Skip to content

Commit b40581f

Browse files
authored
docs: Update the README title and description (#78)
1 parent 29a447d commit b40581f

File tree

3 files changed

+39
-38
lines changed

3 files changed

+39
-38
lines changed

README.md

Lines changed: 23 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,13 @@
1-
# OpenID Connect for AWS and GitHub Actions
1+
# AWS GitHub Actions OIDC Terraform Module
22

33
[![CI](https://github.com/unfunco/terraform-aws-oidc-github/actions/workflows/ci.yaml/badge.svg)](https://github.com/unfunco/terraform-aws-oidc-github/actions/workflows/ci.yaml)
44
[![Security](https://github.com/unfunco/terraform-aws-oidc-github/actions/workflows/security.yaml/badge.svg)](https://github.com/unfunco/terraform-aws-oidc-github/actions/workflows/security.yaml)
55
[![License: Apache 2.0](https://img.shields.io/badge/License-Apache_2.0-purple.svg)](https://opensource.org/licenses/Apache-2.0)
66

7-
Terraform module to configure GitHub Actions as an IAM OIDC identity provider in
8-
AWS. OpenID Connect allows GitHub Actions workflows to access resources in AWS
9-
without requiring AWS credentials to be stored as long-lived GitHub secrets.
7+
Terraform module to configure GitHub Actions as an OpenID Connect (OIDC)
8+
identity provider in AWS, allowing GitHub Actions to obtain short-lived
9+
credentials by assuming IAM roles directly, and enabling secure authentication
10+
between GitHub Actions workflows and AWS resources.
1011

