Skip to content

Conversation

@phisco
Copy link
Contributor

@phisco phisco commented Feb 6, 2026

Replace static AWS_USR/AWS_PSW credentials with OIDC-based authentication using aws-actions/configure-aws-credentials. This eliminates the need for rotating IAM access keys every 90 days.

  • Add id-token:write permissions to jobs that need AWS access
  • Add Configure AWS Credentials step using role assumption
  • Remove hardcoded AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY/AWS_DEFAULT_REGION
  • Guard steps on AWS_ROLE_ARN instead of AWS_USR

Description of your changes

Fixes #

I have:

  • Read and followed Upbound's contribution process.
  • Run make reviewable to ensure this PR is ready for review.
  • Added backport release-x.y labels to auto-backport this PR, as appropriate.

How has this code been tested

Replace static AWS_USR/AWS_PSW credentials with OIDC-based
authentication using aws-actions/configure-aws-credentials. This
eliminates the need for rotating IAM access keys every 90 days.

- Add id-token:write permissions to jobs that need AWS access
- Add Configure AWS Credentials step using role assumption
- Remove hardcoded AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY/AWS_DEFAULT_REGION
- Guard steps on AWS_ROLE_ARN instead of AWS_USR

Signed-off-by: Philippe Scorsolini <p.scorsolini@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant