aws-cdk-github-oidc 2.3.3 → 2.3.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.jsii CHANGED
@@ -3514,7 +3514,7 @@
3514
3514
  },
3515
3515
  "name": "aws-cdk-github-oidc",
3516
3516
  "readme": {
3517
- "markdown": "# AWS CDK Github OpenID Connect\n\n![cdk-support](https://img.shields.io/badge/cdk-%20typescript%20|%20python%20-informational \"TypeScript | Python\")\n[![release](https://github.com/aripalo/aws-cdk-github-oidc/actions/workflows/release.yml/badge.svg)](https://github.com/aripalo/aws-cdk-github-oidc/actions/workflows/release.yml)\n[![codecov](https://codecov.io/gh/aripalo/aws-cdk-github-oidc/branch/main/graph/badge.svg?token=5X44RM6J17)](https://codecov.io/gh/aripalo/aws-cdk-github-oidc)\n\n---\n\nAWS [CDK](https://aws.amazon.com/cdk/) constructs that define:\n- Github Actions as OpenID Connect Identity Provider into AWS IAM\n- IAM Roles that can be assumed by Github Actions workflows\n\nThese constructs allows you to harden your AWS deployment security by removing the need to create long-term access keys for Github Actions and instead use OpenID Connect to Authenticate your Github Action workflow with AWS IAM.\n\n## Background information\n\n![github-aws-oidc](/assets/github-aws-oidc.svg \"Github OIDC with AWS\")\n\n- [GitHub Actions: Secure cloud deployments with OpenID Connect](https://github.blog/changelog/2021-10-27-github-actions-secure-cloud-deployments-with-openid-connect/) on Github Changelog Blog.\n- [Security hardening your deployments](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments) on Github Docs.\n- [Assuming a role with `aws-actions/configure-aws-credentials`](https://github.com/aws-actions/configure-aws-credentials#assuming-a-role).\n- Shout-out to [Richard H. Boyd](https://twitter.com/rchrdbyd) for helping me to debug Github OIDC setup with AWS IAM and his [Deploying to AWS with Github Actions](https://www.githubuniverse.com/2021/session/692586/deploying-to-aws-with-github-actions)-talk.\n- Shout-out to [Aidan W Steele](https://twitter.com/__steele) and his blog post [AWS federation comes to GitHub Actions](https://awsteele.com/blog/2021/09/15/aws-federation-comes-to-github-actions.html) for being the original inspiration for this.\n\n\n<br/>\n\n## Getting started\n\n```shell\nnpm i -D aws-cdk-github-oidc\n```\n\n<br/>\n\n### OpenID Connect Identity Provider trust for AWS IAM\n\nTo create a new Github OIDC provider configuration into AWS IAM:\n```ts\nimport { GithubActionsIdentityProvider } from 'aws-cdk-github-oidc';\n\nconst provider = new GithubActionsIdentityProvider(scope, 'GithubProvider');\n```\n\nIn the background this creates an OIDC provider trust configuration into AWS IAM with an [issuer URL of `https://token.actions.githubusercontent.com`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws), audiences (client IDs) configured as `['sts.amazonaws.com']` (which matches the [`aws-actions/configure-aws-credentials`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws) implementation) and the thumbprint as Github's `a031c46782e6e6c662c2c87c76da9aa62ccabd8e`\n\n<br/>\n\n### Retrieving a reference to an existing Github OIDC provider configuration\n\nRemember, **there can be only one (Github OIDC provider per AWS Account)**, so to retrieve a reference to existing Github OIDC provider use `fromAccount` static method:\n```ts\nimport { GithubActionsIdentityProvider } from 'aws-cdk-github-oidc';\n\nconst provider = GithubActionsIdentityProvider.fromAccount(scope, 'GithubProvider');\n```\n\n<br/>\n\n### Defining a role for Github Actions workflow to assume\n\n```ts\nimport { GithubActionsRole } from 'aws-cdk-github-oidc';\n\nconst uploadRole = new GithubActionsRole(scope, 'UploadRole', {\n provider: provider, // reference into the OIDC provider\n owner: 'octo-org', // your repository owner (organization or user) name\n repo: 'octo-repo', // your repository name (without the owner name)\n filter: 'ref:refs/tags/v*', // JWT sub suffix filter, defaults to '*'\n});\n\n// use it like any other role, for example grant S3 bucket write access:\nmyBucket.grantWrite(uploadRole);\n```\n\nYou may pass in any `iam.RoleProps` into the construct's props, except `assumedBy` which will be defined by this construct (CDK will fail if you do):\n```ts\nconst deployRole = new GithubActionsRole(scope, 'DeployRole', {\n provider: provider,\n owner: 'octo-org',\n repo: 'octo-repo',\n roleName: 'MyDeployRole',\n description: 'This role deploys stuff to AWS',\n maxSessionDuration: cdk.Duration.hours(2),\n});\n\n// You may also use various \"add*\" policy methods!\n// \"AdministratorAccess\" not really a good idea, just for an example here:\ndeployRole.addManagedPolicy(iam.ManagedPolicy.fromAwsManagedPolicyName('AdministratorAccess'));\n```\n\n<br/>\n\n#### Subject Filter\n\nBy default the value of `filter` property will be `'*'` which means any workflow (from given repository) from any branch, tag, environment or pull request can assume this role. To further stricten the OIDC trust policy on the role, you may adjust the subject filter as seen on the [examples in Github Docs](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud); For example:\n\n| `filter` value | Descrition |\n| :----------------------------- | :--------------------------------------- |\n| `'ref:refs/tags/v*'` | Allow only tags with prefix of `v` |\n| `'ref:refs/heads/demo-branch'` | Allow only from branch `demo-branch` |\n| `'pull_request'` | Allow only from pull request |\n| `'environment:Production'` | Allow only from `Production` environment |\n\n<br/>\n\n### Github Actions Workflow\n\nTo actually utilize this in your Github Actions workflow, use [aws-actions/configure-aws-credentials](https://github.com/aws-actions/configure-aws-credentials) to [assume a role](https://github.com/aws-actions/configure-aws-credentials#assuming-a-role).