1 Answer
- Newest
- Most votes
- Most comments
0
To answer your question, there is no out-of-the box experience to inject your credentials at the test host level.
Here are the some options which you can try.
- Use S3 Presigned URL: Pass an S3 presigned URL of a text file containing the GITHUB_TOKEN, with a short expiry time greater than the overall test execution time. During the test execution, you can call this S3 pre-signed URL to fetch the GITHUB_TOKEN at run.
- Device Farm VPC ENI Feature To use networking-based restrictions to access any AWS Services, you can execute the Device Farm job using the Device Farm VPC ENI feature. This feature creates an elastic network interface in your provided VPC configuration. You can then create private VPC endpoints for AWS services, such as Secrets Manager, AWS Lambda, or S3 buckets, and access your actual credentials using these VPC endpoints. This way, even if your scoped-down credentials or presigned URL are exposed, the network restrictions will prevent access to your actual credentials. Please note that the Device Farm VPC ENI feature is only available for Device Farm private devices. For more details related to private device refer to [1].
[1] https://docs.aws.amazon.com/devicefarm/latest/developerguide/working-with-private-devices.html
answered 10 months ago
Relevant content
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 4 years ago
