OIDC with AWS
The Buildkite Agent's oidc
command allows you to request an Open ID Connect (OIDC) token containing claims about the current pipeline and its job. These tokens can be consumed by AWS and exchanged for an Identity and Access Management (IAM) role with AWS-scoped permissions.
This process uses the following Buildkite plugins to implement OIDC with AWS and your Buildkite pipelines:
Learn more about:
How OIDC tokens are constructed and how to extract and use claims in the OpenID Connect Core documentation.
Amazon's implementation of OIDC with their federated system in Create an OpenID Connect (OIDC) identity provider in IAM of the AWS IAM User Guide.
Step 1: Set up an OIDC provider in your AWS account
First, you'll need to set up an IAM OIDC provider in your AWS account.
Learn more about how to do this in the Create an OpenID Connect (OIDC) identity provider in IAM page of the AWS IAM User Guide.
On this page, as part of the Creating and managing an OIDC provider (console) process, specify the following values for the:
Provider URL:
https://agent.buildkite.com
Audience:
sts.amazonaws.com
Step 2: Create a new (or update an existing) IAM role to use with your pipelines
Creating new or updating existing IAM roles is conducted through your AWS account.
Learn more about how to do this in the Creating a role using custom trust policies (console) page of the AWS IAM User Guide.
As part of this process:
Choose the Custom trust policy role type.
-
Copy the following example trust policy in the following JSON code block and paste it into a code editor:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Federated": "arn:aws:iam::AWS_ACCOUNT_ID:oidc-provider/agent.buildkite.com" }, "Action": "sts:AssumeRoleWithWebIdentity", "Condition": { "StringEquals": { "agent.buildkite.com:aud": "sts.amazonaws.com" }, "StringLike": { "agent.buildkite.com:sub": "organization:ORGANIZATION_SLUG:pipeline:PIPELINE_SLUG:ref:REF:commit:BUILD_COMMIT:step:STEP_KEY" }, "IpAddress": { "aws:SourceIp": [ "AGENT_PUBLIC_IP_ONE", "AGENT_PUBLIC_IP_TWO" ] } } } ] }
Learn more about creating custom trust policies in Creating IAM policies of the AWS IAM User Guide.
-
Modify the
Principal
section of the pasted code snippet accordingly:- Ensure that this is set to
Federated
, and points to theoidc-provider
Amazon Resource Name (ARN) from the Provider URL you configured above (that is,agent.buildkite.com
). - Change
AWS_ACCOUNT_ID
to your actual AWS account ID.
- Ensure that this is set to
-
Modify the
Condition
section of the code snippet accordingly:- Ensure the
StringEquals
subsection's audience field name has a value that matches the Audience you configured above (that is,sts.amazonaws.com
). The audience field name is your provider URL appended by:aud
—agent.buildkite.com:aud
. -
Ensure the
StringLike
subsection's subject field name has at least one value that matches the format:organization:ORGANIZATION_SLUG:pipeline:PIPELINE_SLUG:ref:REF:commit:BUILD_COMMIT:step:STEP_KEY
, where the constituent fields of this line determine the conditions under which the IAM role is granted in exchange for the OIDC token. The subject field name is your provider URL appended by:sub
—agent.buildkite.com:sub
. This value format is equivalent to the subject (sub
) claim when requesting for an OIDC token for the current job, and the IAM role is granted when the values specified in these constituent fields have been met. The subject field values in your custom trust policy can be different to those specified by your OIDC token's subject claim value, making your trust policy either more restrictive or permissive. When formulating such a value, the following constituent field's value:-
ORGANIZATION_SLUG
can be obtained:- From the end of your Buildkite URL, after accessing Pipelines in the global navigation of your organization in Buildkite.
-
By running the List organizations REST API query to obtain this value from
slug
in the response. For example:curl - X GET "https://api.buildkite.com/v2/organizations" \ -H "Authorization: Bearer $TOKEN"
-
PIPELINE_SLUG
(optional) can be obtained:- From the end of your Buildkite URL, after accessing Pipelines in the global navigation of your organization in Buildkite, then accessing the specific pipeline to be specified in the custom trust policy.