\n\nAt the moment you must use the `master` version (until AWS releases a new tag):\n\n```yaml\njobs:\n deploy:\n name: Upload to Amazon S3\n runs-on: ubuntu-latest\n permissions:\n id-token: write # needed to interact with GitHub's OIDC Token endpoint.\n contents: read\n steps:\n - name: Checkout\n uses: actions/checkout@v2\n\n - name: Configure AWS credentials\n uses: aws-actions/configure-aws-credentials@master\n with:\n role-to-assume: arn:aws:iam::123456789012:role/MyUploadRole\n #role-session-name: MySessionName # Optional\n aws-region: us-east-1\n\n - name: Sync files to S3\n run: |\n aws s3 sync . s3://my-example-bucket\n```\n\n<br/>\n\n### Development Status\n\nThese constructs are fresh out from the oven, since [Github just announced](https://github.blog/changelog/2021-10-27-github-actions-secure-cloud-deployments-with-openid-connect/) the OpenID Connect feature as generally available. I've been playing around with the feature for some time, but the construct itself haven't yet been widely used.\n\nThese constructs will stay in `v0.x.x` for a while, to allow easier bug fixing & breaking changes _if absolutely needed_. Once bugs are fixed (if any), the constructs will be published with `v1` major version and will be marked as stable.\n\nCurrently only TypeScript, Python and Go versions provided, but before going to stable, I'll probably others (supported by JSII) depending on the amount of work required - so no promises!\n"
3517
+ "markdown": "# AWS CDK Github OpenID Connect\n\n![cdk-support](https://img.shields.io/badge/cdk-%20typescript%20|%20python%20-informational \"TypeScript | Python\")\n[![release](https://github.com/aripalo/aws-cdk-github-oidc/actions/workflows/release.yml/badge.svg)](https://github.com/aripalo/aws-cdk-github-oidc/actions/workflows/release.yml)\n[![codecov](https://codecov.io/gh/aripalo/aws-cdk-github-oidc/branch/main/graph/badge.svg?token=5X44RM6J17)](https://codecov.io/gh/aripalo/aws-cdk-github-oidc)\n\n---\n\nAWS [CDK](https://aws.amazon.com/cdk/) constructs that define:\n\n- Github Actions as OpenID Connect Identity Provider into AWS IAM\n- IAM Roles that can be assumed by Github Actions workflows\n\nThese constructs allows you to harden your AWS deployment security by removing the need to create long-term access keys for Github Actions and instead use OpenID Connect to Authenticate your Github Action workflow with AWS IAM.\n\n## Background information\n\n![github-aws-oidc](/assets/github-aws-oidc.svg \"Github OIDC with AWS\")\n\n- [GitHub Actions: Secure cloud deployments with OpenID Connect](https://github.blog/changelog/2021-10-27-github-actions-secure-cloud-deployments-with-openid-connect/) on Github Changelog Blog.\n- [Security hardening your deployments](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments) on Github Docs.\n- [Assuming a role with `aws-actions/configure-aws-credentials`](https://github.com/aws-actions/configure-aws-credentials#assuming-a-role).\n- Shout-out to [Richard H. Boyd](https://twitter.com/rchrdbyd) for helping me to debug Github OIDC setup with AWS IAM and his [Deploying to AWS with Github Actions](https://www.githubuniverse.com/2021/session/692586/deploying-to-aws-with-github-actions)-talk.\n- Shout-out to [Aidan W Steele](https://twitter.com/__steele) and his blog post [AWS federation comes to GitHub Actions](https://awsteele.com/blog/2021/09/15/aws-federation-comes-to-github-actions.html) for being the original inspiration for this.\n\n<br/>\n\n## Getting started\n\n```shell\nnpm i -D aws-cdk-github-oidc\n```\n\n<br/>\n\n### OpenID Connect Identity Provider trust for AWS IAM\n\nTo create a new Github OIDC provider configuration into AWS IAM:\n\n```ts\nimport { GithubActionsIdentityProvider } from \"aws-cdk-github-oidc\";\n\nconst provider = new GithubActionsIdentityProvider(scope, \"GithubProvider\");\n```\n\nIn the background this creates an OIDC provider trust configuration into AWS IAM with an [issuer URL of `https://token.actions.githubusercontent.com`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws) and audiences (client IDs) configured as `['sts.amazonaws.com']` (which matches the [`aws-actions/configure-aws-credentials`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws) implementation).