin](/docs/continuous-integration/secure-ci/gcp-oidc-token-plugin) \ No newline at end of file +[GCP OIDC Token Plugin](/docs/continuous-integration/secure-ci/gcp-oidc-token-plugin) From 15e93b995967f367bbaf2f888593f861ba5012cb Mon Sep 17 00:00:00 2001 From: Riley Snyder Date: Fri, 3 Oct 2025 09:37:53 -0500 Subject: [PATCH 2/2] Update aws-oidc-token-plugin.md --- .../secure-ci/aws-oidc-token-plugin.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/docs/continuous-integration/secure-ci/aws-oidc-token-plugin.md b/docs/continuous-integration/secure-ci/aws-oidc-token-plugin.md index bd3afe85125..632d5b9698d 100644 --- a/docs/continuous-integration/secure-ci/aws-oidc-token-plugin.md +++ b/docs/continuous-integration/secure-ci/aws-oidc-token-plugin.md @@ -25,9 +25,9 @@ For more on configuring AWS for OIDC, refer to [AWS OIDC setup](https://docs.aws spec: image: plugins/aws-oidc settings: - role_arn: arn:aws:iam::123456789012:role/harness-ci-role - role_session_name: foo # defaults to harness-aws-oidc - duration: 3600 # in seconds + IAMROLEARN: arn:aws:iam::123456789012:role/harness-ci-role + ROLE_SESSION_NAME: foo # defaults to harness-aws-oidc + DURATION: 3600 # in seconds ``` This step will use the injected OIDC token from Harness to authenticate with AWS and assume the specified role.