@@ -81,34 +81,38 @@ applied, the JWT will contain an updated `iss` claim.
8181
8282# # Inputs
8383
84- | Name | Description | Type | Default | Required |
85- | ------------------------------- | ---------------------------------------------------------------------------- | -------------- | ----------------- | :------ : |
86- | additional_audiences | Additional OIDC audiences allowed to assume the role. | `list(string)` | `null` | no |
87- | additional_thumbprints | Additional thumbprints for the OIDC provider. | `list(string)` | `[]` | no |
88- | attach_read_only_policy | Enable/disable the attachment of the ReadOnly policy. | `bool` | `false` | no |
89- | create | Enable/disable the creation of all resources. | `bool` | `true` | no |
90- | create_iam_role | Enable/disable creation of the IAM role. | `bool` | `true` | no |
91- | create_oidc_provider | Enable/disable the creation of the GitHub OIDC provider. | `bool` | `true` | no |
92- | dangerously_attach_admin_policy | Enable/disable the attachment of the AdministratorAccess policy. | `bool` | `false` | no |
93- | enterprise_slug | Enterprise slug for GitHub Enterprise Cloud customers. | `string` | `""` | no |
94- | force_detach_policies | Force detachment of policies attached to the IAM role. | `bool` | `false` | no |
95- | github_repositories | GitHub organization/repository names authorized to assume the role. | `list(string)` | n/a | yes |
96- | iam_role_inline_policies | Inline policies map with policy name as key and json as value. | `map(string)` | `{}` | no |
97- | iam_role_name | The name of the IAM role to be created and made assumable by GitHub Actions. | `string` | `"GitHubActions"` | no |
98- | iam_role_path | The path under which to create IAM role. | `string` | `"/"` | no |
99- | iam_role_permissions_boundary | The ARN of the permissions boundary to be used by the IAM role. | `string` | `""` | no |
100- | iam_role_policy_arns | IAM policy ARNs to attach to the IAM role. | `list(string)` | `[]` | no |
101- | max_session_duration | The maximum session duration in seconds. | `number` | `3600` | no |
102- | tags | Tags to be applied to all applicable resources. | `map(string)` | `{}` | no |
84+ | Name | Description | Type | Default | Required |
85+ | ------------------------------- | ---------------------------------------------------------------------------- | -------------- | ---------------------------------------- | :------ : |
86+ | additional_audiences | Additional OIDC audiences allowed to assume the role. | `list(string)` | `null` | no |
87+ | additional_thumbprints | Additional thumbprints for the OIDC provider. | `list(string)` | `[]` | no |
88+ | attach_read_only_policy | Enable/disable the attachment of the ReadOnly policy. | `bool` | `false` | no |
89+ | create | Enable/disable the creation of all resources. | `bool` | `true` | no |
90+ | create_iam_role | Enable/disable creation of the IAM role. | `bool` | `true` | no |
91+ | create_oidc_provider | Enable/disable the creation of the GitHub OIDC provider. | `bool` | `true` | no |
92+ | dangerously_attach_admin_policy | Enable/disable the attachment of the AdministratorAccess policy. | `bool` | `false` | no |
93+ | enterprise_slug | Enterprise slug for GitHub Enterprise Cloud customers. | `string` | `""` | no |
94+ | github_repositories | GitHub organization/repository names authorized to assume the role. | `list(string)` | n/a | yes |
95+ | iam_role_description | Description of the IAM role to be created. | `string` | `"Assumed by the GitHub OIDC provider."` | no |
96+ | iam_role_force_detach_policies | Force detachment of policies attached to the IAM role. | `bool` | `false` | no |
97+ | iam_role_inline_policies | Inline policies map with policy name as key and json as value. | `map(string)` | `{}` | no |
98+ | iam_role_max_session_duration | The maximum session duration in seconds. | `number` | `3600` | no |
99+ | iam_role_name | The name of the IAM role to be created and made assumable by GitHub Actions. | `string` | `"GitHubActions"` | no |
100+ | iam_role_path | The path under which to create IAM role. | `string` | `"/"` | no |
101+ | iam_role_permissions_boundary | The ARN of the permissions boundary to be used by the IAM role. | `string` | `""` | no |
102+ | iam_role_policy_arns | IAM policy ARNs to attach to the IAM role. | `list(string)` | `[]` | no |
103+ | iam_role_tags | Additional tags to be applied to the IAM role. | `map(string)` | `{}` | no |
104+ | oidc_provider_tags | Tags to be applied to the OIDC provider. | `map(string)` | `{}` | no |
105+ | tags | Tags to be applied to all applicable resources. | `map(string)` | `{}` | no |
103106
104107# # Outputs
105108
106- | Name | Description |
107- | ----------------- | ----------------------------- |
108- | iam_role_arn | The ARN of the IAM role. |
109- | iam_role_name | The name of the IAM role. |
110- | oidc_provider_arn | The ARN of the OIDC provider. |
111- | oidc_provider_url | The URL of the OIDC provider. |
109+ | Name | Description |
110+ | --------------------------- | ----------------------------------------------------------------------- |
111+ | assume_role_policy_document | The assume role policy document that can be attached to your IAM roles. |
112+ | iam_role_arn | The ARN of the IAM role. |
113+ | iam_role_name | The name of the IAM role. |
114+ | oidc_provider_arn | The ARN of the OIDC provider. |
115+ | oidc_provider_url | The URL of the OIDC provider. |
112116
113117<!-- END_TF_DOCS -->
114118
0 commit comments