1112
## 🔨 Getting started
1213

@@ -52,7 +53,7 @@ jobs:
5253
uses: aws-actions/configure-aws-credentials@v4
5354
with:
5455
aws-region: ${{ env.AWS_REGION }}
55-
role-to-assume: arn:aws:iam::${{ env.AWS_ACCOUNT_ID }}:role/github
56+
role-to-assume: arn:aws:iam::${{ env.AWS_ACCOUNT_ID }}:role/GitHubActions
5657
- run: aws sts get-caller-identity
5758
```
5859
@@ -82,23 +83,23 @@ applied, the JWT will contain an updated `iss` claim.
8283

8384
## Inputs
8485

85-
| Name | Description | Type | Default | Required |
86-
| ------------------------------- | --------------------------------------------------------------------------- | -------------- | ---------- | :------: |
87-
| additional_audiences | List of additional OIDC audiences allowed to assume the role. | `list(string)` | `null` | no |
88-
| additional_thumbprints | List of additional thumbprints for the OIDC provider. | `list(string)` | `[]` | no |
89-
| attach_read_only_policy | Flag to enable/disable the attachment of the ReadOnly policy. | `bool` | `false` | no |
90-
| create_oidc_provider | Flag to enable/disable the creation of the GitHub OIDC provider. | `bool` | `true` | no |
91-
| dangerously_attach_admin_policy | Flag to enable/disable the attachment of the AdministratorAccess policy. | `bool` | `false` | no |
92-
| enterprise_slug | Enterprise slug for GitHub Enterprise Cloud customers. | `string` | `""` | no |
93-
| force_detach_policies | Flag to force detachment of policies attached to the IAM role. | `bool` | `false` | no |
94-
| github_repositories | List of GitHub organization/repository names authorized to assume the role. | `list(string)` | n/a | yes |
95-
| iam_role_inline_policies | Inline policies map with policy name as key and json as value. | `map(string)` | `{}` | no |
96-
| iam_role_name | Name of the IAM role to be created. This will be assumable by GitHub. | `string` | `"github"` | no |
97-
| iam_role_path | Path under which to create IAM role. | `string` | `"/"` | no |
98-
| iam_role_permissions_boundary | ARN of the permissions boundary to be used by the IAM role. | `string` | `""` | no |
99-
| iam_role_policy_arns | List of IAM policy ARNs to attach to the IAM role. | `list(string)` | `[]` | no |
100-
| max_session_duration | Maximum session duration in seconds. | `number` | `3600` | no |
101-
| tags | Map of tags to be applied to all resources. | `map(string)` | `{}` | no |
86+
| Name | Description | Type | Default | Required |
87+
| ------------------------------- | ----------------------------------------------------------------------------- | -------------- | ----------------- | :------: |
88+
| additional_audiences | List of additional OIDC audiences allowed to assume the role. | `list(string)` | `null` | no |
89+
| additional_thumbprints | A list of additional thumbprints for the OIDC provider. | `list(string)` | `[]` | no |
90+
| attach_read_only_policy | Flag to enable/disable the attachment of the ReadOnly policy. | `bool` | `false` | no |
91+
| create_oidc_provider | Flag to enable/disable the creation of the GitHub OIDC provider. | `bool` | `true` | no |
92+
| dangerously_attach_admin_policy | Flag to enable/disable the attachment of the AdministratorAccess policy. | `bool` | `false` | no |
93+
| enterprise_slug | Enterprise slug for GitHub Enterprise Cloud customers. | `string` | `""` | no |
94+
| force_detach_policies | Flag to force detachment of policies attached to the IAM role. | `bool` | `false` | no |
95+
| github_repositories | A list of GitHub organization/repository names authorized to assume the role. | `list(string)` | n/a | yes |
96+
| iam_role_inline_policies | Inline policies map with policy name as key and json as value. | `map(string)` | `{}` | no |
97+
| iam_role_name | The name of the IAM role to be created and made assumable by GitHub Actions. | `string` | `"GitHubActions"` | no |
98+
| iam_role_path | The path under which to create IAM role. | `string` | `"/"` | no |
99+
| iam_role_permissions_boundary | The ARN of the permissions boundary to be used by the IAM role. | `string` | `""` | no |
100+
| iam_role_policy_arns | A list of IAM policy ARNs to attach to the IAM role. | `list(string)` | `[]` | no |
101+
| max_session_duration | The maximum session duration in seconds. | `number` | `3600` | no |
102+
| tags | A map of tags to be applied to all applicable resources. | `map(string)` | `{}` | no |
102103

103104
## Outputs
104105

examples/complete/variables.tf

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ variable "additional_audiences" {
99

1010
variable "additional_thumbprints" {
1111
default = []
12-
description = "List of additional thumbprints for the OIDC provider."
12+
description = "A list of additional thumbprints for the OIDC provider."
1313
type = list(string)
1414

1515
validation {
@@ -49,7 +49,7 @@ variable "force_detach_policies" {
4949
}
5050

5151
variable "github_repositories" {
52-
description = "List of GitHub organization/repository names authorized to assume the role."
52+
description = "A list of GitHub organization/repository names authorized to assume the role."
5353
type = list(string)
5454

5555
validation {
@@ -71,19 +71,19 @@ variable "iam_role_name" {
7171

7272
variable "iam_role_path" {
7373
default = "/"
74-
description = "Path under which to create IAM role."
74+
description = "The path under which to create IAM role."
7575
type = string
7676
}
7777

7878
variable "iam_role_permissions_boundary" {
7979
default = ""
80-
description = "ARN of the permissions boundary to be used by the IAM role."
80+
description = "The ARN of the permissions boundary to be used by the IAM role."
8181
type = string
8282
}
8383

8484
variable "iam_role_policy_arns" {
8585
default = []
86-
description = "List of IAM policy ARNs to attach to the IAM role."
86+
description = "A list of IAM policy ARNs to attach to the IAM role."
8787
type = list(string)
8888
}
8989

@@ -95,17 +95,17 @@ variable "iam_role_inline_policies" {
9595

9696
variable "max_session_duration" {
9797
default = 3600
98-
description = "Maximum session duration in seconds."
98+
description = "The maximum session duration in seconds."
9999
type = number
100100

101101
validation {
102102
condition = var.max_session_duration >= 3600 && var.max_session_duration <= 43200
103-
error_message = "Maximum session duration must be between 3600 and 43200 seconds."
103+
error_message = "The maximum session duration must be between 3600 and 43200 seconds."
104104
}
105105
}
106106

107107
variable "tags" {
108108
default = {}
109-
description = "Map of tags to be applied to all resources."
109+
description = "A map of tags to be applied to all applicable resources."
110110
type = map(string)
111111
}

variables.tf

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ variable "additional_audiences" {
99

1010
variable "additional_thumbprints" {
1111
default = []
12-
description = "List of additional thumbprints for the OIDC provider."
12+
description = "A list of additional thumbprints for the OIDC provider."
1313
type = list(string)
1414

1515
validation {
@@ -49,7 +49,7 @@ variable "force_detach_policies" {
4949
}
5050

5151
variable "github_repositories" {
52-
description = "List of GitHub organization/repository names authorized to assume the role."
52+
description = "A list of GitHub organization/repository names authorized to assume the role."
5353
type = list(string)
5454

5555
validation {
@@ -71,19 +71,19 @@ variable "iam_role_name" {
7171

7272
variable "iam_role_path" {
7373
default = "/"
74-
description = "Path under which to create IAM role."
74+
description = "The path under which to create IAM role."
7575
type = string
7676
}
7777

7878
variable "iam_role_permissions_boundary" {
7979
default = ""
80-
description = "ARN of the permissions boundary to be used by the IAM role."
80+
description = "The ARN of the permissions boundary to be used by the IAM role."
8181
type = string
8282
}
8383

8484
variable "iam_role_policy_arns" {
8585
default = []
86-
description = "List of IAM policy ARNs to attach to the IAM role."
86+
description = "A list of IAM policy ARNs to attach to the IAM role."
8787
type = list(string)
8888
}
8989

@@ -95,17 +95,17 @@ variable "iam_role_inline_policies" {
9595

9696
variable "max_session_duration" {
9797
default = 3600
98-
description = "Maximum session duration in seconds."
98+
description = "The maximum session duration in seconds."
9999
type = number
100100

101101
validation {
102102
condition = var.max_session_duration >= 3600 && var.max_session_duration <= 43200
103-
error_message = "Maximum session duration must be between 3600 and 43200 seconds."
103+
error_message = "The maximum session duration must be between 3600 and 43200 seconds."
104104
}
105105
}
106106

107107
variable "tags" {
108108
default = {}
109-
description = "Map of tags to be applied to all resources."
109+
description = "A map of tags to be applied to all applicable resources."
110110
type = map(string)
111111
}

0 commit comments

Comments
 (0)