You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: packages/artillery/lib/platform/aws/iam-cf-templates/github-oidc.yml
+65-8
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
AWSTemplateFormatVersion: '2010-09-09'
2
-
Description: Creates an ArtilleryGitHubOIDCForFargateRole IAM role with permissions needed to run Artillery Fargate tests from a specified GitHub repository. An OIDC identity provider for Github will also be created if it is not already present in the account.
2
+
Description: Sets up IAM resources needed to trigger Artillery distributed tests (on AWS Fargate/Lambda) from a specified GitHub repository. Uses OpenID Connect (OIDC) to authenticate requests from GitHub.
3
3
Metadata:
4
4
AWS::CloudFormation::Interface:
5
5
ParameterGroups:
@@ -19,13 +19,13 @@ Metadata:
19
19
GitHubBranch:
20
20
default: "GitHub branch"
21
21
GitHubOIDCProviderExists:
22
-
default: "GitHub OIDC identity provider already created for the account?"
22
+
default: "Is GitHub OIDC identity provider already created for the account?"
23
23
24
24
Parameters:
25
25
GitHubRepository:
26
26
Type: String
27
27
Default: ""
28
-
Description: The GitHub repository (orgname/reponame) to be allowed to assume the created IAM role using OIDC (e.g. "artilleryio/artillery").
28
+
Description: The GitHub repository ("GitHubOrganizationOrUser/GitHubRepository") to be allowed to assume the created IAM role using OIDC (e.g. "artilleryio/artillery").
29
29
30
30
GitHubBranch:
31
31
Type: String
@@ -38,7 +38,8 @@ Parameters:
38
38
AllowedValues:
39
39
- 'Yes'
40
40
- 'No'
41
-
Description: This will let CloudFormation know whether it needs to create the provider. (If it exists, can be found at Services -> IAM -> Identity providers as 'token.actions.githubusercontent.com').
41
+
Description: This will let CloudFormation know whether it needs to create the OIDC identity provider for GitHub. (If it exists, can be found at IAM > Identity providers).
0 commit comments