\n\n<br/>\n\n### Retrieving a reference to an existing Github OIDC provider configuration\n\nRemember, **there can be only one (Github OIDC provider per AWS Account)**, so to retrieve a reference to existing Github OIDC provider use `fromAccount` static method:\n\n```ts\nimport { GithubActionsIdentityProvider } from \"aws-cdk-github-oidc\";\n\nconst provider = GithubActionsIdentityProvider.fromAccount(\n scope,\n \"GithubProvider\"\n);\n```\n\n<br/>\n\n### Defining a role for Github Actions workflow to assume\n\n```ts\nimport { GithubActionsRole } from \"aws-cdk-github-oidc\";\n\nconst uploadRole = new GithubActionsRole(scope, \"UploadRole\", {\n provider: provider, // reference into the OIDC provider\n owner: \"octo-org\", // your repository owner (organization or user) name\n repo: \"octo-repo\", // your repository name (without the owner name)\n filter: \"ref:refs/tags/v*\", // JWT sub suffix filter, defaults to '*'\n});\n\n// use it like any other role, for example grant S3 bucket write access:\nmyBucket.grantWrite(uploadRole);\n```\n\nYou may pass in any `iam.RoleProps` into the construct's props, except `assumedBy` which will be defined by this construct (CDK will fail if you do):\n\n```ts\nconst deployRole = new GithubActionsRole(scope, \"DeployRole\", {\n provider: provider,\n owner: \"octo-org\",\n repo: \"octo-repo\",\n roleName: \"MyDeployRole\",\n description: \"This role deploys stuff to AWS\",\n maxSessionDuration: cdk.Duration.hours(2),\n});\n\n// You may also use various \"add*\" policy methods!\n// \"AdministratorAccess\" not really a good idea, just for an example here:\ndeployRole.addManagedPolicy(\n iam.ManagedPolicy.fromAwsManagedPolicyName(\"AdministratorAccess\")\n);\n```\n\n<br/>\n\n#### Subject Filter\n\nBy default the value of `filter` property will be `'*'` which means any workflow (from given repository) from any branch, tag, environment or pull request can assume this role. To further stricten the OIDC trust policy on the role, you may adjust the subject filter as seen on the [examples in Github Docs](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud); For example:\n\n| `filter` value | Descrition |\n| :----------------------------- | :--------------------------------------- |\n| `'ref:refs/tags/v*'` | Allow only tags with prefix of `v` |\n| `'ref:refs/heads/demo-branch'` | Allow only from branch `demo-branch` |\n| `'pull_request'` | Allow only from pull request |\n| `'environment:Production'` | Allow only from `Production` environment |\n\n<br/>\n\n### Github Actions Workflow\n\nTo actually utilize this in your Github Actions workflow, use [aws-actions/configure-aws-credentials](https://github.com/aws-actions/configure-aws-credentials) to [assume a role](https://github.com/aws-actions/configure-aws-credentials#assuming-a-role).\n\nAt the moment you must use the `master` version (until AWS releases a new tag):\n\n```yaml\njobs:\n deploy:\n name: Upload to Amazon S3\n runs-on: ubuntu-latest\n permissions:\n id-token: write # needed to interact with GitHub's OIDC Token endpoint.\n contents: read\n steps:\n - name: Checkout\n uses: actions/checkout@v2\n\n - name: Configure AWS credentials\n uses: aws-actions/configure-aws-credentials@master\n with:\n role-to-assume: arn:aws:iam::123456789012:role/MyUploadRole\n #role-session-name: MySessionName # Optional\n aws-region: us-east-1\n\n - name: Sync files to S3\n run: |\n aws s3 sync . s3://my-example-bucket\n```\n\n<br/>\n\n### Development Status\n\nThese constructs are fresh out from the oven, since [Github just announced](https://github.blog/changelog/2021-10-27-github-actions-secure-cloud-deployments-with-openid-connect/) the OpenID Connect feature as generally available. I've been playing around with the feature for some time, but the construct itself haven't yet been widely used.\n\nThese constructs will stay in `v0.x.x` for a while, to allow easier bug fixing & breaking changes _if absolutely needed_. Once bugs are fixed (if any), the constructs will be published with `v1` major version and will be marked as stable.\n\nCurrently only TypeScript, Python and Go versions provided, but before going to stable, I'll probably others (supported by JSII) depending on the amount of work required - so no promises!\n"
3518
3518
  },
3519
3519
  "repository": {
3520
3520
  "type": "git",
@@ -3553,7 +3553,7 @@
3553
3553
  },
3554
3554
  "locationInModule": {
3555
3555
  "filename": "src/provider.ts",
3556
- "line": 55
3556
+ "line": 51
3557
3557
  },
3558
3558
  "parameters": [
3559
3559
  {
@@ -3595,7 +3595,7 @@
3595
3595
  },
3596
3596
  "locationInModule": {
3597
3597
  "filename": "src/provider.ts",
3598
- "line": 39
3598
+ "line": 35
3599
3599
  },
3600
3600
  "name": "fromAccount",
3601
3601
  "parameters": [
@@ -3643,27 +3643,6 @@
3643
3643
  "type": {
3644
3644
  "primitive": "string"
3645
3645
  }
3646
- },
3647
- {
3648
- "const": true,
3649
- "docs": {
3650
- "stability": "experimental"
3651
- },
3652
- "immutable": true,
3653
- "locationInModule": {
3654
- "filename": "src/provider.ts",
3655
- "line": 21
3656
- },
3657
- "name": "thumbprints",
3658
- "static": true,
3659
- "type": {
3660
- "collection": {
3661
- "elementtype": {
3662
- "primitive": "string"
3663
- },
3664
- "kind": "array"
3665
- }
3666
- }
3667
3646
  }
3668
3647
  ],
3669
3648
  "symbolId": "src/provider:GithubActionsIdentityProvider"
@@ -4040,6 +4019,6 @@
4040
4019
  "symbolId": "src/iam-role-props:RoleProps"
4041
4020
  }
4042
4021
  },
4043
- "version": "2.3.3",
4044
- "fingerprint": "1bP7LK9lB2+82VkCyhPsrZ2IvhEoFnMN4fjPg793oT0="
4022
+ "version": "2.3.5",
4023
+ "fingerprint": "JgnHIEtYgNmVAKO2J8nIGGkweUv2YSgdZfGNOMdNS4M="
4045
4024
  }
package/.nvmrc CHANGED
@@ -1 +1 @@
1
- 14.21.1
1
+ 16.20.0
package/API.md CHANGED
@@ -72,12 +72,6 @@ CDK Construct ID given to the construct.
72
72
 
