-
-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
use dynamic data pull for GHA cert thumbprint #70
Conversation
Terraform plan in terraform Plan: 0 to add, 1 to change, 0 to destroy.Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
!~ update in-place
Terraform will perform the following actions:
# module.iam_oidc_gha_incubator.aws_iam_openid_connect_provider.github_actions will be updated in-place
!~ resource "aws_iam_openid_connect_provider" "github_actions" {
id = "arn:aws:iam::035866691871:oidc-provider/token.actions.githubusercontent.com"
tags = {}
!~ thumbprint_list = [
!~ "1b511abead59c6ce207077c0bf0e0043b1382612" -> "d89e3bd43d5d909b47a18977aa9d5ce36cee184c",
]
# (4 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy. ❌ Error applying plan in Apply Terraform changes on merge #17 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@tylerthome this is a great approach, but according to the plan it does change the thumbrint of the cert used for oidc. Is that intentional?
Looks like github may have eaten the link to the blog post you provided - can you add back in? And for the IAM error, assuming this is what you are referring to?
Yes, this is expected. I saw that the GitHub team was posting these on occasion when they cycled the cert, like here but haven't seen any recent updates. The initial hard-coded thumbprint in this module came from a GHA or AWS doc about the OIDC mechanism, where it seemed like a semi-fixed value -- I'll update if I can find that one again just for posterity.
Thanks for catching that, added to the original comment again.
Yes that's the one - not too certain this will resolve that since I hadn't set |
Thanks tyler - according to that article we can prob remove the thumbprint entirely, if I'm interpreting that correctly? If you'd like to keep it for now that's ok with me. |
Thanks! Will plan to follow this up to see if we can remove the thumbprint, as soon as I have a moment to test that in another env |
What changes did you make?
data
block for the GitHub Actions token issuer's TLS certificateRationale behind the changes?
Testing done for these changes
What did you learn or can share that is new?(optional)
N/A
Notes