-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Cross-account in iam-assumable-role-with-oidc #158
feat: Cross-account in iam-assumable-role-with-oidc #158
Conversation
Hi @antonbabenko, I saw the pre-commit hook issue, so I've run it locally but it changes almost all - if not all - the |
Can this be merged? Would be useful for my use-case at least. |
same. We have a need for this as well |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
This adds support for cross-account assumable role with OIDC
Motivation and Context
We have a use-case where a EKS service account in an account should be able to assume a role in a EKS cluster in another account.
Fixes #157
Breaking Changes
It doesn't bring a breaking change.
How Has This Been Tested?
examples/*
projectsIn my environment, the module
iam-assumable-role-with-oidc
is used as a submodule in our custom irsa terraform module.I created a new irsa module, calling my updated
terraform-aws-iam//modules/iam-assumable-role-with-oidc
.As a variable, I've set
oidc_fully_qualified_audience
tosts.amazonaws.com
and then rantf apply
Below the relevant part of it:
terraform version:
v0.14.6
aws provider version:
v3.37.0