73
73
  ---
74
74
 
75
- ##### `thumbprints` <a name="aws-cdk-github-oidc.GithubActionsIdentityProvider.property.thumbprints"></a>
76
-
77
- - *Type:* `string`[]
78
-
79
- ---
80
-
81
75
  ### GithubActionsRole <a name="aws-cdk-github-oidc.GithubActionsRole"></a>
82
76
 
83
77
  Define an IAM Role that can be assumed by Github Actions workflow via Github OpenID Connect Identity Provider.
package/README.md CHANGED
@@ -7,6 +7,7 @@
7
7
  ---
8
8
 
9
9
  AWS [CDK](https://aws.amazon.com/cdk/) constructs that define:
10
+
10
11
  - Github Actions as OpenID Connect Identity Provider into AWS IAM
11
12
  - IAM Roles that can be assumed by Github Actions workflows
12
13
 
@@ -22,7 +23,6 @@ These constructs allows you to harden your AWS deployment security by removing t
22
23
  - Shout-out to [Richard H. Boyd](https://twitter.com/rchrdbyd) for helping me to debug Github OIDC setup with AWS IAM and his [Deploying to AWS with Github Actions](https://www.githubuniverse.com/2021/session/692586/deploying-to-aws-with-github-actions)-talk.
23
24
  - Shout-out to [Aidan W Steele](https://twitter.com/__steele) and his blog post [AWS federation comes to GitHub Actions](https://awsteele.com/blog/2021/09/15/aws-federation-comes-to-github-actions.html) for being the original inspiration for this.
24
25
 
25
-
26
26
  <br/>
27
27
 
28
28
  ## Getting started
@@ -36,23 +36,28 @@ npm i -D aws-cdk-github-oidc
36
36
  ### OpenID Connect Identity Provider trust for AWS IAM
37
37
 
38
38
  To create a new Github OIDC provider configuration into AWS IAM:
39
+
39
40
  ```ts
40
- import { GithubActionsIdentityProvider } from 'aws-cdk-github-oidc';
41
+ import { GithubActionsIdentityProvider } from "aws-cdk-github-oidc";
41
42
 
42
- const provider = new GithubActionsIdentityProvider(scope, 'GithubProvider');
43
+ const provider = new GithubActionsIdentityProvider(scope, "GithubProvider");
43
44
  ```
44
45
 
45
- In the background this creates an OIDC provider trust configuration into AWS IAM with an [issuer URL of `https://token.actions.githubusercontent.com`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws), audiences (client IDs) configured as `['sts.amazonaws.com']` (which matches the [`aws-actions/configure-aws-credentials`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws) implementation) and the thumbprint as Github's `a031c46782e6e6c662c2c87c76da9aa62ccabd8e`
46
+ In the background this creates an OIDC provider trust configuration into AWS IAM with an [issuer URL of `https://token.actions.githubusercontent.com`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws) and audiences (client IDs) configured as `['sts.amazonaws.com']` (which matches the [`aws-actions/configure-aws-credentials`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws) implementation).
46
47
 
47
48
  <br/>
48
49
 
49
50
  ### Retrieving a reference to an existing Github OIDC provider configuration
50
51
 
51
52
  Remember, **there can be only one (Github OIDC provider per AWS Account)**, so to retrieve a reference to existing Github OIDC provider use `fromAccount` static method:
53
+
52
54
  ```ts
53
- import { GithubActionsIdentityProvider } from 'aws-cdk-github-oidc';
55
+ import { GithubActionsIdentityProvider } from "aws-cdk-github-oidc";
54
56
 
55
- const provider = GithubActionsIdentityProvider.fromAccount(scope, 'GithubProvider');
57
+ const provider = GithubActionsIdentityProvider.fromAccount(
58
+ scope,
59
+ "GithubProvider"
60
+ );
56
61
  ```
57
62
 
58
63
  <br/>
@@ -60,13 +65,13 @@ const provider = GithubActionsIdentityProvider.fromAccount(scope, 'GithubProvide
60
65
  ### Defining a role for Github Actions workflow to assume
61
66
 
62
67
  ```ts
63
- import { GithubActionsRole } from 'aws-cdk-github-oidc';
68
+ import { GithubActionsRole } from "aws-cdk-github-oidc";
64
69
 
65
- const uploadRole = new GithubActionsRole(scope, 'UploadRole', {
66
- provider: provider, // reference into the OIDC provider
67
- owner: 'octo-org', // your repository owner (organization or user) name
68
- repo: 'octo-repo', // your repository name (without the owner name)
69
- filter: 'ref:refs/tags/v*', // JWT sub suffix filter, defaults to '*'
70
+ const uploadRole = new GithubActionsRole(scope, "UploadRole", {
71
+ provider: provider, // reference into the OIDC provider
72
+ owner: "octo-org", // your repository owner (organization or user) name
73
+ repo: "octo-repo", // your repository name (without the owner name)
74
+ filter: "ref:refs/tags/v*", // JWT sub suffix filter, defaults to '*'
70
75
  });
71
76
 
72
77
  // use it like any other role, for example grant S3 bucket write access:
@@ -74,19 +79,22 @@ myBucket.grantWrite(uploadRole);
74
79
  ```
75
80
 
76
81
  You may pass in any `iam.RoleProps` into the construct's props, except `assumedBy` which will be defined by this construct (CDK will fail if you do):
82
+
77
83
  ```ts
78
- const deployRole = new GithubActionsRole(scope, 'DeployRole', {
84
+ const deployRole = new GithubActionsRole(scope, "DeployRole", {
79
85
  provider: provider,
80
- owner: 'octo-org',
81
- repo: 'octo-repo',
82
- roleName: 'MyDeployRole',
83
- description: 'This role deploys stuff to AWS',
86
+ owner: "octo-org",
87
+ repo: "octo-repo",
88
+ roleName: "MyDeployRole",
89
+ description: "This role deploys stuff to AWS",
84
90
  maxSessionDuration: cdk.Duration.hours(2),
85
91
  });
86
92
 
87
93
  // You may also use various "add*" policy methods!
88
94
  // "AdministratorAccess" not really a good idea, just for an example here:
89
- deployRole.addManagedPolicy(iam.ManagedPolicy.fromAwsManagedPolicyName('AdministratorAccess'));
95
+ deployRole.addManagedPolicy(
96
+ iam.ManagedPolicy.fromAwsManagedPolicyName("AdministratorAccess")
97
+ );
90
98
  ```
91
99
 
92
100
  <br/>
@@ -95,7 +103,7 @@ deployRole.addManagedPolicy(iam.ManagedPolicy.fromAwsManagedPolicyName('Administ
95
103
 
96
104
  By default the value of `filter` property will be `'*'` which means any workflow (from given repository) from any branch, tag, environment or pull request can assume this role. To further stricten the OIDC trust policy on the role, you may adjust the subject filter as seen on the [examples in Github Docs](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud); For example:
97
105
 
