-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New sub-module for IAM assumable role with OIDC #37
New sub-module for IAM assumable role with OIDC #37
Conversation
70a34ee
to
e4d260c
Compare
e4d260c
to
632e31a
Compare
I dont know if it could be usefull, but here's how I implemented it meanwhile the submodule is ready. I'm using the terraform-aws-eks module for "example_aws_eks_dev_001"
What pisses me now is the fingerprint bug in the provider... used the workaround for now.. |
Hi, will this be merged? |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
This PR adds a new submodule that creates a single role that can be assumed by OIDC subjects. The motivation for the change is to setup IAM Roles for EKS Service Accounts.