-
By running the List pipelines REST API query to obtain this value from
slug
in the response from the specific pipeline. For example:curl - X GET "https://api.buildkite.com/v2/organizations/{org.slug}/pipelines" \ -H "Authorization: Bearer $TOKEN"
REF
(optional) is usually replaced withrefs/heads/main
to restrict the IAM role's access to themain
branch only,refs/tags/*
to restrict the IAM role's access to tagged releases, or a wildcard*
if the IAM role can be accessed and used by all branches.BUILD_COMMIT
(optional) can be omitted and if so, is usually replaced with a single wildcard*
at the end of the line.STEP_KEY
(optional) can be omitted and if so, is usually replaced with a single wildcard*
at the end of the line.
-
Note: When formulating your subject field's value, you can replace any of the constituent field values above with a wildcard
*
to not set limits on those constituent fields.For example, to allow the IAM role to be used for any pipeline in the Buildkite organization
example-org
, when building on any branch or tag, specify a single subject field value oforganization:example-org:*
.You can also allow this IAM role to be used with other pipelines, branches, commits and steps by specifying multiple comma-separated values for the
agent.buildkite.com:sub
subject field. - Ensure the
-
If you have dedicated/static public IP addresses and wish to implement defense in depth against an attacker stealing an OIDC token to access your cloud environment, retain the
Condition
section'sIpAddress
subsection, and modify its values (AGENT_PUBLIC_IP_ONE
andAGENT_PUBLIC_IP_TWO
) with a list of your agent's IP addresses or CIDR range or block.Only OIDC token exchange requests (for IAM roles) from Buildkite Agents with these IP addresses will be permitted.
-
Verify that your custom trust policy is complete. The following example trust policy (noting that
AWS_ACCOUNT_ID
has not been specified) will only allow the exchange of an agent's OIDC tokens with IAM roles when:- the Buildkite organization is
example-org
- the Buildkite pipeline is
example-pipeline
- building on both the
main
branch and tagged releases - on Buildkite Agents whose IP addresses are either
192.0.2.0
or198.51.100.0
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Federated": "arn:aws:iam::AWS_ACCOUNT_ID:oidc-provider/agent.buildkite.com" }, "Action": "sts:AssumeRoleWithWebIdentity", "Condition": { "StringEquals": { "agent.buildkite.com:aud": "sts.amazonaws.com" }, "StringLike": { "agent.buildkite.com:sub": [ "organization:example-org:pipeline:example-pipeline:ref:refs/heads/main:*", "organization:example-org:pipeline:example-pipeline:ref:refs/tags/*:*" ] }, "IpAddress": { "aws:SourceIp": [ "192.0.2.0", "198.51.100.0" ] } } } ] }
- the Buildkite organization is
In the Custom trust policy section, copy your modified custom trust policy, paste it into your IAM role, and complete the next few steps up to specifying the Role name.
Specify an appropriate Role name, for example,
example-pipeline-oidc-for-ssm
, and complete the remaining steps.
Step 3: Configure your IAM role with AWS actions
Add an inline or managed IAM policy (separate to the custom trust policy configured above) to allow the IAM role to perform any actions your pipeline needs. Learn more about how to do this in Managed policies and inline policies of the AWS IAM User Guide.
Common examples are permissions to read secrets from SSM and push images to ECR, although this would depend on the purpose of your pipeline.
In the following example, we'll allow access to read an SSM Parameter Store key named /pipelines/example-pipeline/oidc-for-ssm/example-deploy-key
by attaching the following inline policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ssm:GetParameters"
],
"Resource": "arn:aws:ssm:us-east-1:012345678910:parameter/pipelines/example-pipeline/oidc-for-ssm/example-deploy-key"
}
]
}
Step 4: Configure your pipeline to assume the role
Finally, use the two Buildkite plugins to use the IAM role and to pull in the SSM parameter (added above):
Incorporate the following into your pipeline (modifying as required):
agents:
queue: mac-small
steps:
- label: ":aws: Deploy to Production"
key: deploy-to-production
command: echo "Example Deploy Key equals \$EXAMPLE_DEPLOY_KEY"
env:
AWS_DEFAULT_REGION: us-east-1
AWS_REGION: us-east-1
plugins:
- aws-assume-role-with-web-identity#v1.0.0:
role-arn: arn:aws:iam::012345678910:role/example-pipeline-oidc-for-ssm
- aws-ssm#v1.0.0:
parameters:
EXAMPLE_DEPLOY_KEY: /pipelines/example-pipeline/oidc-for-ssm/example-deploy-key