98
- | `filter` value | Descrition |
106
+ | `filter` value | Descrition |
99
107
  | :----------------------------- | :--------------------------------------- |
100
108
  | `'ref:refs/tags/v*'` | Allow only tags with prefix of `v` |
101
109
  | `'ref:refs/heads/demo-branch'` | Allow only from branch `demo-branch` |
@@ -119,19 +127,19 @@ jobs:
119
127
  id-token: write # needed to interact with GitHub's OIDC Token endpoint.
120
128
  contents: read
121
129
  steps:
122
- - name: Checkout
123
- uses: actions/checkout@v2
124
-
125
- - name: Configure AWS credentials
126
- uses: aws-actions/configure-aws-credentials@master
127
- with:
128
- role-to-assume: arn:aws:iam::123456789012:role/MyUploadRole
129
- #role-session-name: MySessionName # Optional
130
- aws-region: us-east-1
131
-
132
- - name: Sync files to S3
133
- run: |
134
- aws s3 sync . s3://my-example-bucket
130
+ - name: Checkout
131
+ uses: actions/checkout@v2
132
+
133
+ - name: Configure AWS credentials
134
+ uses: aws-actions/configure-aws-credentials@master
135
+ with:
136
+ role-to-assume: arn:aws:iam::123456789012:role/MyUploadRole
137
+ #role-session-name: MySessionName # Optional
138
+ aws-region: us-east-1
139
+
140
+ - name: Sync files to S3
141
+ run: |
142
+ aws s3 sync . s3://my-example-bucket
135
143
  ```
136
144
 
137
145
  <br/>
package/lib/provider.d.ts CHANGED
@@ -15,7 +15,6 @@ export interface IGithubActionsIdentityProvider extends iam.IOpenIdConnectProvid
15
15
  */
16
16
  export declare class GithubActionsIdentityProvider extends iam.OpenIdConnectProvider implements IGithubActionsIdentityProvider {
17
17
  static readonly issuer: string;
18
- static readonly thumbprints: string[];
19
18
  /**
20
19
  * Retrieve a reference to existing Github OIDC provider in your AWS account.
21
20
  * An AWS account can only have single Github OIDC provider configured into it,
package/lib/provider.js CHANGED
@@ -27,7 +27,6 @@ class GithubActionsIdentityProvider extends iam.OpenIdConnectProvider {
27
27
  constructor(scope, id) {
28
28
  super(scope, id, {
29
29
  url: `https://${GithubActionsIdentityProvider.issuer}`,
30
- thumbprints: GithubActionsIdentityProvider.thumbprints,
31
30
  clientIds: ['sts.amazonaws.com'],
32
31
  });
33
32
  }
@@ -52,10 +51,6 @@ class GithubActionsIdentityProvider extends iam.OpenIdConnectProvider {
52
51
  }
53
52
  exports.GithubActionsIdentityProvider = GithubActionsIdentityProvider;
54
53
  _a = JSII_RTTI_SYMBOL_1;
55
- GithubActionsIdentityProvider[_a] = { fqn: "aws-cdk-github-oidc.GithubActionsIdentityProvider", version: "2.3.3" };
54
+ GithubActionsIdentityProvider[_a] = { fqn: "aws-cdk-github-oidc.GithubActionsIdentityProvider", version: "2.3.5" };
56
55
  GithubActionsIdentityProvider.issuer = 'token.actions.githubusercontent.com';
57
- GithubActionsIdentityProvider.thumbprints = [
58
- 'a031c46782e6e6c662c2c87c76da9aa62ccabd8e',
59
- '6938fd4d98bab03faadb97b34396831e3780aea1',
60
- ];
61
- //# sourceMappingURL=data:application/json;base64,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
56
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoicHJvdmlkZXIuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvcHJvdmlkZXIudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7QUFBQSxtQ0FBbUM7QUFDbkMsMkNBQTJDO0FBUTNDOzs7Ozs7O0dBT0c7QUFDSCxNQUFhLDZCQUE4QixTQUFRLEdBQUcsQ0FBQyxxQkFBcUI7SUF1QjFFOzs7Ozs7Ozs7T0FTRztJQUNILFlBQVksS0FBZ0IsRUFBRSxFQUFVO1FBQ3RDLEtBQUssQ0FBQyxLQUFLLEVBQUUsRUFBRSxFQUFFO1lBQ2YsR0FBRyxFQUFFLFdBQVcsNkJBQTZCLENBQUMsTUFBTSxFQUFFO1lBQ3RELFNBQVMsRUFBRSxDQUFDLG1CQUFtQixDQUFDO1NBQ2pDLENBQUMsQ0FBQztJQUNMLENBQUM7SUFsQ0Q7Ozs7Ozs7Ozs7OztPQVlHO0lBQ0ksTUFBTSxDQUFDLFdBQVcsQ0FBQyxLQUFnQixFQUFFLEVBQVU7UUFDcEQsTUFBTSxTQUFTLEdBQUcsR0FBRyxDQUFDLEtBQUssQ0FBQyxFQUFFLENBQUMsS0FBSyxDQUFDLENBQUMsT0FBTyxDQUFDO1FBQzlDLE1BQU0sV0FBVyxHQUFHLGdCQUFnQixTQUFTLGtCQUFrQiw2QkFBNkIsQ0FBQyxNQUFNLEVBQUUsQ0FBQztRQUN0RyxPQUFPLEdBQUcsQ0FBQyxxQkFBcUIsQ0FBQyw0QkFBNEIsQ0FBQyxLQUFLLEVBQUUsRUFBRSxFQUFFLFdBQVcsQ0FBQyxDQUFDO0lBQ3hGLENBQUM7O0FBckJILHNFQXVDQzs7O0FBckN3QixvQ0FBTSxHQUFXLHFDQUFxQyxDQUFDIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