You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <a name="input_assume_role_policy_statements"></a> [assume\_role\_policy\_statements](#input\_assume\_role\_policy\_statements) | A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage | <pre>map(object({<br/> sid = optional(string)<br/> actions = optional(list(string))<br/> not_actions = optional(list(string))<br/> effect = optional(string, "Allow")<br/> resources = optional(list(string))<br/> not_resources = optional(list(string))<br/> principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> not_principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> condition = optional(list(object({<br/> test = string<br/> variable = string<br/> values = list(string)<br/> })))<br/> }))</pre> | `null` | no |
156
+
| <aname="input_condition"></a> [condition](#input\_condition)|[Condition constraints](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#condition) applied to the trust policy(s) enabled | <pre>list(object({<br/> test = string<br/> variable = string<br/> values = list(string)<br/> }))</pre> |`[]`| no |
154
157
| <aname="input_create"></a> [create](#input\_create)| Controls if resources should be created (affects all resources) |`bool`|`true`| no |
155
158
| <aname="input_create_instance_profile"></a> [create\_instance\_profile](#input\_create\_instance\_profile)| Determines whether to create an instance profile |`bool`|`false`| no |
156
159
| <aname="input_description"></a> [description](#input\_description)| Description of the role |`string`|`null`| no |
157
160
| <aname="input_enable_bitbucket_oidc"></a> [enable\_bitbucket\_oidc](#input\_enable\_bitbucket\_oidc)| Enable Bitbucket OIDC provider trust for the role |`bool`|`false`| no |
158
161
| <aname="input_enable_github_oidc"></a> [enable\_github\_oidc](#input\_enable\_github\_oidc)| Enable GitHub OIDC provider trust for the role |`bool`|`false`| no |
159
162
| <aname="input_enable_oidc"></a> [enable\_oidc](#input\_enable\_oidc)| Enable OIDC provider trust for the role |`bool`|`false`| no |
160
163
| <aname="input_enable_saml"></a> [enable\_saml](#input\_enable\_saml)| Enable SAML provider trust for the role |`bool`|`false`| no |
164
+
| <aname="input_github_provider"></a> [github\_provider](#input\_github\_provider)| The GitHub OIDC provider URL *without the `https://` prefix |`string`|`"token.actions.githubusercontent.com"`| no |
165
+
| <aname="input_inline_policy_statements"></a> [inline\_policy\_statements](#input\_inline\_policy\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for inline policy permissions | <pre>map(object({<br/> sid = optional(string)<br/> actions = optional(list(string))<br/> not_actions = optional(list(string))<br/> effect = optional(string, "Allow")<br/> resources = optional(list(string))<br/> not_resources = optional(list(string))<br/> principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> not_principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> condition = optional(list(object({<br/> test = string<br/> variable = string<br/> values = list(string)<br/> })))<br/> }))</pre> |`null`| no |
161
166
| <aname="input_max_session_duration"></a> [max\_session\_duration](#input\_max\_session\_duration)| Maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default maximum of one hour is applied. This setting can have a value from 1 hour to 12 hours |`number`|`null`| no |
162
167
| <aname="input_name"></a> [name](#input\_name)| Name to use on IAM role created |`string`|`null`| no |
163
168
| <aname="input_oidc_account_id"></a> [oidc\_account\_id](#input\_oidc\_account\_id)| An overriding AWS account ID where the OIDC provider lives; leave empty to use the current account ID for the AWS provider |`string`|`null`| no |
0 commit comments