Org-wide deployment #258
Replies: 1 comment 3 replies
-
If you're talking about multiple AWS accounts in the same organization, then yes, you probably want OIDC to provide access to multiple accounts. Automating this would probably require a hook-up to whatever is vending those accounts. Ideally you create your AWS accounts with CDK and then part of that process can be setting the names of repos you wish to have access to that account. You can then use something like aws-cdk-github-oidc to automate the role creation. If you choose to deploy a stack to every account and use instance roles, you will have a similar issue of installing the runner app on only the right GitHub repositories so they don't get access to other runners. It depends on your current setup, but I would think in general a single runner instance with OIDC would be simpler to maintain. If you are talking about using the same runners across multiple GitHub organizations, then that's only recommended on GitHub Enterprise Server (on-prem) because it requires making the runner app "public". In that context, public only means in that GitHub server. If you choose to make your runner app public on GitHub.com, which is technically possible but not recommended, you would give anyone on GitHub the option to install it on their repository. If they install it on their repository, then they can use your runners. That's why on GitHub.com, the only recommended option to use the runners cross-organization would be multiple runner apps. At the moment each app requires another deployment of the |
Beta Was this translation helpful? Give feedback.
-
Has anyone attempted to use this cross-org? Should the idea here be to deploy a stack to every account? Or should the runners assume a role into each account? And if the answer is assume a role, how do you control access to roles? I noticed there's a comment about OIDC and repo names in IAM roles, but that seems like it would be challenging to automate/scale.
Beta Was this translation helpful? Give feedback.
All reactions