0ICogYXMgY2RrIGZyb20gJ2F3cy1jZGstbGliJztcbmltcG9ydCAqIGFzIGlhbSBmcm9tICdhd3MtY2RrLWxpYi9hd3MtaWFtJztcbmltcG9ydCB7IENvbnN0cnVjdCB9IGZyb20gJ2NvbnN0cnVjdHMnO1xuXG4vKipcbiAqIERlc2NyaWJlcyBhIEdpdGh1YiBPcGVuSUQgQ29ubmVjdCBJZGVudGl0eSBQcm92aWRlciBmb3IgQVdTIElBTS5cbiAqL1xuZXhwb3J0IGludGVyZmFjZSBJR2l0aHViQWN0aW9uc0lkZW50aXR5UHJvdmlkZXIgZXh0ZW5kcyBpYW0uSU9wZW5JZENvbm5lY3RQcm92aWRlciB7IH1cblxuLyoqXG4gKiBHaXRodWIgQWN0aW9ucyBhcyBPcGVuSUQgQ29ubmVjdCBJZGVudGl0eSBQcm92aWRlciBmb3IgQVdTIElBTS5cbiAqIFRoZXJlIGNhbiBiZSBvbmx5IG9uZSAocGVyIEFXUyBBY2NvdW50KS5cbiAqXG4gKiBVc2UgYGZyb21BY2NvdW50YCB0byByZXRyaWV2ZSBhIHJlZmVyZW5jZSB0byBleGlzdGluZyBHaXRodWIgT0lEQyBwcm92aWRlci5cbiAqXG4gKiBAc2VlIGh0dHBzOi8vZG9jcy5naXRodWIuY29tL2VuL2FjdGlvbnMvZGVwbG95bWVudC9zZWN1cml0eS1oYXJkZW5pbmcteW91ci1kZXBsb3ltZW50cy9jb25maWd1cmluZy1vcGVuaWQtY29ubmVjdC1pbi1hbWF6b24td2ViLXNlcnZpY2VzXG4gKi9cbmV4cG9ydCBjbGFzcyBHaXRodWJBY3Rpb25zSWRlbnRpdHlQcm92aWRlciBleHRlbmRzIGlhbS5PcGVuSWRDb25uZWN0UHJvdmlkZXIgaW1wbGVtZW50cyBJR2l0aHViQWN0aW9uc0lkZW50aXR5UHJvdmlkZXIge1xuXG4gIHB1YmxpYyBzdGF0aWMgcmVhZG9ubHkgaXNzdWVyOiBzdHJpbmcgPSAndG9rZW4uYWN0aW9ucy5naXRodWJ1c2VyY29udGVudC5jb20nO1xuXG4gIC8qKlxuICAgKiBSZXRyaWV2ZSBhIHJlZmVyZW5jZSB0byBleGlzdGluZyBHaXRodWIgT0lEQyBwcm92aWRlciBpbiB5b3VyIEFXUyBhY2NvdW50LlxuICAgKiBBbiBBV1MgYWNjb3VudCBjYW4gb25seSBoYXZlIHNpbmdsZSBHaXRodWIgT0lEQyBwcm92aWRlciBjb25maWd1cmVkIGludG8gaXQsXG4gICAqIHNvIGludGVybmFsbHkgdGhlIHJlZmVyZW5jZSBpcyBtYWRlIGJ5IGNvbnN0cnVjdGluZyB0aGUgQVJOIGZyb20gQVdTXG4gICAqIEFjY291bnQgSUQgJiBHaXRodWIgaXNzdWVyIFVSTC5cbiAgICpcbiAgICogQHBhcmFtIHNjb3BlIENESyBTdGFjayBvciBDb25zdHJ1Y3QgdG8gd2hpY2ggdGhlIHByb3ZpZGVyIGlzIGFzc2lnbmVkIHRvXG4gICAqIEBwYXJhbSBpZCBDREsgQ29uc3RydWN0IElEIGdpdmVuIHRvIHRoZSBjb25zdHJ1Y3RcbiAgICogQHJldHVybnMgYSBDREsgQ29uc3RydWN0IHJlcHJlc2VudGluZyB0aGUgR2l0aHViIE9JREMgcHJvdmlkZXJcbiAgICpcbiAgICogQGV4YW1wbGVcbiAgICogR2l0aHViQWN0aW9uc0lkZW50aXR5UHJvdmlkZXIuZnJvbUFjY291bnQoc2NvcGUsIFwiR2l0aHViUHJvdmlkZXJcIik7XG4gICAqL1xuICBwdWJsaWMgc3RhdGljIGZyb21BY2NvdW50KHNjb3BlOiBDb25zdHJ1Y3QsIGlkOiBzdHJpbmcpOiBJR2l0aHViQWN0aW9uc0lkZW50aXR5UHJvdmlkZXIge1xuICAgIGNvbnN0IGFjY291bnRJZCA9IGNkay5TdGFjay5vZihzY29wZSkuYWNjb3VudDtcbiAgICBjb25zdCBwcm92aWRlckFybiA9IGBhcm46YXdzOmlhbTo6JHthY2NvdW50SWR9Om9pZGMtcHJvdmlkZXIvJHtHaXRodWJBY3Rpb25zSWRlbnRpdHlQcm92aWRlci5pc3N1ZXJ9YDtcbiAgICByZXR1cm4gaWFtLk9wZW5JZENvbm5lY3RQcm92aWRlci5mcm9tT3BlbklkQ29ubmVjdFByb3ZpZGVyQXJuKHNjb3BlLCBpZCwgcHJvdmlkZXJBcm4pO1xuICB9XG5cbiAgLyoqXG4gICAqIERlZmluZSBhIG5ldyBHaXRodWIgT3BlbklEIENvbm5lY3QgSWRlbnRpdHkgUFJvdmlkZXIgZm9yIEFXUyBJQU0uXG4gICAqIFRoZXJlIGNhbiBiZSBvbmx5IG9uZSAocGVyIEFXUyBBY2NvdW50KS5cbiAgICpcbiAgICogQHBhcmFtIHNjb3BlIENESyBTdGFjayBvciBDb25zdHJ1Y3QgdG8gd2hpY2ggdGhlIHByb3ZpZGVyIGlzIGFzc2lnbmVkIHRvXG4gICAqIEBwYXJhbSBpZCBDREsgQ29uc3RydWN0IElEIGdpdmVuIHRvIHRoZSBjb25zdHJ1Y3RcbiAgICpcbiAgICogQGV4YW1wbGVcbiAgICogbmV3IEdpdGh1YkFjdGlvbnNJZGVudGl0eVByb3ZpZGVyKHNjb3BlLCBcIkdpdGh1YlByb3ZpZGVyXCIpO1xuICAgKi9cbiAgY29uc3RydWN0b3Ioc2NvcGU6IENvbnN0cnVjdCwgaWQ6IHN0cmluZykge1xuICAgIHN1cGVyKHNjb3BlLCBpZCwge1xuICAgICAgdXJsOiBgaHR0cHM6Ly8ke0dpdGh1YkFjdGlvbnNJZGVudGl0eVByb3ZpZGVyLmlzc3Vlcn1gLFxuICAgICAgY2xpZW50SWRzOiBbJ3N0cy5hbWF6b25hd3MuY29tJ10sXG4gICAgfSk7XG4gIH1cbn1cbiJdfQ==
package/lib/role.js CHANGED
@@ -101,5 +101,5 @@ class GithubActionsRole extends iam.Role {
101
101
  }
102
102
  exports.GithubActionsRole = GithubActionsRole;
103
103
  _a = JSII_RTTI_SYMBOL_1;
104
- GithubActionsRole[_a] = { fqn: "aws-cdk-github-oidc.GithubActionsRole", version: "2.3.3" };
104
+ GithubActionsRole[_a] = { fqn: "aws-cdk-github-oidc.GithubActionsRole", version: "2.3.5" };
105
105
