You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+34-4Lines changed: 34 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,35 +81,65 @@ See `examples` directory for working examples to reference
81
81
## Available features
82
82
83
83
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
84
+
# AWS Gitlab OIDC Provider Terraform Module
85
+
86
+
## Purpose
87
+
This module allows you to create a Gitlab OIDC provider for your AWS account, that will allow Gitlab pipelines to securely authenticate against the AWS API using an IAM role
| <aname="input_variable"></a> [variable](#input\_variable)| defaul,description,type |`string`|`"variable"`| no |
122
+
| <aname="input_aud_value"></a> [aud\_value](#input\_aud\_value)| (Required) A list of client IDs (also known as audiences). When a mobile or web app registers with an OpenID Connect provider, they establish a value that identifies the application. (This is the value that's sent as the client\_id parameter on OAuth requests.) |`list(string)`| <pre>[<br> "https://gitlab.com"<br>]</pre> | no |
123
+
| <aname="input_create_oidc_provider"></a> [create\_oidc\_provider](#input\_create\_oidc\_provider)| Whether or not to create the associated oidc provider. If false, variable 'oidc\_provider\_arn' is required |`bool`|`true`| no |
124
+
| <aname="input_create_oidc_role"></a> [create\_oidc\_role](#input\_create\_oidc\_role)| Whether or not to create the OIDC attached role |`bool`|`true`| no |
125
+
| <aname="input_gitlab_tls_url"></a> [gitlab\_tls\_url](#input\_gitlab\_tls\_url)| the Hashicorp TLS provider has started following redirects starting v4. so we use tls:// |`string`|`"tls://gitlab.com:443"`| no |
126
+
| <aname="input_match_field"></a> [match\_field](#input\_match\_field)| the token field the OIDC provider filter on |`string`|`"sub"`| no |
127
+
| <aname="input_max_session_duration"></a> [max\_session\_duration](#input\_max\_session\_duration)| Maximum session duration in seconds. |`number`|`3600`| no |
128
+
| <aname="input_oidc_role_attach_policies"></a> [oidc\_role\_attach\_policies](#input\_oidc\_role\_attach\_policies)| Attach policies to OIDC role. |`list(string)`|`[]`| no |
129
+
| <aname="input_projects"></a> [projects](#input\_projects)| List of GitLab namesapce/project names authorized to assume the role. |`list(string)`|`[]`| no |
130
+
| <aname="input_role_description"></a> [role\_description](#input\_role\_description)| (Optional) Description of the role. |`string`|`"Role assumed by the Gitlab OIDC provider."`| no |
131
+
| <aname="input_role_name"></a> [role\_name](#input\_role\_name)| (Optional, Forces new resource) Friendly name of the role. |`string`|`"gitlab-oidc-provider-aws"`| no |
132
+
| <aname="input_tags"></a> [tags](#input\_tags)| A mapping of tags to assign to all resources |`map(string)`|`{}`| no |
133
+
| <aname="input_url"></a> [url](#input\_url)| GitLab OpenID TLS certificate URL. The address of your GitLab instance, such as https://gitlab.com or http://gitlab.example.com.|`string`|`"https://gitlab.com"`| no |
107
134
108
135
## Outputs
109
136
110
137
| Name | Description |
111
138
|------|-------------|
112
-
| <aname="output_used"></a> [used](#output\_used)| used value |
0 commit comments