terraform-aws-oidc-github-actions-module | Terraform module
kandi X-RAY | terraform-aws-oidc-github-actions-module Summary
kandi X-RAY | terraform-aws-oidc-github-actions-module Summary
terraform-aws-oidc-github-actions-module is a Go library. terraform-aws-oidc-github-actions-module has no bugs, it has no vulnerabilities, it has a Permissive License and it has low support. You can download it from GitHub.
A module for creating a federated OIDC provider on AWS for dynamically authenticating and authorizing GitHub Actions workflow runs.
A module for creating a federated OIDC provider on AWS for dynamically authenticating and authorizing GitHub Actions workflow runs.
Support
Quality
Security
License
Reuse
Support
terraform-aws-oidc-github-actions-module has a low active ecosystem.
It has 8 star(s) with 0 fork(s). There are 2 watchers for this library.
It had no major release in the last 12 months.
There are 0 open issues and 1 have been closed. On average issues are closed in 14 days. There are 1 open pull requests and 0 closed requests.
It has a neutral sentiment in the developer community.
The latest version of terraform-aws-oidc-github-actions-module is v0.2.10
Quality
terraform-aws-oidc-github-actions-module has no bugs reported.
Security
terraform-aws-oidc-github-actions-module has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
License
terraform-aws-oidc-github-actions-module is licensed under the MIT License. This license is Permissive.
Permissive licenses have the least restrictions, and you can use them in most projects.
Reuse
terraform-aws-oidc-github-actions-module releases are available to install and integrate.
Installation instructions, examples and code snippets are available.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of terraform-aws-oidc-github-actions-module
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of terraform-aws-oidc-github-actions-module
terraform-aws-oidc-github-actions-module Key Features
No Key Features are available at this moment for terraform-aws-oidc-github-actions-module.
terraform-aws-oidc-github-actions-module Examples and Code Snippets
No Code Snippets are available at this moment for terraform-aws-oidc-github-actions-module.
Community Discussions
No Community Discussions are available at this moment for terraform-aws-oidc-github-actions-module.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install terraform-aws-oidc-github-actions-module
Add the module to one of your Terraform configurations to create an OIDC provider and one or more roles that can be assumed via the provider. The names and ARNs of the created roles will be provided in the roles output of the module. You will need one or more names for GitHub repositories that GitHub Actions should be allowed to assume the roles from in order to configure the module:.
AWS provides a "native" GitHub Actions action to enable you to use the configured OIDC provider. Just add the following two bits to any job for a GitHub repository you passed under github_repository to the module previously and you should be good to go:. You can get the ARN of any of the roles created via the roles output of the OIDC module. In keeping with our previous example, the ARN for the some-role role would be accessible via module.oidc_auth.roles["some-role"]. You will probably want to add the ARN for role-to-assume as a GitHub Actions secret instead of writing it directly into the workflow YAML.
AWS provides a "native" GitHub Actions action to enable you to use the configured OIDC provider. Just add the following two bits to any job for a GitHub repository you passed under github_repository to the module previously and you should be good to go:. You can get the ARN of any of the roles created via the roles output of the OIDC module. In keeping with our previous example, the ARN for the some-role role would be accessible via module.oidc_auth.roles["some-role"]. You will probably want to add the ARN for role-to-assume as a GitHub Actions secret instead of writing it directly into the workflow YAML.
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page