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"role.js","sourceRoot":"","sources":["../src/role.ts"],"names":[],"mappings":";;;;;AAAA,mCAAmC;AACnC,2CAA2C;AAG3C,iDAAiD;AACjD,yCAA2F;AAoE3F;;;;;;;;;;;;;;;;;GAiBG;AACH,MAAa,iBAAkB,SAAQ,GAAG,CAAC,IAAI;IAqC7C;;;;;;;;;;;;;;;;;OAiBG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA6B;QAErE,MAAM,EAAE,QAAQ,EAAE,KAAK,EAAE,IAAI,EAAE,GAAG,KAAK,CAAC;QAExC,sBAAsB;QACtB,iBAAiB,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;QAC9C,iBAAiB,CAAC,YAAY,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;QAE5C,iBAAiB;QACjB,MAAM,OAAO,GAAG,iBAAiB,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QACvD,MAAM,SAAS,GAAG,iBAAiB,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QAE5D,+BAA+B;QAC/B,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,GAAG,SAAS;YACZ,SAAS,EAAE,IAAI,GAAG,CAAC,oBAAoB,CAAC,QAAQ,CAAC,wBAAwB,EAAE;gBACzE,UAAU,EAAE;oBACV,oDAAoD;oBACpD,CAAC,GAAG,wCAA6B,CAAC,MAAM,MAAM,CAAC,EAAE,OAAO;iBACzD;gBACD,YAAY,EAAE;oBACZ,uEAAuE;oBACvE,0KAA0K;oBAC1K,CAAC,GAAG,wCAA6B,CAAC,MAAM,MAAM,CAAC,EAAE,mBAAmB;iBACrE;aACF,CAAC;SACH,CAAC,CAAC;IAEL,CAAC;IAjFD;;;;OAIG;IACK,MAAM,CAAC,gBAAgB,CAAC,KAA6B;QAC3D,MAAM,YAAY,GAAQ,KAAK,CAAC;QAChC,OAAO,YAAY,CAAC,QAAQ,CAAC;QAC7B,OAAO,YAAY,CAAC,KAAK,CAAC;QAC1B,OAAO,YAAY,CAAC,IAAI,CAAC;QACzB,OAAO,YAAY,CAAC,MAAM,CAAC;QAC3B,OAAO,YAAY,CAAC;IACtB,CAAC;IAED,8DAA8D;IACtD,MAAM,CAAC,aAAa,CAAC,KAAgB,EAAE,KAAa;QAC1D,IAAI,sBAAmB,CAAC,IAAI,CAAC,KAAK,CAAC,KAAK,IAAI,EAAE;YAC5C,GAAG,CAAC,WAAW,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,oCAAoC,KAAK,0KAA0K,CAAC,CAAC;SACzP;IACH,CAAC;IAED,4DAA4D;IACpD,MAAM,CAAC,YAAY,CAAC,KAAgB,EAAE,IAAY;QACxD,IAAI,IAAI,KAAK,EAAE,EAAE;YACf,GAAG,CAAC,WAAW,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,mCAAmC,IAAI,6BAA6B,CAAC,CAAC;SAC1G;IACH,CAAC;IAED,oDAAoD;IAC5C,MAAM,CAAC,aAAa,CAAC,KAA0B;QACrD,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,MAAM,GAAG,GAAG,EAAE,GAAG,KAAK,CAAC;QAC5C,OAAO,QAAQ,KAAK,IAAI,IAAI,IAAI,MAAM,EAAE,CAAC;IAC3C,CAAC;;AAlCH,8CAoFC","sourcesContent":["import * as cdk from 'aws-cdk-lib';\nimport * as iam from 'aws-cdk-lib/aws-iam';\nimport { Construct } from 'constructs';\nimport { RoleProps } from './iam-role-props';\nimport githubUsernameRegex from './owner-regexp';\nimport { GithubActionsIdentityProvider, IGithubActionsIdentityProvider } from './provider';\n\n/**\n * Github related configuration that forms the trust policy for this IAM Role.\n */\nexport interface GithubConfiguration {\n\n  /**\n   * Reference to Github OpenID Connect Provider configured in AWS IAM.\n   *\n   * Either pass an construct defined by `new GithubActionsIdentityProvider`\n   * or a retrieved reference from `GithubActionsIdentityProvider.fromAccount`.\n   * There can be only one (per AWS Account).\n   */\n  readonly provider: IGithubActionsIdentityProvider;\n\n  /**\n   * Repository owner (organization or username).\n   *\n   * @example\n   * 'octo-org'\n   */\n  readonly owner: string;\n\n  /**\n   * Repository name (slug) without the owner.\n   *\n   * @example\n   * 'octo-repo'\n   */\n  readonly repo: string;\n\n  /**\n   * Subject condition filter, appended after `repo:${owner}/${repo}:` string in IAM Role trust relationship.\n   *\n   * @default\n   * '*'\n   *\n   * You may use this value to only allow Github to assume the role on specific branches, tags, environments, pull requests etc.\n   * @example\n   * 'ref:refs/tags/v*'\n   * 'ref:refs/heads/demo-branch'\n   * 'pull_request'\n   * 'environment:Production'\n   *\n   * @see https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#examples\n   */\n  readonly filter?: string;\n}\n\n/**\n * Props that define the IAM Role that can be assumed by Github Actions workflow\n * via Github OpenID Connect Identity Provider.\n *\n * Besides `GithubConfiguration`, you may pass in any `iam.RoleProps` except `assumedBy`\n * which will be defined by this construct (CDK will fail if you do).\n *\n * @example\n * {\n *   provider: GithubActionsIdentityProvider.fromAccount(scope, \"GithubProvider\"),\n *   owner: 'octo-org',\n *   repo: 'octo-repo',\n *   filter: 'ref:refs/tags/v*',\n *   roleName: 'MyDeployRole',\n * }\n */\nexport interface GithubActionsRoleProps extends GithubConfiguration, RoleProps {}\n\n/**\n * Define an IAM Role that can be assumed by Github Actions workflow\n * via Github OpenID Connect Identity Provider.\n *\n * Besides `GithubConfiguration`, you may pass in any `iam.RoleProps` except `assumedBy`\n * which will be defined by this construct (CDK will fail if you do).\n *\n * @example\n * const uploadRole = new GithubActionsRole(scope, \"UploadRole\", {\n *   provider: GithubActionsIdentityProvider.fromAccount(scope, \"GithubProvider\"),\n *   owner: 'octo-org',\n *   repo: 'octo-repo',\n *   filter: 'ref:refs/tags/v*',\n *   roleName: 'MyUploadRole',\n * });\n *\n * myBucket.grantWrite(uploadRole);\n */\nexport class GithubActionsRole extends iam.Role {\n\n  /**\n   * Extracts props given for the created IAM Role Construct.\n   * @param props for the GithubActionsRole\n   * @returns for the IAM Role\n   */\n  private static extractRoleProps(props: GithubActionsRoleProps): iam.RoleProps {\n    const extractProps = <any>props;\n    delete extractProps.provider;\n    delete extractProps.owner;\n    delete extractProps.repo;\n    delete extractProps.filter;\n    return extractProps;\n  }\n\n  /** Validates the Github owner (organization or user) name. */\n  private static validateOwner(scope: Construct, owner: string): void {\n    if (githubUsernameRegex.test(owner) !== true) {\n      cdk.Annotations.of(scope).addError(`Invalid Github Repository Owner \"${owner}\". Must only contain alphanumeric characters or hyphens, cannot have multiple consecutive hyphens, cannot begin or end with a hypen and maximum lenght is 39 characters.`);\n    }\n  }\n\n  /** Validates the Github repository name (without owner). */\n  private static validateRepo(scope: Construct, repo: string): void {\n    if (repo === '') {\n      cdk.Annotations.of(scope).addError(`Invalid Github Repository Name \"${repo}\". May not be empty string.`);\n    }\n  }\n\n  /** Formats the `sub` value used in trust policy. */\n  private static formatSubject(props: GithubConfiguration): string {\n    const { owner, repo, filter = '*' } = props;\n    return `repo:${owner}/${repo}:${filter}`;\n  }\n\n\n  /**\n   * Define an IAM Role that can be assumed by Github Actions workflow\n   * via Github OpenID Connect Identity Provider.\n   *\n   * Besides `GithubConfiguration`, you may pass in any `iam.RoleProps` except `assumedBy`\n   * which will be defined by this construct (CDK will fail if you do).\n   *\n   * @example\n   * const uploadRole = new GithubActionsRole(scope, \"UploadRole\", {\n   *   provider: GithubActionsIdentityProvider.fromAccount(scope, \"GithubProvider\"),\n   *   owner: 'octo-org',\n   *   repo: 'octo-repo',\n   *   filter: 'ref:refs/tags/v*',\n   *   roleName: 'MyUploadRole',\n   * });\n   *\n   * myBucket.grantWrite(uploadRole);\n   */\n  constructor(scope: Construct, id: string, props: GithubActionsRoleProps) {\n\n    const { provider, owner, repo } = props;\n\n    // Perform validations\n    GithubActionsRole.validateOwner(scope, owner);\n    GithubActionsRole.validateRepo(scope, repo);\n\n    // Prepare values\n    const subject = GithubActionsRole.formatSubject(props);\n    const roleProps = GithubActionsRole.extractRoleProps(props);\n\n    // The actual IAM Role creation\n    super(scope, id, {\n      ...roleProps,\n      assumedBy: new iam.WebIdentityPrincipal(provider.openIdConnectProviderArn, {\n        StringLike: {\n          // Only allow specified subjects to assume this role\n          [`${GithubActionsIdentityProvider.issuer}:sub`]: subject,\n        },\n        StringEquals: {\n          // Audience is always sts.amazonaws.com with AWS official Github Action\n          // https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws\n          [`${GithubActionsIdentityProvider.issuer}:aud`]: 'sts.amazonaws.com',\n        },\n      }),\n    });\n\n  }\n}\n\n"]}
package/package.json CHANGED
@@ -40,7 +40,7 @@
40
40
  "devDependencies": {
41
41
  "@types/github-username-regex": "^1.0.0",
42
42
  "@types/jest": "^27",
43
- "@types/node": "^14",
43
+ "@types/node": "^16",
44
44
  "@typescript-eslint/eslint-plugin": "^5",
45
45
  "@typescript-eslint/parser": "^5",
46
46
  "aws-cdk-lib": "2.89.0",
@@ -82,11 +82,11 @@
82
82
  "openid-connect"
83
83
  ],
84
84
  "engines": {
85
- "node": ">= 14.21.1"
85
+ "node": ">= 16.20.0"
86
86
  },
87
87
  "main": "lib/index.js",
88
88
  "license": "Apache-2.0",
89
- "version": "2.3.3",
89
+ "version": "2.3.5",
90
90
  "jest": {
91
91
  "testMatch": [
92
92
  "<rootDir>/src/**/__tests__/**/*.ts?(x)",